{"id":"https://openalex.org/W4411886140","doi":"https://doi.org/10.54364/aaiml.2025.52226","title":"Mitigating Cyberfraud in Financial Institutions: A Deep Learning Approach using the South African Banking Industry as a Case Study","display_name":"Mitigating Cyberfraud in Financial Institutions: A Deep Learning Approach using the South African Banking Industry as a Case Study","publication_year":2025,"publication_date":"2025-01-01","ids":{"openalex":"https://openalex.org/W4411886140","doi":"https://doi.org/10.54364/aaiml.2025.52226"},"language":"en","primary_location":{"id":"doi:10.54364/aaiml.2025.52226","is_oa":true,"landing_page_url":"https://doi.org/10.54364/aaiml.2025.52226","pdf_url":"https://doi.org/10.54364/aaiml.2025.52226","source":{"id":"https://openalex.org/S4210238872","display_name":"Advances in Artificial Intelligence and Machine Learning","issn_l":"2582-9793","issn":["2582-9793"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Advances in Artificial Intelligence and Machine Learning","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"bronze","oa_url":"https://doi.org/10.54364/aaiml.2025.52226","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5038802872","display_name":"Oluwatoyin Esther Akinbowale","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Oluwatoyin Esther Akinbowale","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5058498926","display_name":"Mulatu Fekadu Zerihun","orcid":"https://orcid.org/0000-0003-4797-928X"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Mulatu Fekadu Zerihun","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5060749431","display_name":"Polly Mashigo","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Polly Mashigo","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5038802872"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":2.9699,"has_fulltext":true,"cited_by_count":1,"citation_normalized_percentile":{"value":0.91452861,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":98},"biblio":{"volume":"05","issue":"02","first_page":"4004","last_page":"4033"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12519","display_name":"Cybercrime and Law Enforcement Studies","score":0.9897000193595886,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12519","display_name":"Cybercrime and Law Enforcement Studies","score":0.9897000193595886,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11995","display_name":"FinTech, Crowdfunding, Digital Finance","score":0.9887999892234802,"subfield":{"id":"https://openalex.org/subfields/1404","display_name":"Management Information Systems"},"field":{"id":"https://openalex.org/fields/14","display_name":"Business, Management and Accounting"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T11838","display_name":"Crime, Illicit Activities, and Governance","score":0.9442999958992004,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/banking-industry","display_name":"Banking industry","score":0.6301480531692505},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.5852907299995422},{"id":"https://openalex.org/keywords/financial-services","display_name":"Financial services","score":0.46626290678977966},{"id":"https://openalex.org/keywords/finance","display_name":"Finance","score":0.35719892382621765},{"id":"https://openalex.org/keywords/financial-system","display_name":"Financial system","score":0.3459206819534302}],"concepts":[{"id":"https://openalex.org/C2986226071","wikidata":"https://www.wikidata.org/wiki/Q22687","display_name":"Banking industry","level":2,"score":0.6301480531692505},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.5852907299995422},{"id":"https://openalex.org/C139043278","wikidata":"https://www.wikidata.org/wiki/Q837171","display_name":"Financial services","level":2,"score":0.46626290678977966},{"id":"https://openalex.org/C10138342","wikidata":"https://www.wikidata.org/wiki/Q43015","display_name":"Finance","level":1,"score":0.35719892382621765},{"id":"https://openalex.org/C73283319","wikidata":"https://www.wikidata.org/wiki/Q1416617","display_name":"Financial system","level":1,"score":0.3459206819534302}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.54364/aaiml.2025.52226","is_oa":true,"landing_page_url":"https://doi.org/10.54364/aaiml.2025.52226","pdf_url":"https://doi.org/10.54364/aaiml.2025.52226","source":{"id":"https://openalex.org/S4210238872","display_name":"Advances in Artificial Intelligence and Machine