Impact of Cybersecurity Risks and Mitigation Strategies on Banking Industry Article Swipe
YOU?
·
· 2025
· Open Access
·
· DOI: https://doi.org/10.51239/nrjss.v18i1.497
Purpose: This research focuses to evaluate the impact of cybersecurity risks impact on banks' financial performance, reputation, and customer trust, respectively. It also identifies the cybersecurity risks facing banks in this digitalized era. Design/Method/Approach: The research uses a sample of 121 private bank users in Faisalabad, Pakistan, and apply quantitative methods, such as correlation and regression analysis, to analyze these risks and their mitigation strategies. Findings/Results: Findings indicate that cybersecurity risks have a negative impact on banks' financial performance and reputation but drive the adoption of robust mitigation strategies. These include advanced technologies like encryption, firewalls, intrusion detection systems, and two-factor authentication, alongside employee training and regular vulnerability assessments. Despite their effectiveness, demographic and technological variations influence the degree of success, with younger, tech-savvy individuals showing greater responsiveness to mitigation efforts. Mitigation strategies have a strong positive correlation with enhanced financial performance and customer trust, thus underlining their role in building resilience. Originality: This study shows novelty because it examines cybersecurity threats and mitigation measures in banking with emphasis on emerging threats and regional challenges. It presents findings by examining particular literature, assessing existing frameworks, and suggesting context-specific solutions addressing under-researched areas in developing economies' banking sectors. Research Implications: The study highlights the need for collaboration between banks, fintech firms, and regulatory bodies to build integrated responses to cyber threats.
Related Topics
- Type
- article
- Language
- en
- Landing Page
- https://doi.org/10.51239/nrjss.v18i1.497
- https://nicerjss.com/index.php/JFME/article/download/497/254
- OA Status
- diamond
- References
- 45
- Related Works
- 10
- OpenAlex ID
- https://openalex.org/W4412736386
Raw OpenAlex JSON
- OpenAlex ID
-
https://openalex.org/W4412736386Canonical identifier for this work in OpenAlex
- DOI
-
https://doi.org/10.51239/nrjss.v18i1.497Digital Object Identifier
- Title
-
Impact of Cybersecurity Risks and Mitigation Strategies on Banking IndustryWork title
- Type
-
articleOpenAlex work type
- Language
-
enPrimary language
- Publication year
-
2025Year of publication
- Publication date
-
2025-03-28Full publication date if available
- Authors
-
Hira, Muhammad Hafeez, Khadija Yasen, Mirza Nasir Jahan MehdiList of authors in order
- Landing page
-
https://doi.org/10.51239/nrjss.v18i1.497Publisher landing page
- PDF URL
-
https://nicerjss.com/index.php/JFME/article/download/497/254Direct link to full text PDF
- Open access
-
YesWhether a free full text is available
- OA status
-
diamondOpen access status per OpenAlex
- OA URL
-
https://nicerjss.com/index.php/JFME/article/download/497/254Direct OA link when available
- Concepts
-
Business, Computer security, Banking industry, Risk analysis (engineering), Finance, Computer scienceTop concepts (fields/topics) attached by OpenAlex
- Cited by
-
0Total citation count in OpenAlex
- References (count)
-
45Number of works referenced by this work
- Related works (count)
-
10Other works algorithmically related by OpenAlex
Full payload
| id | https://openalex.org/W4412736386 |
|---|---|
| doi | https://doi.org/10.51239/nrjss.v18i1.497 |
| ids.doi | https://doi.org/10.51239/nrjss.v18i1.497 |
| ids.openalex | https://openalex.org/W4412736386 |
| fwci | 0.0 |
| type | article |
