References
1. AL-Maksousy, H. H. L. (2018). Applying Machine Learning to Advance Cyber Security: Network Based Intrusion Detection Systems. Doctor of Philosophy (PhD), dissertation, Computer Science, Old Dominion University, DOI: 10.25777/8w8wsa92.
2. Alali, M., Almogren, A., Hassan, M. M., Rassan, I. A. L., & Bhuiyan, M. Z. A. (2018). Improving risk assessment model of cyber security using fuzzy logic inference system. Computers and Security, 74, 323–339. https://doi.org/10.1016/j.cose.2017.09.011
3. Al_Duhaidahawi et al., (2020) Analysing the effects of FinTech variables on cybersecurity: Evidence form Iraqi Banks, International Journal of Research in Business & Social Science 9(6)(2020) 123-133
4. Ayofe, A. N., & Irwin, B. (2010). Cyber Security: Challenges And The Way Forward. Georgian Electronic Scientific journal, Computer Science & Telecommunications, 29(6). Https://Www.Researchgate.Net /Publication/265121167_Cyber_Securıty_Challenges_And_The_Way_Forward.
5. Borghard, E. D., & Lonergan, S. W. (2017). The Logic of Coercion in Cyberspace. Security Studies, 26(3), 452–481. https://doi.org/10.1080/09636412.2017.1306396
6. Christine Dreibelbis, R. (2016). It’ s More Than Just Changing Your Password: Exploring the Nature and Antecedents of Cyber Security Behaviors, University of South Florida
.http://scholarcommons.usf.edu/etdhttp: //scholarcommons.usf.edu/etd/6083
7. Davis, J. J. (2017). Machine Learning and Feature Engineering for Computer Network Security. Thesis. https://eprints.qut.edu.au/106914/1/Jonathan_Davis_Thesis.pdf
8. Dawson, M. (2017). Hyper-connectivity : Intricacies of national and international cyber securities Hyper-connectivity : Intricacies of national and international cyber securities . London Metropolitan University Maurice Dawson Submitted in partial fulfillment of the award of Doctor of Philosophy by Prior. January. https://www.researchgate.net/publication /314230510_Hyper connectivity_Intricacies_of_national_and_international_cyber_securities Al_Duhaidahawi et
al., International Journal of Research in Business & Social Science 9(6)(2020) 123-133 132
9. Firmansyah, E. A., & Anwar, M. (2019). Islamic Financial Technology (Fintech): Its Challenges and Prospect. Atlantis Press is a professional publisher of scientific. 216(Assdg 2018), 52–58. https://doi.org/10.2991/assdg-18.2019.5
10. Faaeq, M. K., Thabit, T. H., & Harjan, S. A. (2015). Technology Innovation Usage in Public Services Among Employees in Republic of Iraq. In 7th International Conference on Information Technology, Al-Zaytoonah University of Jordan, Amman, Jordan..
11. Harjan, Sinan Abdullah, Teng, M., Shah, S. S. H., & Mohammed, J. H. (2019). Political Connections and Cost of Debt Financing: Empirical Evidence from China. International Journal of Economics and Financial Issues, 9(1), 212. DOI: https://doi.org/10.32479/ijefi.7561.
12. Hayder M. Kareem, A.-D., Zhang, J., Abdulreza, M. S., Harjan, S. A., & Shah, S. S. H. (2019). the Role of Financial Inclusion and Competitive Advantage: Evidence From Iraqi Islamic Banks. International Journal of Economics and Financial Issues, 9(3), 193–199. https://doi.org/10.32479/ijefi.8080
13. Henriques de Gusmão, A. P., Mendonça Silva, M., Poleto, T., Camara e Si lva, L., & Cabral Seixas Costa, A. P. (2018). Cybersecurity risk analysis model using fault tree analysis and fuzzy decision theory. International Journal of Information Management, 43(January), 248–260. https://doi.org/10.1016/j.ijinfomgt.2018.08.008
14. Kang, M. J., & Kang, J. W. (2016). Intrusion detection system using deep neural network for in-vehicle network security. PLoS ONE, 11(6), 1–17. . https://doi.org/10.1371/journal.pone.0155781
15. Kareem, H. M., Duhaidahawi, A., Zhang, J., Abdulreza, M. S., & Sebai, M. (2020). An efficient model for financial risks assessment based on artificial neural networks; Evidence from Iraqi Banks (2004-2017), Journal of Southwest Jiaotong University. https://doi.org/10.35741/issn.0258-2724.55.3.8. 55(3).
