Abstract
There is increasing usage of FinTech and internet among college students and it has also led to the rise of cyber security risks. Ignorance of cybercrimes and proper education has contributed to the growth of cybercrimes in India. This paper explores to identify the cyber security measures adopted and risk concerns with use of FinTech among college students in Coimbatore. A questionnaire survey was conducted among 131 college students of Coimbatore to collect the required data and consolidated. The study also attempts to identify gendered differences and technical knowledge in awareness level of cybercrimes.
Keywords: Cyber Security, FinTech, Cybercrimes, Risks
References
1. AL-Maksousy, H. H. L. (2018). Applying Machine Learning to Advance Cyber Security: Network Based Intrusion Detection Systems. Doctor of Philosophy (PhD), dissertation, Computer Science, Old Dominion University, DOI: 10.25777/8w8wsa92.
2. Alali, M., Almogren, A., Hassan, M. M., Rassan, I. A. L., & Bhuiyan, M. Z. A. (2018). Improving risk assessment model of cyber security using fuzzy logic inference system. Computers and Security, 74, 323–339. https://doi.org/10.1016/j.cose.2017.09.011
3. Al_Duhaidahawi et al., (2020) Analysing the effects of FinTech variables on cybersecurity: Evidence form Iraqi Banks, International Journal of Research in Business & Social Science 9(6)(2020) 123-133
4. Ayofe, A. N., & Irwin, B. (2010). Cyber Security: Challenges And The Way Forward. Georgian Electronic Scientific journal, Computer Science & Telecommunications, 29(6). Https://Www.Researchgate.Net /Publication/265121167_Cyber_Securıty_Challenges_And_The_Way_Forward.
5. Borghard, E. D., & Lonergan, S. W. (2017). The Logic of Coercion in Cyberspace. Security Studies, 26(3), 452–481. https://doi.org/10.1080/09636412.2017.1306396
6. Christine Dreibelbis, R. (2016). It’ s More Than Just Changing Your Password: Exploring the Nature and Antecedents of Cyber Security Behaviors, University of South Florida
.http://scholarcommons.usf.edu/etdhttp: //scholarcommons.usf.edu/etd/6083
7. Davis, J. J. (2017). Machine Learning and Feature Engineering for Computer Network Security. Thesis. https://eprints.qut.edu.au/106914/1/Jonathan_Davis_Thesis.pdf
8. Dawson, M. (2017). Hyper-connectivity : Intricacies of national and international cyber securities Hyper-connectivity : Intricacies of national and international cyber securities . London Metropolitan University Maurice Dawson Submitted in partial fulfillment of the award of Doctor of Philosophy by Prior. January. https://www.researchgate.net/publication /314230510_Hyper connectivity_Intricacies_of_national_and_international_cyber_securities Al_Duhaidahawi et
al., International Journal of Research in Business & Social Science 9(6)(2020) 123-133 132
9. Firmansyah, E. A., & Anwar, M. (2019). Islamic Financial Technology (Fintech): Its Challenges and Prospect. Atlantis Press is a professional publisher of scientific. 216(Assdg 2018), 52–58. https://doi.org/10.2991/assdg-18.2019.5
10. Faaeq, M. K., Thabit, T. H., & Harjan, S. A. (2015). Technology Innovation Usage in Public Services Among Employees in Republic of Iraq. In 7th International Conference on Information Technology, Al-Zaytoonah University of Jordan, Amman, Jordan..
11. Harjan, Sinan Abdullah, Teng, M., Shah, S. S. H., & Mohammed, J. H. (2019). Political Connections and Cost of Debt Financing: Empirical Evidence from China. International Journal of Economics and Financial Issues, 9(1), 212. DOI: https://doi.org/10.32479/ijefi.7561.
12. Hayder M. Kareem, A.-D., Zhang, J., Abdulreza, M. S., Harjan, S. A., & Shah, S. S. H. (2019). the Role of Financial Inclusion and Competitive Advantage: Evidence From Iraqi Islamic Banks. International Journal of Economics and Financial Issues, 9(3), 193–199. https://doi.org/10.32479/ijefi.8080
13. Henriques de Gusmão, A. P., Mendonça Silva, M., Poleto, T., Camara e Si lva, L., & Cabral Seixas Costa, A. P. (2018). Cybersecurity risk analysis model using fault tree analysis and fuzzy decision theory. International Journal of Information Management, 43(January), 248–260. https://doi.org/10.1016/j.ijinfomgt.2018.08.008
14. Kang, M. J., & Kang, J. W. (2016). Intrusion detection system using deep neural network for in-vehicle network security. PLoS ONE, 11(6), 1–17. . https://doi.org/10.1371/journal.pone.0155781
15. Kareem, H. M., Duhaidahawi, A., Zhang, J., Abdulreza, M. S., & Sebai, M. (2020). An efficient model for financial risks assessment based on artificial neural networks; Evidence from Iraqi Banks (2004-2017), Journal of Southwest Jiaotong University. https://doi.org/10.35741/issn.0258-2724.55.3.8. 55(3).