| title | Impact of Cybersecurity Risks and Mitigation Strategies on Banking Industry |
| biblio.issue | 1 |
| biblio.volume | 18 |
| biblio.last_page | |
| biblio.first_page | |
| topics[0].id | https://openalex.org/T12519 |
| topics[0].field.id | https://openalex.org/fields/17 |
| topics[0].field.display_name | Computer Science |
| topics[0].score | 0.7174999713897705 |
| topics[0].domain.id | https://openalex.org/domains/3 |
| topics[0].domain.display_name | Physical Sciences |
| topics[0].subfield.id | https://openalex.org/subfields/1710 |
| topics[0].subfield.display_name | Information Systems |
| topics[0].display_name | Cybercrime and Law Enforcement Studies |
| topics[1].id | https://openalex.org/T13288 |
| topics[1].field.id | https://openalex.org/fields/11 |
| topics[1].field.display_name | Agricultural and Biological Sciences |
| topics[1].score | 0.7039999961853027 |
| topics[1].domain.id | https://openalex.org/domains/1 |
| topics[1].domain.display_name | Life Sciences |
| topics[1].subfield.id | https://openalex.org/subfields/1100 |
| topics[1].subfield.display_name | General Agricultural and Biological Sciences |
| topics[1].display_name | Banking, Crisis Management, COVID-19 Impact |
| topics[2].id | https://openalex.org/T10734 |
| topics[2].field.id | https://openalex.org/fields/17 |
| topics[2].field.display_name | Computer Science |
| topics[2].score | 0.6653000116348267 |
| topics[2].domain.id | https://openalex.org/domains/3 |
| topics[2].domain.display_name | Physical Sciences |
| topics[2].subfield.id | https://openalex.org/subfields/1710 |
| topics[2].subfield.display_name | Information Systems |
| topics[2].display_name | Information and Cyber Security |
| is_xpac | False |
| apc_list | |
| apc_paid | |
| concepts[0].id | https://openalex.org/C144133560 |
| concepts[0].level | 0 |
| concepts[0].score | 0.6804136633872986 |
| concepts[0].wikidata | https://www.wikidata.org/wiki/Q4830453 |
| concepts[0].display_name | Business |
| concepts[1].id | https://openalex.org/C38652104 |
| concepts[1].level | 1 |
| concepts[1].score | 0.6263585686683655 |
| concepts[1].wikidata | https://www.wikidata.org/wiki/Q3510521 |
| concepts[1].display_name | Computer security |
| concepts[2].id | https://openalex.org/C2986226071 |
| concepts[2].level | 2 |
| concepts[2].score | 0.5493589639663696 |
| concepts[2].wikidata | https://www.wikidata.org/wiki/Q22687 |
| concepts[2].display_name | Banking industry |
| concepts[3].id | https://openalex.org/C112930515 |
| concepts[3].level | 1 |
| concepts[3].score | 0.33700472116470337 |
| concepts[3].wikidata | https://www.wikidata.org/wiki/Q4389547 |
| concepts[3].display_name | Risk analysis (engineering) |
| concepts[4].id | https://openalex.org/C10138342 |
| concepts[4].level | 1 |
| concepts[4].score | 0.24884921312332153 |
| concepts[4].wikidata | https://www.wikidata.org/wiki/Q43015 |
| concepts[4].display_name | Finance |
| concepts[5].id | https://openalex.org/C41008148 |
| concepts[5].level | 0 |
| concepts[5].score | 0.227799654006958 |
| concepts[5].wikidata | https://www.wikidata.org/wiki/Q21198 |
| concepts[5].display_name | Computer science |
| keywords[0].id | https://openalex.org/keywords/business |
| keywords[0].score | 0.6804136633872986 |
| keywords[0].display_name | Business |
| keywords[1].id | https://openalex.org/keywords/computer-security |
| keywords[1].score | 0.6263585686683655 |
| keywords[1].display_name | Computer security |
| keywords[2].id | https://openalex.org/keywords/banking-industry |
| keywords[2].score | 0.5493589639663696 |
| keywords[2].display_name | Banking industry |
| keywords[3].id | https://openalex.org/keywords/risk-analysis |
| keywords[3].score | 0.33700472116470337 |
| keywords[3].display_name | Risk analysis (engineering) |
