In practice, there is a massive time lag between data loss and its cause identification. The existing techniques perform it comprehensively, but they consume too much time, so there is a need for fast and reliable methods. The article’s purpose is to develop a rapid methodology to assess the risk of information and knowledge loss management. It provides the implementation of eight steps and combines a risk mapping method modified by assessments based on risk factors and incidents as elements from set theory and using formalization via binary estimates. The methodology includes five significant events caused by the company staff, technical problems, software, cybercriminals, viral attacks, and 66 factors influencing company incidents. As a result, a risk map of 9 groups was built for a Ukrainian enterprise. Only two groups with the minimum number of incidents and low losses are represented by all five incidents. The defined overall level of each risk group ranges from 0.14 to 0.26, which indicates a low probability of all happenings in the group. In general, the resulting map shows the existence of specific security problems of the company under investigation. The proposed assessment allows us to interpret the level of risk in the company quickly, identify weaknesses in the information security system, and predict future losses.
The article deals with the prototyping of an information system for intrabank monitoring of transactions related to money laundering. It has been proven that the automation of financial monitoring system would increase the bank’s efficiency due to examining all bank transactions without exception, leveling the human factor, maximizing the speed of identifying suspicious transactions, which will provide the bank management with the possibility to reduce reputational risk and minimize losses related to paying penalties imposed by regulatory agencies. It has been established that the prototype of the information system for monitoring transactions related to money laundering through banks should consist of a model of the business process monitoring in an automated system environment, a DFD model of automated monitoring of banking transactions, a structural database model, user interface forms and the logic of validation business rules. The resulting methodological and practical developments are a universal component of the financial monitoring system of any bank since they have the opportunity to transform and adapt to new standards for reporting entities or differentiation of the business processes of a bank.
The article uses the estimation method of the center of mass to model the country's health profile as an indicator for determining the prerequisites for the country's readiness to combat and prevent mass diseases. The authors identified the most relevant determinants that characterized society's social, economic, healthcare, and behavioral models. They formed a sequence of health profiles in the form of a four-pole barycentric model of balanced, composite dimensions. It was found that developed countries dominate according to the integrated value of the four dimensions. It indicates their significant economic, social, and medical opportunities for the population. According to the balance of dimension pairs, behavioral determinants influence the imbalance for developed countries, the health care determinants -for new industrial states. The pair of socio-economic development is the most critical for developing and the least developed countries. According to the resilience level, such countries as Ireland,
A current task is to provide the economic security of any country in the context of creating effective and reliable measures of the banking cybersecurity system against money laundering. First of all, it relates to the fact that the money laundering processes and financing of terrorism negatively influence the economy of any country and reduce the economic security level. Secondly, the high level of money laundering in the country promotes the emergence of such negative processes as corruption, extortion, drug production, people smuggling, gangsterism, terrorism, which leads to an increase of the crime situation in the country and endangers the lives of the population. Thirdly, the existing cybersecurity measures of banks do not affect the security of transactions in a timely manner to identify funds obtained illegally. Therefore, exactly this aspect is required changes and modernization in order to accomplish the task. The aim of the article is to develop the innovative scientific and methodic approach to the country’s attractiveness modelling for proceeds laundering by other countries. This technique is one of the tools of the bank’s cybersecurity system for making further decisions regarding the risk of legalization. In order to solve this problem authors suggest the approach, which is based on gravity modelling. Eight factors: Gross Domestic Product per capita, Claims on the central government, Internally displaced persons, associated with conflict and violence; Automatic Exchange of Information; Corruption Perceptions Index; Global Terrorism Index; Legatum Prosperity Index; Happy Planet Index are proposed to be evaluated using the expert approach to implement the above approach. Then the integral indicator is calculated using the Minkowski metric and taking into account the factors normalization. Using the gravity model, the country’s attractiveness degree considering is defined for proceeds laundering on the part of another country. Data for 105 countries are used for calculation and results for Ukraine, Poland and Germany are represented. As a result, we can see that developed countries with high welfare level are attractive for developing countries for money laundering, countries with low welfare level, low economic development and unstable political situation are attractive for the developed countries. The proposed methodology is recommended to be introduced in the activity of banks' cybersecurity systems. It will allow identifying transactions of those countries for which the risk of legalization is high and introduce additional monitoring to regard the legitimacy of their financial sources. In addition, it is expedient to use the model in the activities of the country’s regulatory authorities, which will promote the introduction of cybersecurity standards and increase the ethics of financial relations between countries. Keywords: cybersecurity, money laundering, gravity modelling, country attractiveness, risk, expert approach, normalization, Minkowski metric.
An effective strategy for managing the national information security with capabilities to resist information threats significantly impacts its further development. This study aims to assess the level of threat to the information security of countries based on the integral index. It is proposed to use five indicators characterizing individual areas of information security and 37 world development indicators, selected from the World Bank database. Correlation analysis selected 12 out of 37 development indicators relevant to security indicators for which the correlation coefficient exceeded 0.5 or –0.5. The Harrington-Mencher function is proposed to determine the information security threat index. Nonlinear normalization was carried out to bring the initial data to a comparable measurement. Canonical analysis was performed to determine the indicator weights. The data from 159 countries were taken for 2018 to assess the index. The result was presented on the map showing countries’ distribution by the information security threat index, thus forming five groups. The group with a “very well” resistance to threats includes economically developed countries with a high level of information security. The “well” group was formed by new industrial and developing countries with economic potential sufficient to prevent information threats and combat their consequences. The information security level in developing countries, where the results of overcoming information threats will affect the economic sphere, is defined as “acceptable”. Countries with a low level of development and information security formed groups designated as “bad” and “very bad”, which indicates a high level of threats to their information security. AcknowledgmentThis work is carried out with in the tax payer – funded researches: No. 0118U003574 “Cybersecurity in the banking fraud enforcement: protection of financial service consumers and the financial and economic security growth in Ukraine”.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
hi@scite.ai
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.