{"id":"https://openalex.org/W4410225732","doi":"https://doi.org/10.1007/s42786-025-00056-3","title":"An integrated cyber security risk management framework for online banking systems","display_name":"An integrated cyber security risk management framework for online banking systems","publication_year":2025,"publication_date":"2025-04-01","ids":{"openalex":"https://openalex.org/W4410225732","doi":"https://doi.org/10.1007/s42786-025-00056-3"},"language":"en","primary_location":{"id":"doi:10.1007/s42786-025-00056-3","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s42786-025-00056-3","pdf_url":"https://link.springer.com/content/pdf/10.1007/s42786-025-00056-3.pdf","source":{"id":"https://openalex.org/S4210177615","display_name":"Journal of Banking and Financial Technology","issn_l":"2524-7956","issn":["2524-7956","2524-7964"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Banking and Financial Technology","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://link.springer.com/content/pdf/10.1007/s42786-025-00056-3.pdf","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5117489855","display_name":"Yiu Ting Yan Azura","orcid":null},"institutions":[{"id":"https://openalex.org/I39555362","display_name":"University of Warwick","ror":"https://ror.org/01a77tt86","country_code":"GB","type":"education","lineage":["https://openalex.org/I39555362"]}],"countries":["GB"],"is_corresponding":true,"raw_author_name":"Yiu Ting Yan Azura","raw_affiliation_strings":["WMG, University of Warwick, Coventry, UK"],"affiliations":[{"raw_affiliation_string":"WMG, University of Warwick, Coventry, UK","institution_ids":["https://openalex.org/I39555362"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5072773792","display_name":"Muhammad Ajmal Azad","orcid":"https://orcid.org/0000-0003-1707-018X"},"institutions":[{"id":"https://openalex.org/I12870472","display_name":"Birmingham City University","ror":"https://ror.org/00t67pt25","country_code":"GB","type":"education","lineage":["https://openalex.org/I12870472"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Muhammad Ajmal Azad","raw_affiliation_strings":["School of Computer Science, Birmingham City University, Birmingham, UK"],"affiliations":[{"raw_affiliation_string":"School of Computer Science, Birmingham City University, Birmingham, UK","institution_ids":["https://openalex.org/I12870472"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5022300884","display_name":"Yussuf Ahmed","orcid":"https://orcid.org/0000-0003-4079-9243"},"institutions":[{"id":"https://openalex.org/I12870472","display_name":"Birmingham City University","ror":"https://ror.org/00t67pt25","country_code":"GB","type":"education","lineage":["https://openalex.org/I12870472"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Yussuf Ahmed","raw_affiliation_strings":["School of Computer Science, Birmingham City University, Birmingham, UK"],"affiliations":[{"raw_affiliation_string":"School of Computer Science, Birmingham City University, Birmingham, UK","institution_ids":["https://openalex.org/I12870472"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5117489855"],"corresponding_institution_ids":["https://openalex.org/I39555362"],"apc_list":{"value":2390,"currency":"EUR","value_usd":2990},"apc_paid":{"value":2390,"currency":"EUR","value_usd":2990},"fwci":9.7524,"has_fulltext":true,"cited_by_count":3,"citation_normalized_percentile":{"value":0.97536949,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":95,"max":99},"biblio":{"volume":"9","issue":"1","first_page":"85","last_page":"104"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9961000084877014,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9961000084877014,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12519","display_name":"Cybercrime and Law Enforcement Studies","score":0.9891999959945679,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9764000177383423,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.6247979998588562},{"id":"https://openalex.org/keywords/risk-management","display_name":"Risk