| keywords[4].id | https://openalex.org/keywords/finance |
| keywords[4].score | 0.24884921312332153 |
| keywords[4].display_name | Finance |
| keywords[5].id | https://openalex.org/keywords/computer-science |
| keywords[5].score | 0.227799654006958 |
| keywords[5].display_name | Computer science |
| language | en |
| locations[0].id | doi:10.51239/nrjss.v18i1.497 |
| locations[0].is_oa | True |
| locations[0].source.id | https://openalex.org/S4210212247 |
| locations[0].source.issn | 2219-4282, 2517-987X |
| locations[0].source.type | journal |
| locations[0].source.is_oa | True |
| locations[0].source.issn_l | 2219-4282 |
| locations[0].source.is_core | False |
| locations[0].source.is_in_doaj | False |
| locations[0].source.display_name | NICE Research Journal |
| locations[0].source.host_organization | |
| locations[0].source.host_organization_name | |
| locations[0].license | cc-by |
| locations[0].pdf_url | https://nicerjss.com/index.php/JFME/article/download/497/254 |
| locations[0].version | publishedVersion |
| locations[0].raw_type | journal-article |
| locations[0].license_id | https://openalex.org/licenses/cc-by |
| locations[0].is_accepted | True |
| locations[0].is_published | True |
| locations[0].raw_source_name | NICE Research Journal |
| locations[0].landing_page_url | https://doi.org/10.51239/nrjss.v18i1.497 |
| indexed_in | crossref |
| authorships[0].author.id | https://openalex.org/A5096198420 |
| authorships[0].author.orcid | |
| authorships[0].author.display_name | Hira |
| authorships[0].author_position | first |
| authorships[0].raw_author_name | None Hira |
| authorships[0].is_corresponding | False |
| authorships[1].author.id | https://openalex.org/A5023733791 |
| authorships[1].author.orcid | https://orcid.org/0000-0001-7231-5413 |
| authorships[1].author.display_name | Muhammad Hafeez |
| authorships[1].author_position | middle |
| authorships[1].raw_author_name | None Muhammad Hafeez |
| authorships[1].is_corresponding | False |
| authorships[2].author.id | https://openalex.org/A5119108879 |
| authorships[2].author.orcid | |
| authorships[2].author.display_name | Khadija Yasen |
| authorships[2].author_position | middle |
| authorships[2].raw_author_name | None Khadija Yasen |
| authorships[2].is_corresponding | False |
| authorships[3].author.id | https://openalex.org/A5070489469 |
| authorships[3].author.orcid | |
| authorships[3].author.display_name | Mirza Nasir Jahan Mehdi |
| authorships[3].author_position | last |
| authorships[3].raw_author_name | None Mirza Nasir Jahan Mehdi |
| authorships[3].is_corresponding | False |
| has_content.pdf | True |
| has_content.grobid_xml | True |
| is_paratext | False |
| open_access.is_oa | True |
| open_access.oa_url | https://nicerjss.com/index.php/JFME/article/download/497/254 |
| open_access.oa_status | diamond |
| open_access.any_repository_has_fulltext | False |
| created_date | 2025-10-10T00:00:00 |
| display_name | Impact of Cybersecurity Risks and Mitigation Strategies on Banking Industry |
| has_fulltext | True |
| is_retracted | False |
| updated_date | 2025-11-06T03:46:38.306776 |
| primary_topic.id | https://openalex.org/T12519 |
| primary_topic.field.id | https://openalex.org/fields/17 |
| primary_topic.field.display_name | Computer Science |
| primary_topic.score | 0.7174999713897705 |
| primary_topic.domain.id | https://openalex.org/domains/3 |
| primary_topic.domain.display_name | Physical Sciences |
| primary_topic.subfield.id | https://openalex.org/subfields/1710 |
| primary_topic.subfield.display_name | Information Systems |
| primary_topic.display_name | Cybercrime and Law Enforcement Studies |