16. Kim, Y., Park, Y.-J., Choi, J., & Yeon, J. (2015). An Empirical Study on the Adoption of “Fintech” Service: Focused on Mobile Payment Services. December, Advanced Science and Technology Letters, 114(26), 2015, 136–140,
https://doi.org/10.14257/astl.2015.114.26
17. Leong, K. (2018). FinTech (Financial Technology): What is It and How to Use Technologies to Create Business Value in Fintech Way? International Journal of Innovation, Management and Technology, 9(2), 74–78.
https://doi.org/10.18178/ijimt.2018.9.2.791
18. Li, H., No, W. G., & Wang, T. (2018). SEC’s cybersecurity disclosure guidance and disclosed cybersecurity risk factors. International Journal of Accounting Information Systems, 30(June), 40–55. https://doi.org/10.1016/j.accinf.2018.06.003
19. Lin, T. C. W. (2015). Infinite Financial Intermediation. Wake Forest Law Review, 50(643), Temple University Legal Studies Research Paper No. https://ssrn.com/abstract=2711379
20. Magnuson, W. (2018). Regulating fintech. Vanderbilt Law Review, Available at: https://scholarship.law.vanderbilt.edu/vlr/vol71/iss4/271 (4), 1167–1226.
21. Micu, A. (2016). Financial Technology (FinTech) and its Implementation on the Romanian Non-Banking Capital Market. SEA – Practical Application of Science, IV(11), 379–384.
22. Munk, T. H. (2015). Cyber-Security in the European Region: Anticipatory Governance and Practices. PQDT- The University of Manchester (United Kingdom) & Ireland, 287. https://search.proquest.com/docview/1784057545?accountid=9645
23. Nikkel, B. (2020). Fintech forensics: Criminal investigation and digital evidence in financial technologies. Forensic Science International: Digital Investigation, xxxx, 200908. https://doi.org/10.1016/j.fsidi.2020.200908
24. Noor, U., Anwar, Z., Amjad, T., & Choo, K. K. R. (2019). A machine learning-based FinTech cyber threat attribution framework using high-level indicators of compromise. Future Generation Computer Systems, 96, 227–242. https://doi.org/10.1016/j.future.2019.02.013
25. Peters, G. W., Panayi, E., & Chapelle, A. (2015). Trends in Crypto-Currencies and Blockchain Technologies: A Monetary Theory and Regulation Perspective. SSRN Electronic Journal, 3(3). https://doi.org/10.2139/ssrn.2646618
26. Philippon, T. (2016). The Fintech Opportunity. National Bureau Of Economic Research, 8(3), 6–10. http://www.nber.org/papers/w22476
27. Rieck, K., Trinius, P., Willems, C., & Holz, T. (2011). Automatic analysis of malware behavior using machine learning. Journal of Computer Security, 19(4), 639–668. https://doi.org/10.3233/JCS-2010-0410
28. Sadłakowski, D., & Sobieraj, A. (2017). The development of the FinTech industry in the Visegrad group countries. World Scientific News, 85, 20-28.https://doi. WSN% 2085%20 (2017) % 2020-28.pdf
29. Schatz, D., Wall, J., Schatz, D., & Wall, J. (2017). Security and Law Towards a More Representative Definition of Cyber Security Towards A More Representative Definition Of Cyber Security. Journal of Digital Forensics 12(2). https://doi. 10.1080 09636412.2017 .1306396
30. Schueffel, P. mname. (2018). Taming the Beast: A Scientific Definition of Fintech. SSRN Electronic Journal, April. https://doi.org/10.2139/ssrn.3097312
31. Shah, S. S. H., Xinping, X., Khan, M. A., & Harjan, S. A. (2018). Investor and manager overconfidence bias and firm value: Micro-level evidence from the Pakistan equity market. International Journal of Economics and Financial Issues, 8(5), 190.
32. Stevens, T. (2018). Global cybersecurity: New directions in theory and methods. Politics and Governance, 6(2), 1–4. https://doi.org/10.17645/pag.v6i2.1569
33. Von Solms, R., & Van Niekerk, J. (2013). From information security to cyber security. Computers and Security, 38, 97–102. https://doi.org/10.1016/j.cose.2013.04.004
34. Wang, B., Zheng, Y., Lou, W., & Hou, Y. T. (2015). DDoS attack protection in the era of cloud computing and Software-Defined Networking. Computer Networks, 81, 308–319. https://doi.org/10.1016/j.comnet.2015.02.026
35. Whitley, E. A. (2009). Informational privacy, consent and the “control” of personal data. Information Security Technical Report, 14(3), 154–159. https://doi.org/ 10.1016/j.istr .2009.10.001
36. Wulan, V. R. (2017). Financial technology (fintech) a new transaction in future. Journal Electrical Engineering and Computer Sciences, 2(1), 177–182. Corpus ID: 170052661