Аssessment of the convergence level of the cyber security system and counteraction of money laundering
Abstract
The growth of financial and cyber fraud leads to the destabilization of the country's financial sector and negatively affects the development of their economy, which requires the development and implementation of effective tools and measures at the level of public administration. The convergence of the cybersecurity system and counteraction of money laundering and terrorist financing is a promising area in the fight against financial fraud. The subject of research in the article is a scientific and methodological approach to forming integrated indicators for assessing the state of various systems, which is based on the Harrington - Mencher function. The aim is to determine the level of potential convergence of the cybersecurity system and counteraction of money laundering and terrorist financing based on the definition of their integrated indicators and the application of the Harrington-Mencher function. Objectives: to form a base of factors for evaluation; to carry out their normalization by applying nonlinear normalization; to transform the normalized values of the selected indicators of the research base to the dimensionless scale of Harrington's desirability; identify the function type of the dependence of the intermediate indicator value to assess the level of convergence of the cybersecurity system and combating financial fraud, from their actual values; calculate indicators to formalize the Harrington-Mencher transformation; to determine weight indicators using canonical analysis; to calculate integrated indicators that characterize the level of development of the cybersecurity system and counteraction to money laundering, as well as to determine the level of systems convergence. The article uses general scientific methods: system analysis - to determine the factors that characterize cybersecurity systems and combat financial fraud; Harrington-Mencher method of preference and function during integrated evaluation. The following results were obtained: in terms of cybersecurity, the highest scores are given to economically developed countries - European countries, the United States, Canada, Australia, New Zealand, Japan. Other countries have many problems in this area, as evidenced by their assessments of "very poor", "poor" and "satisfactory". The level of opposition to money laundering has shown that this area is critical for countries with high levels of crime, terrorism, military conflicts and high levels of financial secrecy, making them potential actors in money laundering. It is also established that due to the convergence of the two systems, the country's level of development will increase. Conclusions: the results of the study should be taken into account in the process of developing a strategy for the convergence of the cybersecurity system and combating financial fraud at the macro level.
Downloads
References
/References
Відмивання грошей. Anti-corruption walks Kyiv : веб-сайт. URL: https://acwalks.com.ua/knowledgebase/vidmyvannia-hroshey/ (дата звернення: 01.12.2021).
Morgan S. Cybersecurity Almanac: 100 Facts, Figures, Predictions And Statistics. URL: https://cybersecurityventures.com/cybersecurity-almanac-2019/ (дата звернення: 01.12.2021).
Dileep M.R., Navaneeth A.V., Abhishek M. A novel approach for credit card fraud detection using decision tree and random forest algorithms. In Proceedings of the 3rd International Conference on Intelligent Communication Technologies and Virtual Mobile Networks, ICICV 2021. 2021. P. 1025–10284. DOI: https://doi.org/10.1109/ICICV50876.2021.9388431.
Wang R., Liu G. Ensemble Method for Credit Card Fraud Detection. In Proceedings - 2021 4th International Conference on Intelligent Autonomous Systems, ICoIAS 2021. 2021. P. 246–252. DOI: https://doi.org/10.1109/ICoIAS53694.2021.00051.
Mishra S.P., Kumari P. Analysis of techniques for credit card fraud detection: A data mining perspective. Advances in Intelligent Systems and Computing. 2020, №1030. P. 89–98. DOI: https://doi.org/10.1007/978-981-13-9330-3_9.
Mekterović I., Karan M., Pintar D., Brkić L. Credit card fraud detection in card-not-present transactions: Where to invest? Applied Sciences (Switzerland). 2021, №11(151). Article number 6766. DOI: https://doi.org/10.3390/app11156766.
Chen Z., Van Khoa L.D., Teoh E.N., Nazir A., Karuppiah E.K., Lam K.S. Machine learning techniques for anti-money laundering (AML) solutions in suspicious transaction detection: a review. Knowledge and Information Systems. 2018, №57(2). P. 245–285. DOI: https://doi.org/10.1007/s10115-017-1144-z.
Zhou Y., Song X., Zhou M. Supply Chain Fraud Prediction Based on XGBoost Method. In 2021 IEEE 2nd International Conference on Big Data, Artificial Intelligence and Internet of Things Engineering, ICBAIE 2021. 2021. P. 539–542. DOI: https://doi.org/10.1109/ICBAIE52039.2021.9389949.
Gao S., Xu D., Wang H., Green, P. Knowledge-based anti-money laundering: a software agent bank application. Journal of Knowledge Management. 2009, №13(2). P. 63-75. DOI: https://doi.org/10.1108/13673270910942709.
Karpunina E.K., Mikhailov A.M., Bondareva N.A., Lyubimenko O.A., Fedotova E.V. Blockchain Technologies as a Reflection of Modern Reality: Diversity of Opportunities Versus Security Risks. Studies in Systems, Decision and Control. 2021, № 314. P. 3–14. DOI: https://doi.org/10.1007/978-3-030-56433-9_1.
Dawson M. Applying a holistic cybersecurity framework for global IT organizations. Business Information Review. 2018, № 35(2). Р. 60–67. DOI: https://doi.org/10.1177/0266382118773624.
Babenko, V. Gas supply security model to EU consumers. The Journal of V. N. Karazin Kharkiv National University. Series: International Relations. Economics. Country Studies. Tourism, 2020, № 12, 78-87. DOI: https://doi.org/10.26565/2310-9513-2020-12-07
Shumilo, O., Babenko, V., Liubokhynets, L., Volovelska, I., Arefieva, O. Method of Enterprise Economic Security Evaluation. Estudios de Economía Aplicada, 2021, 39 (7). DOI: https://doi.org/10.25115/eea.v39i7.4998
Dionysios S. Demetis. Technology and Anti-Money Laundering: A Systems Theory and Risk-Based Approach. Edward Elgar Publishing, Incorporated, 2010. P. 188.