| related_works | https://openalex.org/W4391375266, https://openalex.org/W2146119138, https://openalex.org/W4323341852, https://openalex.org/W2896677295, https://openalex.org/W2277088246, https://openalex.org/W2765153054, https://openalex.org/W2596173151, https://openalex.org/W2370325862, https://openalex.org/W3213789065, https://openalex.org/W2030256539 |
| cited_by_count | 0 |
| locations_count | 1 |
| best_oa_location.id | doi:10.51239/nrjss.v18i1.497 |
| best_oa_location.is_oa | True |
| best_oa_location.source.id | https://openalex.org/S4210212247 |
| best_oa_location.source.issn | 2219-4282, 2517-987X |
| best_oa_location.source.type | journal |
| best_oa_location.source.is_oa | True |
| best_oa_location.source.issn_l | 2219-4282 |
| best_oa_location.source.is_core | False |
| best_oa_location.source.is_in_doaj | False |
| best_oa_location.source.display_name | NICE Research Journal |
| best_oa_location.source.host_organization | |
| best_oa_location.source.host_organization_name | |
| best_oa_location.license | cc-by |
| best_oa_location.pdf_url | https://nicerjss.com/index.php/JFME/article/download/497/254 |
| best_oa_location.version | publishedVersion |
| best_oa_location.raw_type | journal-article |
| best_oa_location.license_id | https://openalex.org/licenses/cc-by |
| best_oa_location.is_accepted | True |
| best_oa_location.is_published | True |
| best_oa_location.raw_source_name | NICE Research Journal |
| best_oa_location.landing_page_url | https://doi.org/10.51239/nrjss.v18i1.497 |
| primary_location.id | doi:10.51239/nrjss.v18i1.497 |
| primary_location.is_oa | True |
| primary_location.source.id | https://openalex.org/S4210212247 |
| primary_location.source.issn | 2219-4282, 2517-987X |
| primary_location.source.type | journal |
| primary_location.source.is_oa | True |
| primary_location.source.issn_l | 2219-4282 |
| primary_location.source.is_core | False |
| primary_location.source.is_in_doaj | False |
| primary_location.source.display_name | NICE Research Journal |
| primary_location.source.host_organization | |
| primary_location.source.host_organization_name | |
| primary_location.license | cc-by |
| primary_location.pdf_url | https://nicerjss.com/index.php/JFME/article/download/497/254 |
| primary_location.version | publishedVersion |
| primary_location.raw_type | journal-article |
| primary_location.license_id | https://openalex.org/licenses/cc-by |
| primary_location.is_accepted | True |
| primary_location.is_published | True |
| primary_location.raw_source_name | NICE Research Journal |
| primary_location.landing_page_url | https://doi.org/10.51239/nrjss.v18i1.497 |
| publication_date | 2025-03-28 |
| publication_year | 2025 |
| referenced_works | https://openalex.org/W2949061199, https://openalex.org/W3036160355, https://openalex.org/W4248875017, https://openalex.org/W3211293792, https://openalex.org/W6843396402, https://openalex.org/W4386394337, https://openalex.org/W6810457062, https://openalex.org/W6763238779, https://openalex.org/W3208645013, https://openalex.org/W2540847105, https://openalex.org/W4390168184, https://openalex.org/W2979593716, https://openalex.org/W2061633881, https://openalex.org/W6832674467, https://openalex.org/W4396518738, https://openalex.org/W4390740543, https://openalex.org/W4401960510, https://openalex.org/W3207790014, https://openalex.org/W4312964932, https://openalex.org/W4415263137, https://openalex.org/W1995223184, https://openalex.org/W4313324894, https://openalex.org/W6780924185, https://openalex.org/W3157031996, https://openalex.org/W1998126428, https://openalex.org/W6648617168, https://openalex.org/W2157836216, https://openalex.org/W6783069166, https://openalex.org/W2052510545, https://openalex.org/W3018677429, https://openalex.org/W2995064528, https://openalex.org/W6613359506, https://openalex.org/W2783955785, https://openalex.org/W2098429208, https://openalex.org/W4296745516, https://openalex.org/W4385545996, https://openalex.org/W3000654272, https://openalex.org/W4390740554, https://openalex.org/W6774298837, https://openalex.org/W3005605371, https://openalex.org/W2889126761, https://openalex.org/W2406226188, https://openalex.org/W2742826378, https://openalex.org/W1507365153, https://openalex.org/W4313304595 |