management","score":0.6035223007202148},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.49168306589126587},{"id":"https://openalex.org/keywords/risk-analysis","display_name":"Risk analysis (engineering)","score":0.43752166628837585},{"id":"https://openalex.org/keywords/risk-management-framework","display_name":"Risk management framework","score":0.42419371008872986},{"id":"https://openalex.org/keywords/process-management","display_name":"Process management","score":0.3612333834171295},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.32391828298568726},{"id":"https://openalex.org/keywords/it-risk-management","display_name":"IT risk management","score":0.21004828810691833},{"id":"https://openalex.org/keywords/finance","display_name":"Finance","score":0.20583444833755493}],"concepts":[{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.6247979998588562},{"id":"https://openalex.org/C32896092","wikidata":"https://www.wikidata.org/wiki/Q189447","display_name":"Risk management","level":2,"score":0.6035223007202148},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.49168306589126587},{"id":"https://openalex.org/C112930515","wikidata":"https://www.wikidata.org/wiki/Q4389547","display_name":"Risk analysis (engineering)","level":1,"score":0.43752166628837585},{"id":"https://openalex.org/C164403151","wikidata":"https://www.wikidata.org/wiki/Q7336280","display_name":"Risk management framework","level":4,"score":0.42419371008872986},{"id":"https://openalex.org/C195094911","wikidata":"https://www.wikidata.org/wiki/Q14167904","display_name":"Process management","level":1,"score":0.3612333834171295},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.32391828298568726},{"id":"https://openalex.org/C95609273","wikidata":"https://www.wikidata.org/wiki/Q5975208","display_name":"IT risk management","level":3,"score":0.21004828810691833},{"id":"https://openalex.org/C10138342","wikidata":"https://www.wikidata.org/wiki/Q43015","display_name":"Finance","level":1,"score":0.20583444833755493}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1007/s42786-025-00056-3","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s42786-025-00056-3","pdf_url":"https://link.springer.com/content/pdf/10.1007/s42786-025-00056-3.pdf","source":{"id":"https://openalex.org/S4210177615","display_name":"Journal of Banking and Financial Technology","issn_l":"2524-7956","issn":["2524-7956","2524-7964"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Banking and Financial Technology","raw_type":"journal-article"},{"id":"pmh:oai:www.open-access.bcu.ac.uk:16609","is_oa":false,"landing_page_url":null,"pdf_url":null,"source":{"id":"https://openalex.org/S4306402654","display_name":"BCU Open Access Repository (Birmingham City University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I12870472","host_organization_name":"Birmingham City University","host_organization_lineage":["https://openalex.org/I12870472"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"acceptedVersion","is_accepted":true,"is_published":false,"raw_source_name":null,"raw_type":"PeerReviewed"}],"best_oa_location":{"id":"doi:10.1007/s42786-025-00056-3","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s42786-025-00056-3","pdf_url":"https://link.springer.com/content/pdf/10.1007/s42786-025-00056-3.pdf","source":{"id":"https://openalex.org/S4210177615","display_name":"Journal of Banking and Financial Technology","issn_l":"2524-7956","issn":["2524-7956","2524-7964"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Banking and Financial