National macrofinancial stability in the context of cyber threats
Abstract
This article addresses the critical issue of ensuring state macrofinancial stability in the face of growing cyber threats. Financial market stability forms the foundation of any country’s economic development and prosperity, as it ensures efficient capital movement, reduces uncertainty, and promotes investment growth. However, this stability is vulnerable to various external and internal threats, particularly cyber risks, which can significantly disrupt financial institutions’ operations and even cause serious economic turmoil. The author emphasizes the critical importance of this issue in the era of digital economic transformation, where financial systems become increasingly vulnerable to potentially catastrophic consequences of cyberattacks. The article analyzes the main channels through which cyber incidents impact financial stability, including payment system disruptions, loss of investor and consumer confidence, and critical service failures due to the interconnectedness of financial institutions. Special attention is paid to cyber readiness challenges in developing countries, which often lack sufficient resources and experience to effectively counter digital threats. The author emphasizes the necessity of developing and implementing comprehensive national cybersecurity strategies that would define clear objectives, priorities, and mechanisms for protecting financial infrastructure. These strategies should be based on global best practices and encompass a wide range of measures: from establishing an effective regulatory framework to investing in human capital development. The article also emphasizes the importance of enhancing international cooperation to strengthen cyber resilience, considering the cross-border nature of digital threats. In this context, the key role of global institutions, such as the International Monetary Fund, in providing technical assistance to countries, conducting training, and developing universal cyber risk assessment tools is noted. Overall, the article contributes to the study of financial sector cybersecurity issues and offers the author’s vision for addressing them at both national and international levels.
Downloads
References
Basiuk, O. (2023). Recommendations for the implementation of distributed ledger technologies (blockchain) in the public sector of Ukraine based on world experience. Pressing Problems of Public Administration, 1(62), 131–154. DOI: https://doi.org/10.26565/1684-8489-2023-1-08 [in Ukrainian].
Zhyvylo, Ye., & Zhyvylo, I. (2021). [United training of personnel of the components of the defense forces in the field of cybersecurity in the conditions of total defense of the state]. Theory and Practice of Public Administration, 2(73), 144–153. DOI: https://doi.org/10.34213/tp.21.02.16 [in Ukrainian].
Threats to critical infrastructure and their impact on the state of national security (monitoring the implementation of the National Security Strategy). (2017). Analytical note of the National Institute of Strategic Studies. March. URL: http://old.niss.gov.ua/content/articles/files/KI_-Ivanyuta-3a331.pdf (accessed: 15.12.2024) [in Ukrainian].
Potii, O.V., Kozlov, Yu.N., & Diachenko, I.I. (2015). Basic principles of electronic identification. The concept of electronic identification infrastructure of Ukraine. Applied radio electronics, 14(4), 366–369. URL: http://nbuv.gov.ua/UJRN/Prre_2015_14_4_18 (accessed: 15.12.2024) [in Ukrainian].
On approval of the Procedure for conducting a review of the state of cyber protection of critical information infrastructure, state information resources and information, the requirement for the protection of which is established by law: Resolution of the Cabinet of Ministers of Ukraine
№ 1176. (2020, November 11). URL: https://zakon.rada.gov.ua/laws/show/1176-2020-%D0%BF#Text (accessed: 15.12.2024) [in Ukrainian].