16. Kim, Y., Park, Y.-J., Choi, J., & Yeon, J. (2015). An Empirical Study on the Adoption of “Fintech” Service: Focused on Mobile Payment Services. December, Advanced Science and Technology Letters, 114(26), 2015, 136–140,
https://doi.org/10.14257/astl.2015.114.26
17. Leong, K. (2018). FinTech (Financial Technology): What is It and How to Use Technologies to Create Business Value in Fintech Way? International Journal of Innovation, Management and Technology, 9(2), 74–78.
https://doi.org/10.18178/ijimt.2018.9.2.791
18. Li, H., No, W. G., & Wang, T. (2018). SEC’s cybersecurity disclosure guidance and disclosed cybersecurity risk factors. International Journal of Accounting Information Systems, 30(June), 40–55. https://doi.org/10.1016/j.accinf.2018.06.003
19. Lin, T. C. W. (2015). Infinite Financial Intermediation. Wake Forest Law Review, 50(643), Temple University Legal Studies Research Paper No. https://ssrn.com/abstract=2711379
20. Magnuson, W. (2018). Regulating fintech. Vanderbilt Law Review, Available at: https://scholarship.law.vanderbilt.edu/vlr/vol71/iss4/271 (4), 1167–1226.
21. Micu, A. (2016). Financial Technology (FinTech) and its Implementation on the Romanian Non-Banking Capital Market. SEA – Practical Application of Science, IV(11), 379–384.
22. Munk, T. H. (2015). Cyber-Security in the European Region: Anticipatory Governance and Practices. PQDT- The University of Manchester (United Kingdom) & Ireland, 287. https://search.proquest.com/docview/1784057545?accountid=9645
23. Nikkel, B. (2020). Fintech forensics: Criminal investigation and digital evidence in financial technologies. Forensic Science International: Digital Investigation, xxxx, 200908. https://doi.org/10.1016/j.fsidi.2020.200908
24. Noor, U., Anwar, Z., Amjad, T., & Choo, K. K. R. (2019). A machine learning-based FinTech cyber threat attribution framework using high-level indicators of compromise. Future Generation Computer Systems, 96, 227–242. https://doi.org/10.1016/j.future.2019.02.013
25. Peters, G. W., Panayi, E., & Chapelle, A. (2015). Trends in Crypto-Currencies and Blockchain Technologies: A Monetary Theory and Regulation Perspective. SSRN Electronic Journal, 3(3). https://doi.org/10.2139/ssrn.2646618
26. Philippon, T. (2016). The Fintech Opportunity. National Bureau Of Economic Research, 8(3), 6–10. http://www.nber.org/papers/w22476
27. Rieck, K., Trinius, P., Willems, C., & Holz, T. (2011). Automatic analysis of malware behavior using machine learning. Journal of Computer Security, 19(4), 639–668. https://doi.org/10.3233/JCS-2010-0410
28. Sadłakowski, D., & Sobieraj, A. (2017). The development of the FinTech industry in the Visegrad group countries. World Scientific News, 85, 20-28.https://doi. WSN% 2085%20 (2017) % 2020-28.pdf
29. Schatz, D., Wall, J., Schatz, D., & Wall, J. (2017). Security and Law Towards a More Representative Definition of Cyber Security Towards A More Representative Definition Of Cyber Security. Journal of Digital Forensics 12(2). https://doi. 10.1080 09636412.2017 .1306396
30. Schueffel, P. mname. (2018). Taming the Beast: A Scientific Definition of Fintech. SSRN Electronic Journal, April. https://doi.org/10.2139/ssrn.3097312
31. Shah, S. S. H., Xinping, X., Khan, M. A., & Harjan, S. A. (2018). Investor and manager overconfidence bias and firm value: Micro-level evidence from the Pakistan equity market. International Journal of Economics and Financial Issues, 8(5), 190.
32. Stevens, T. (2018). Global cybersecurity: New directions in theory and methods. Politics and Governance, 6(2), 1–4. https://doi.org/10.17645/pag.v6i2.1569
33. Von Solms, R., & Van Niekerk, J. (2013). From information security to cyber security. Computers and Security, 38, 97–102. https://doi.org/10.1016/j.cose.2013.04.004
34. Wang, B., Zheng, Y., Lou, W., & Hou, Y. T. (2015). DDoS attack protection in the era of cloud computing and Software-Defined Networking. Computer Networks, 81, 308–319. https://doi.org/10.1016/j.comnet.2015.02.026
35. Whitley, E. A. (2009). Informational privacy, consent and the “control” of personal data. Information Security Technical Report, 14(3), 154–159. https://doi.org/ 10.1016/j.istr .2009.10.001
36. Wulan, V. R. (2017). Financial technology (fintech) a new transaction in future. Journal Electrical Engineering and Computer Sciences, 2(1), 177–182. Corpus ID: 170052661