Technology","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4410225732.pdf","grobid_xml":"https://content.openalex.org/works/W4410225732.grobid-xml"},"referenced_works_count":38,"referenced_works":["https://openalex.org/W1970174926","https://openalex.org/W1981781071","https://openalex.org/W2036793118","https://openalex.org/W2111329890","https://openalex.org/W2146906033","https://openalex.org/W2313982364","https://openalex.org/W2344653555","https://openalex.org/W2345083219","https://openalex.org/W2465349901","https://openalex.org/W2558492397","https://openalex.org/W2560043100","https://openalex.org/W2562138109","https://openalex.org/W2736010881","https://openalex.org/W2751179444","https://openalex.org/W2786119514","https://openalex.org/W2802889547","https://openalex.org/W2804907561","https://openalex.org/W2806017315","https://openalex.org/W2806435942","https://openalex.org/W2883964862","https://openalex.org/W2889995182","https://openalex.org/W2898616759","https://openalex.org/W2918821272","https://openalex.org/W2937854226","https://openalex.org/W2944206133","https://openalex.org/W2975396850","https://openalex.org/W2979593716","https://openalex.org/W3023061545","https://openalex.org/W3030350644","https://openalex.org/W3034298130","https://openalex.org/W3090910431","https://openalex.org/W3093394823","https://openalex.org/W3107060092","https://openalex.org/W3110651907","https://openalex.org/W3136050648","https://openalex.org/W3137481732","https://openalex.org/W4200566240","https://openalex.org/W4246381838"],"related_works":["https://openalex.org/W2114208415","https://openalex.org/W2369233745","https://openalex.org/W2313821829","https://openalex.org/W2125534874","https://openalex.org/W1923764247","https://openalex.org/W2611614597","https://openalex.org/W2619501344","https://openalex.org/W4386500624","https://openalex.org/W2899303483","https://openalex.org/W2246096879"],"abstract_inverted_index":{"Abstract":[0],"Online":[1],"banking":[2,89,108,129,196],"systems":[3,26,39],"have":[4],"become":[5],"an":[6,94],"integral":[7],"part":[8],"of":[9,54,72,206],"our":[10],"daily":[11],"lives,":[12],"offering":[13],"access":[14],"to":[15,43,68,79,127,174,186,212],"financial":[16,56],"services":[17],"through":[18],"Internet":[19],"technologies":[20,216],"and":[21,35,60,74,84,101,118,133,143,150,178,203,209,217],"applications,":[22],"however,":[23],"as":[24],"these":[25],"grow":[27],"in":[28,50,194],"prevalence,":[29],"they":[30],"also":[31],"introduce":[32],"significant":[33,61],"security":[34,71,83,124,202],"privacy":[36,85,204],"challenges.":[37],"These":[38],"can":[40,48],"be":[41],"exposed":[42],"various":[44],"cybersecurity":[45,167],"threats":[46,177],"that":[47],"result":[49],"data":[51],"breaches,":[52],"compromise":[53],"sensitive":[55],"information,":[57],"reputational":[58],"damage,":[59],"operational":[62],"disruptions.":[63],"The":[64,110,163,180,198],"existing":[65,215],"model":[66],"designed":[67,105],"ensure":[69],"the":[70,81,128,137,140,161,170,201],"consumers":[73],"service":[75],"providers":[76],"often":[77],"fails":[78],"address":[80,175],"unique":[82],"challenges":[86,205],"posed":[87],"by":[88],"environments.":[90],"This":[91],"paper":[92],"proposes":[93],"integrated":[95],"management":[96,116],"framework":[97,111],"based":[98],"on":[99],"threat":[100,131,141],"risk":[102,115],"models,":[103],"specifically":[104],"for":[106,190],"online":[107,195],"systems.":[109,197],"incorporates":[112],"a":[113],"comprehensive":[114],"process":[117,165],"systematic":[119],"assessment":[120,164],"techniques":[121],"while":[122,159],"considering":[123,160],"features":[125],"attributed":[126],"environment,":[130],"landscapes,":[132],"accessible":[134],"information":[135],"within":[136],"banking.":[138],"During":[139],"identification":[142],"vulnerability":[144],"analysis":[145],"phases,":[146],"potential":[147,189],"attack":[148],"scenarios":[149],"their":[151],"possible":[152],"impacts":[153],"are":[154],"evaluated":[155,185],"using":[156],"pre-defined":[157],"procedures":[158],"context.":[162],"quantifies":[166],"risks,":[168],"facilitating":[169],"appropriate":[171],"mitigation":[172],"strategies":[173],"identified":[176],"risks.":[179],"framework\u2019s":[181],"applicability":[182],"has":[183],"been":[184],"determine":[187],"its":[188,210],"effective":[191],"real-world":[192],"implementation":[193],"evaluation":[199],"addressed":[200],"digital":[207],"banking,":[208],"ability":[211],"integrate":[213],"with":[214],"regulatory":[218],"requirements.":[219]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":2}],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