Akomea-Frimpong, I., Adeabah, D., Ofosu, D., & Tenakwah, E.J. (2021). A review of studies on green finance of banks, research gaps and future directions. Journal of Sustainable Finance & Investment, 12(4), 1241–1264. DOI: https://doi.org/10.1080/20430795.2020.1870202
AlBenJasim, S., Dargahi, T., Takruri, H., & Al-Zaidi, R. (2023). FinTech Cybersecurity Challenges and Regulations: Bahrain Case Study. Journal of Computer Information Systems, 64(6), 835–851. DOI: https://doi.org/10.1080/08874417.2023.2251455
Bissell, K., Lasalle, R.M., & Cin, P.D. (2019). The cost of cybercrime: Ninth annual cost of cybercrime study. Accenture. URL: https://www.accenture.com/_acnmedia/pdf-96/accenture-2019-cost-of-cybercrime-study-final.pdf
Carver, J. (2024). More bark than bite? European digital sovereignty discourse and changes to the European Union’s external relations policy. Journal of European Public Policy, 31(8), 2250–2286. DOI: https://doi.org/10.1080/13501763.2023.2295523
European Central Bank. (2018). Cyber resilience oversight expectations for financial market infrastructures. URL: https://www.ecb.europa.eu/pub/pdf/other/ecb.cyberresilienceoversightexpectations201812.en.pdf
Donnelly, S., Ríos Camacho, E., & Heidebrecht, S. (2023). Digital sovereignty as control: the regulation of digital finance in the European Union. Journal of European Public Policy, 31(8), 2226–2249. DOI: https://doi.org/10.1080/13501763.2023.2295520
Duffie, D., & Younger, J. (2019). Cyber runs: How a cyber attack could affect U.S. financial institutions. Brookings. URL: https://www.brookings.edu/articles/cyber-runs/
Gutiérrez Ponce, H., Chamizo González, J., & Al-Mohareb, M. (2021). Sustainable finance in cybersecurity investment for future profitability under uncertainty. Journal of Sustainable Finance & Investment, 13(1), 614–633. DOI: https://doi.org/10.1080/20430795.2021.1985951
Hernandez-Castro, J., & Boiten, E. (2020). The Economic Impact of Cybercrime. Cybersecurity, 3(1). DOI: https://doi.org/10.1186/s42400-020-00062-6
Kahler, J., Lai, R., & Weber, W. (2019). Cybersecurity and Financial Stability: The Role of Central Banks. Journal of Financial Stability, 42, 1–12. https://doi.org/10.1016/j.jfs.2019.05.014
Kashkevich, S., Shyshatskyi, A., Dmytriieva, O., Zhyvylo, Y., Plekhova, G., & Neronov,
S. (2024). The development of management methods based on bio-inspired algorithms. In Information and control systems: modelling and optimizations: collective monograph (pp. 35-69). Technology Center Pc. DOI: https://doi.org/10.15587/978-617-8360-04-7
Knoop, T., Perry, J., & González, A. (2021). Central Bank Digital Currencies and Cyber Resilience. BIS Working Papers, No 949. DOI: https://www.bis.org/publ/work949.htm
Kopp, E., Lincoln, B., & Hesse, H. (2020). Cybersecurity and Financial Stability.
IMF Working Papers, 2020(208). DOI: https://doi.org/10.5089/9781513562834.001
Madnick, B., Huang, K., & Madnick, S. (2023). The evolution of global cybersecurity norms in the digital age: A longitudinal study of the cybersecurity norm development process. Information Security Journal: A Global Perspective, 33(3), 204–225. DOI: https://doi.org/10.1080/19393555.2023.2201482
Musleh Al-Sartawi, A.M.A., Hussainey, K., & Razzaque, A. (2022). The role of artificial intelligence in sustainable finance. Journal of Sustainable Finance & Investment, 1–6. DOI: https://doi.org/10.1080/20430795.2022.2057405
Onyshchenko, S., Zhyvylo, Y., Cherviak, A., & Bilko, S. (2023). Determining the patterns of using information protection systems at financial institutions in order to improve the level of financial security. Eastern-European Journal of Enterprise Technologies, 5(13(125)), 65–76. DOI: https://doi.org/10.15587/1729-4061.2023.288175
Special Publication 800-94 Guide to Intrusion Detection and Prevention Systems (IDPS). (n.d.). Computer Security Resource Center. URL: https://csrc.nist.gov/pubs/sp/800/94/final
Zhyvylo, Y., & Kuz, V. (2023). Risk Management of Critical Information Infrastructure: Threas-Vulnerabilities-Consequences. Theoretical and Applied Cyber Security, 5(2), 68–80. URL: http://surl.li/vzrhfs