| referenced_works_count | 45 |
| abstract_inverted_index.a | 37, 72, 134 |
| abstract_inverted_index.It | 21, 175 |
| abstract_inverted_index.as | 52 |
| abstract_inverted_index.by | 178 |
| abstract_inverted_index.in | 29, 44, 149, 165, 192 |
| abstract_inverted_index.it | 158 |
| abstract_inverted_index.of | 8, 39, 85, 119 |
| abstract_inverted_index.on | 12, 75, 169 |
| abstract_inverted_index.to | 4, 57, 128, 213, 217 |
| abstract_inverted_index.121 | 40 |
| abstract_inverted_index.The | 34, 199 |
| abstract_inverted_index.and | 17, 47, 54, 61, 79, 99, 105, 113, 142, 162, 172, 185, 210 |
| abstract_inverted_index.but | 81 |
| abstract_inverted_index.for | 204 |
| abstract_inverted_index.the | 6, 24, 83, 117, 202 |
| abstract_inverted_index.This | 1, 153 |
| abstract_inverted_index.also | 22 |
| abstract_inverted_index.bank | 42 |
| abstract_inverted_index.era. | 32 |
| abstract_inverted_index.have | 71, 133 |
| abstract_inverted_index.like | 93 |
| abstract_inverted_index.need | 203 |
| abstract_inverted_index.role | 148 |
| abstract_inverted_index.such | 51 |
| abstract_inverted_index.that | 68 |
| abstract_inverted_index.this | 30 |
| abstract_inverted_index.thus | 145 |
| abstract_inverted_index.uses | 36 |
| abstract_inverted_index.with | 121, 138, 167 |
| abstract_inverted_index.These | 89 |
| abstract_inverted_index.apply | 48 |
| abstract_inverted_index.areas | 191 |
| abstract_inverted_index.banks | 28 |
| abstract_inverted_index.build | 214 |
| abstract_inverted_index.cyber | 218 |
| abstract_inverted_index.drive | 82 |
| abstract_inverted_index.risks | 10, 26, 60, 70 |
| abstract_inverted_index.shows | 155 |
| abstract_inverted_index.study | 154, 200 |
| abstract_inverted_index.their | 62, 110, 147 |
| abstract_inverted_index.these | 59 |
| abstract_inverted_index.users | 43 |
| abstract_inverted_index.banks' | 13, 76 |
| abstract_inverted_index.banks, | 207 |
| abstract_inverted_index.bodies | 212 |
| abstract_inverted_index.degree | 118 |
| abstract_inverted_index.facing | 27 |
| abstract_inverted_index.firms, | 209 |
| abstract_inverted_index.impact | 7, 11, 74 |
| abstract_inverted_index.robust | 86 |
| abstract_inverted_index.sample | 38 |
| abstract_inverted_index.strong | 135 |
| abstract_inverted_index.trust, | 19, 144 |
| abstract_inverted_index.Despite | 109 |
| abstract_inverted_index.analyze | 58 |
| abstract_inverted_index.banking | 166, 195 |
| abstract_inverted_index.because | 157 |
| abstract_inverted_index.between | 206 |
| abstract_inverted_index.fintech | 208 |
| abstract_inverted_index.focuses | 3 |
| abstract_inverted_index.greater | 126 |
| abstract_inverted_index.include | 90 |
| abstract_inverted_index.novelty | 156 |
| abstract_inverted_index.private | 41 |
| abstract_inverted_index.regular | 106 |
| abstract_inverted_index.showing | 125 |
| abstract_inverted_index.threats | 161, 171 |
| abstract_inverted_index.Findings | 66 |
| abstract_inverted_index.Purpose: | 0 |
| abstract_inverted_index.Research | 197 |
| abstract_inverted_index.adoption | 84 |
| abstract_inverted_index.advanced | 91 |
| abstract_inverted_index.building | 150 |
| abstract_inverted_index.customer | 18, 143 |
| abstract_inverted_index.efforts. | 130 |
| abstract_inverted_index.emerging | 170 |
| abstract_inverted_index.emphasis | 168 |
| abstract_inverted_index.employee | 103 |
| abstract_inverted_index.enhanced | 139 |
| abstract_inverted_index.evaluate | 5 |
| abstract_inverted_index.examines | 159 |