Learning","issn_l":"2582-9793","issn":["2582-9793"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Advances in Artificial Intelligence and Machine Learning","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.54364/aaiml.2025.52226","is_oa":true,"landing_page_url":"https://doi.org/10.54364/aaiml.2025.52226","pdf_url":"https://doi.org/10.54364/aaiml.2025.52226","source":{"id":"https://openalex.org/S4210238872","display_name":"Advances in Artificial Intelligence and Machine Learning","issn_l":"2582-9793","issn":["2582-9793"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Advances in Artificial Intelligence and Machine Learning","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4411886140.pdf","grobid_xml":"https://content.openalex.org/works/W4411886140.grobid-xml"},"referenced_works_count":20,"referenced_works":["https://openalex.org/W375930406","https://openalex.org/W1964629294","https://openalex.org/W2181432589","https://openalex.org/W2791879367","https://openalex.org/W2795025732","https://openalex.org/W2805595195","https://openalex.org/W2885012953","https://openalex.org/W2892035503","https://openalex.org/W3039145092","https://openalex.org/W3149325062","https://openalex.org/W4295539309","https://openalex.org/W4295788744","https://openalex.org/W4312388400","https://openalex.org/W4317566450","https://openalex.org/W4318571163","https://openalex.org/W4390483481","https://openalex.org/W4392619921","https://openalex.org/W4402194596","https://openalex.org/W6736608170","https://openalex.org/W6748090580"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2974491469","https://openalex.org/W2146119138","https://openalex.org/W3123546991","https://openalex.org/W2277088246","https://openalex.org/W2765153054","https://openalex.org/W3215669459","https://openalex.org/W3083838184","https://openalex.org/W2759798861","https://openalex.org/W602052006"],"abstract_inverted_index":{"Cyberfraud":[0],"is":[1,15,216],"a":[2,39],"major":[3],"threat":[4],"to":[5,225],"the":[6,33,50,61,66,75,84,97,104,111,113,122,132,139,155,182,185,191,197,242],"banking":[7],"and":[8,12,28,60,74,136,146,164,180,199,205,223],"financial":[9,36,243],"institutions":[10,37],"globally":[11],"South":[13,34,51,192],"Africa":[14],"not":[16],"an":[17,117,126,232],"exemption.":[18],"The":[19,151,171,194],"deep":[20],"learning":[21],"(DL)":[22],"technique":[23],"for":[24,92,103,161,202,238],"cyberfraud":[25,203,210,228],"incidence":[26,94],"classification":[27,95,141,163,204],"time":[29,98,165,206],"series":[30,99,166,207],"prediction":[31,106,208],"using":[32],"African":[35,52],"as":[38],"case":[40],"study":[41,175,215,219],"was":[42,58,63,90,101],"demonstrated":[43,212],"in":[44,190,213,241],"this":[45,174,214],"study.":[46],"Secondary":[47],"data":[48,62],"from":[49],"Banking":[53],"Risk":[54],"Information":[55],"Centre":[56],"(SABRIC)":[57],"employed":[59,91],"trained":[64],"under":[65],"DL":[67,156],"paradigms":[68],"of":[69,107,119,129,138,168,173,187,196,209],"Convolutional":[70],"Neural":[71],"Network":[72],"(CNN)":[73],"Long":[76],"Short-Term":[77],"Memory":[78],"(LSTM)":[79],"model.":[80],"For":[81],"both":[82],"models,":[83],"adaptive":[85],"moment":[86],"estimation":[87],"(ADAM)":[88],"algorithm":[89],"fraud":[93,108,162,169,189],"while":[96],"model":[100,115,124,142,157],"used":[102],"future":[105],"incidences.":[109,170],"On":[110],"overall,":[112],"LSTM":[114,140,200],"with":[116,125],"accuracy":[118,128],"96.80%":[120],"outperformed":[121],"CNN":[123,198],"overall":[127],"96.17%.":[130],"Moreover,":[131],"accuracy,":[133],"precision,":[134],"recall":[135],"F1-score":[137],"namely":[143],"72.14%,":[144],"87.43%":[145],"77.31%":[147],"respectively":[148],"exceeded":[149],"70%.":[150],"results":[152],"show":[153],"that":[154],"can":[158],"be":[159],"deployed":[160],"analysis":[167],"outcome":[172],"may":[176],"promote":[177],"cyber":[178],"resilience":[179],"sustain":[181],"fight":[183],"against":[184],"perpetration":[186],"cyber-related":[188],"Africa.":[193],"use":[195],"models":[201],"incidences":[211],"unique.":[217],"This":[218],"contributes":[220],"conceptually,":[221],"theoretically":[222],"empirical":[224],"knowledge":[226],"on":[227],"mitigation.":[229],"It":[230],"proposes":[231],"artificial":[233],"intelligence":[234],"based":[235],"conceptual":[236],"framework":[237],"reinforcing":[239],"cybersecurity":[240],"institution.":[244]},"counts_by_year":[{"year":2026,"cited_by_count":1}],"updated_date":"2026-04-18T07:56:08.524223","created_date":"2025-10-10T00:00:00"}
