INTERNET FINANCIAL CRIME SECURITY PREVENTION AND CRIMINAL LAW REGULATION OPTIMIZATION PATH

Main Article Content

MAO XINXIN, HANNA AMBARAS KHAN, SUHAIMI AB RAHMAN

Abstract

Since the advent of the Internet, Internet and finance are becoming more and more closely integrated. In 2014, the banking industry paid around $65 billion in regulatory penalties, with misbehavior and anti-financial crime failures acting as key prosecution justifications. Many financial institutions are finding that it is difficult to properly handle growing requirements with their current processes and infrastructure, leading to significant increases in associated operational expenses. Recent improvements in data analytics, which allow a speedier analysis of larger, more thorough, and more diversified data sets, appear to have the potential to ease some of the key pain points in this context. This paper investigates the rise of Big Data in this sector, concentrating on use cases where advanced analytics is presently being applied, as well as its long-term potential.

Article Details

Section
Criminal Law
Author Biography

MAO XINXIN, HANNA AMBARAS KHAN, SUHAIMI AB RAHMAN

1MAO XINXIN, 2HANNA AMBARAS KHAN, 3SUHAIMI AB RAHMAN

1School of Business and Economics, Universiti Putra Malaysia, Jalan Universiti 1, 43400 Serdang, Selangor, Malaysia.

2Senior Lecturer, School of Business and Economics, Universiti Putra Malaysia, Jalan Universiti 1, 43400 Serdang, Selangor, Malaysia.

3Associate Professor, Department of Management and Marketing, Faculty of Economics and Management, Universiti Putra Malaysia, Jalan Universiti 1, 43400 Serdang, Selangor, Malaysia.

 

References

ACLU (American Civil Liberties Union) (2016) Statement of Concern About Predictive Policing by ACLU and 16 Civil Rights Privacy, Racial Justice, and Technology Organizations, 31 August. URL (accessed 4 September 2019): https://www.aclu.org/other/statement-concern-about-predictive-policing-aclu-and-16-civil-rights-privacy-racial-justice.

Perakslis ED. Cybersecurity in health care. N Engl J Med. 2014 Jul 31;371(5):395–7. doi: 10.1056/NEJMp1404358.

Claunch D, McMillan M. Determining the right level for your IT security investment. Healthc Financ Manage. 2013 May;67(5):100–3.

Cyber Security Ventures, (2018). https://cybersecurityventures.com/hackerpocalypsecybercrime-report-2016/.

Global Cybersecurity Index 2017, (2017). International Telecommunication Union (ITU), https://www.itu.int/dms_pub/itu-d/opb/str/D-STR-GCI.01-2017-PDF-E.pdf.

Aimee O'Driscoll (October 2, 2018), 100+ Terrifying Cybercrime and Cybersecurity Statistics & Trends [2018 EDITION], https://www.comparitech.com/vpn/cybersecurity-cybercrime-statistics-facts-trends/#Global.

Kruse C, Frederick B, Jacobson T, Monticone D. Cybersecurity in healthcare: a systematic review of modern threats and trends. Technol Health Care. 2017;25(1):1–10.

Riazul Islam SM, Daehan K, Humaun Kabir M, Hossain M, Kyung-Sup K. The internet of things for health care: a comprehensive survey. IEEE Access. 2015;3:678–708.

Brookman J. Protecting privacy in an era of weakening regulation. Harv Law Policy Rev. 2015;9:355–74.

Angst CE, Block Es, D’Arcy J, Kelley K. When do IT security investments matter? accounting for the influence of institutional factors in the context of healthcare data breaches. MISQ. 2017 Mar 3;41(3):893–916.

Namoğlu N, Ulgen Y. Network security vulnerabilities and personal privacy issues in Healthcare Information Systems: a case study in a private hospital in Turkey. Stud Health Technol Inform. 2013;190:126–8. [PubMed] [Google Scholar]

Zarei J, Sadoughi F. Information security risk management for computerized health information systems in hospitals: a case study of Iran. Risk Manag Healthc Policy. 2016;9:75–85. doi: 10.2147/RMHP.S99908. doi: 10.2147/RMHP.S99908.

Laabes EP, Nyango DD, Ayedima MM, Ladep NG. Physician use of updated anti-virus software in a tertiary Nigerian hospital. Niger J Med. 2010;19(3):289–94.

Humaidi N, Balakrishnan V. Indirect effect of management support on users' compliance behaviour towards information security policies. Health Inf Manag. 2018 Jan;47(1):17–27.

Sittig DF, Singh H. A socio-technical approach to preventing, mitigating, and recovering from ransomware attacks. Appl Clin Inform. 2016;7(2):624–32.

Jalali M, Siegel M, Madnick S. Arxiv. 2017. [2018-05-07]. Decision making and biases in cybersecurity capability development: evidence from a simulation game experiment https://arxiv.org/abs/1707.01031 webcite.

Jalali M, Kaiser J, Siegel M, Madnick S. SSRN. 2017. [2018-05-07]. The internet of things (IoT) promises new benefits—and risks: a systematic analysis of adoption dynamics of IoT products https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3022111 webcite.

Jalali M, Rahmandad H, Bullock S, Ammerman A. Dynamics of implementation and maintenance of organizational health interventions. IJERPH. 2017 Aug 15;14(8):917. doi: 10.3390/ijerph14080917.

Jarrett MP. Cybersecurity—a serious patient care concern. JAMA. 2017 Oct 10;318(14):1319.

Angwin J, Larson J, Mattu S, Kirchner L (2016) Machine bias: There’s software used across the country to predict future criminals. And it’s biased against blacks. ProPublica, 23 May. URL (accessed 4 September 2019): https://www.propublica.org/article/machine-bias-risk-assessments-in-criminal-sentencing.

Barabas C, Dinakar K, Ito J, Virza M, Zittrain J (2017) Interventions over predictions: Reframing the ethical debate for actuarial risk assessment. Cornell University. arXiv:1712.08238 [cs, stat].

Birkhold MH (2018) Why do so many judges cite Jane Austen in legal decisions? Electric Literature, 24 April.

Brkan M (2017) Do algorithms rule the world? Algorithmic decision-making in the framework of the GDPR and beyond. SSRN Scholarly Paper, 1 August

Courtland R (2018) Bias detectives: The researchers striving to make algorithms fair. Nature 558(7710): 357–360.

Ferguson AG (2017) The Rise of Big Data Policing: Surveillance, Race, and the Future of Law Enforcement. New York: NYU Press.