| abstract_inverted_index.existing | 183 |
| abstract_inverted_index.findings | 177 |
| abstract_inverted_index.indicate | 67 |
| abstract_inverted_index.measures | 164 |
| abstract_inverted_index.methods, | 50 |
| abstract_inverted_index.negative | 73 |
| abstract_inverted_index.positive | 136 |
| abstract_inverted_index.presents | 176 |
| abstract_inverted_index.regional | 173 |
| abstract_inverted_index.research | 2, 35 |
| abstract_inverted_index.sectors. | 196 |
| abstract_inverted_index.success, | 120 |
| abstract_inverted_index.systems, | 98 |
| abstract_inverted_index.threats. | 219 |
| abstract_inverted_index.training | 104 |
| abstract_inverted_index.younger, | 122 |
| abstract_inverted_index.Pakistan, | 46 |
| abstract_inverted_index.alongside | 102 |
| abstract_inverted_index.analysis, | 56 |
| abstract_inverted_index.assessing | 182 |
| abstract_inverted_index.detection | 97 |
| abstract_inverted_index.examining | 179 |
| abstract_inverted_index.financial | 14, 77, 140 |
| abstract_inverted_index.influence | 116 |
| abstract_inverted_index.intrusion | 96 |
| abstract_inverted_index.responses | 216 |
| abstract_inverted_index.solutions | 188 |
| abstract_inverted_index.Mitigation | 131 |
| abstract_inverted_index.addressing | 189 |
| abstract_inverted_index.developing | 193 |
| abstract_inverted_index.economies' | 194 |
| abstract_inverted_index.firewalls, | 95 |
| abstract_inverted_index.highlights | 201 |
| abstract_inverted_index.identifies | 23 |
| abstract_inverted_index.integrated | 215 |
| abstract_inverted_index.mitigation | 63, 87, 129, 163 |
| abstract_inverted_index.particular | 180 |
| abstract_inverted_index.regression | 55 |
| abstract_inverted_index.regulatory | 211 |
| abstract_inverted_index.reputation | 80 |
| abstract_inverted_index.strategies | 132 |
| abstract_inverted_index.suggesting | 186 |
| abstract_inverted_index.tech-savvy | 123 |
| abstract_inverted_index.two-factor | 100 |
| abstract_inverted_index.variations | 115 |
| abstract_inverted_index.Faisalabad, | 45 |
| abstract_inverted_index.challenges. | 174 |
| abstract_inverted_index.correlation | 53, 137 |
| abstract_inverted_index.demographic | 112 |
| abstract_inverted_index.digitalized | 31 |
| abstract_inverted_index.encryption, | 94 |
| abstract_inverted_index.frameworks, | 184 |
| abstract_inverted_index.individuals | 124 |
| abstract_inverted_index.literature, | 181 |
| abstract_inverted_index.performance | 78, 141 |
| abstract_inverted_index.reputation, | 16 |
| abstract_inverted_index.resilience. | 151 |
| abstract_inverted_index.strategies. | 64, 88 |
| abstract_inverted_index.underlining | 146 |
| abstract_inverted_index.Originality: | 152 |
| abstract_inverted_index.assessments. | 108 |
| abstract_inverted_index.performance, | 15 |
| abstract_inverted_index.quantitative | 49 |
| abstract_inverted_index.technologies | 92 |
| abstract_inverted_index.Implications: | 198 |
| abstract_inverted_index.collaboration | 205 |
| abstract_inverted_index.cybersecurity | 9, 25, 69, 160 |
| abstract_inverted_index.respectively. | 20 |
| abstract_inverted_index.technological | 114 |
| abstract_inverted_index.vulnerability | 107 |
| abstract_inverted_index.effectiveness, | 111 |
| abstract_inverted_index.responsiveness | 127 |
| abstract_inverted_index.authentication, | 101 |
| abstract_inverted_index.context-specific | 187 |
| abstract_inverted_index.under-researched | 190 |
| abstract_inverted_index.Findings/Results: | 65 |
| abstract_inverted_index.Design/Method/Approach: | 33 |
| cited_by_percentile_year | |
| countries_distinct_count | 0 |
| institutions_distinct_count | 4 |
| citation_normalized_percentile.value | 0.4110655 |
| citation_normalized_percentile.is_in_top_1_percent | False |
| citation_normalized_percentile.is_in_top_10_percent | True |