Starychenko, Ye., Skrypnyk, A., Babenko, V., Klymenko, N., Tuzhyk, K. Food Security Indices in Ukraine: Forecast Methods and Trends. Estudios de Economía Aplicada, 2021, Vol. 38-3(1), pp. 1-8. DOI: http://dx.doi.org/10.25115/eea.v38i4.4000
Gagliani G. Cybersecurity, Technological Neutrality, and International Trade Law. Journal of International Economic Law. 2020, № 23(3). Р. 723–745. DOI: https://doi.org/10.1093/jiel/jgaa006.
Yarovenko H. Evaluating the threat to national information security. Problems and Perspectives in Managemen. 2020, № 18(3), P. 195–210. DOI: https://doi.org/10.21511/ppm.18(3).2020.17.
Кузьменко О.В., Яровенко Г.М., Радько В.В. Попередній аналіз процесу конвергенції систем кібербезпеки та фінансового моніторингу країн. Економіка та суспільство. 2021, № 32. DOI: https://doi.org/10.32782/2524-0072/2021-32-37.
Gontareva, I., Babenko, V., Kuchmacz, B., Arefiev, S. Valuation of Information Resources in the Analysis of Cybersecurity Entrepreneurship. Estudios de Economía Aplicada, 2021, Vol. 38-3(1), pp. 1-11. DOI: http://dx.doi.org/10.25115/eea.v38i4.3984
Халафян А.А. STATISTICA 6. Статистический анализ данных. М. : ООО «Бином-Пресс», 2007. 512 c.
Vidmyvannia hroshei [Money laundering]. Anti-corruption walks Kyiv. Available at: https://acwalks.com.ua/knowledgebase/vidmyvannia-hroshey/ (accessed 01 December 2021).
Morgan S. (2019). Cybersecurity Almanac: 100 Facts, Figures, Predictions And Statistics. Available at: https://cybersecurityventures.com/cybersecurity-almanac-2019/ (accessed 01 December 2021).
Dileep M.R., Navaneeth A.V., Abhishek M. (2021). A novel approach for credit card fraud detection using decision tree and random forest algorithms. In Proceedings of the 3rd International Conference on Intelligent Communication Technologies and Virtual Mobile Networks, ICICV 2021. P. 1025–10284. https://doi.org/10.1109/ICICV50876.2021.9388431.
Wang R., Liu G. (2021). Ensemble Method for Credit Card Fraud Detection. In Proceedings - 2021 4th International Conference on Intelligent Autonomous Systems, ICoIAS 2021. P. 246–252. https://doi.org/10.1109/ICoIAS53694.2021.00051.
Mishra S.P., Kumari P. (2020). Analysis of techniques for credit card fraud detection: A data mining perspective. Advances in Intelligent Systems and Computing, 1030, pp. 89–98. https://doi.org/10.1007/978-981-13-9330-3_9.
Mekterović I., Karan M., Pintar D., Brkić L. (2021). Credit card fraud detection in card-not-present transactions: Where to invest? Applied Sciences (Switzerland), 11(151), article number 6766. https://doi.org/10.3390/app11156766.
Chen Z., Van Khoa L.D., Teoh E.N., Nazir A., Karuppiah E.K., Lam K.S. (2018). Machine learning techniques for anti-money laundering (AML) solutions in suspicious transaction detection: a review. Knowledge and Information Systems, 57(2), pp. 245–285. https://doi.org/10.1007/s10115-017-1144-z.
Zhou Y., Song X., Zhou M. (2021). Supply Chain Fraud Prediction Based on XGBoost Method. In 2021 IEEE 2nd International Conference on Big Data, Artificial Intelligence and Internet of Things Engineering, ICBAIE 2021. P. 539–542. https://doi.org/10.1109/ICBAIE52039.2021.9389949.
Gao S., Xu D., Wang H., Green, P. (2009). Knowledge-based anti-money laundering: a software agent bank application. Journal of Knowledge Management, 13(2), pp. 63-75. https://doi.org/10.1108/13673270910942709.
Karpunina E.K., Mikhailov A.M., Bondareva N.A., Lyubimenko O.A., Fedotova E.V. (2021). Blockchain Technologies as a Reflection of Modern Reality: Diversity of Opportunities Versus Security Risks. Studies in Systems, Decision and Control, 314, pp. 3-14. https://doi.org/10.1007/978-3-030-56433-9_1.
Dawson M. (2018). Applying a holistic cybersecurity framework for global IT organizations. Business Information Review, 35(2), pp. 60-67. https://doi.org/10.1177/0266382118773624.
Babenko, V. (2020). Gas supply security model to EU consumers. The Journal of V. N. Karazin Kharkiv National University. Series: International Relations. Economics. Country Studies. Tourism, 12, 78-87. https://doi.org/10.26565/2310-9513-2020-12-07
Shumilo, O., Babenko, V., Liubokhynets, L., Volovelska, I., Arefieva, O. (2021). Method of Enterprise Economic Security Evaluation. Estudios de Economía Aplicada, 39 (7). https://doi.org/10.25115/eea.v39i7.4998
Dionysios S. Demetis. (2010). Technology and Anti-Money Laundering: A Systems Theory and Risk-Based Approach. Edward Elgar Publishing, Incorporated. P. 188.
Starychenko, Ye., Skrypnyk, A., Babenko, V., Klymenko, N., Tuzhyk, K. (2021). Food Security Indices in Ukraine: Forecast Methods and Trends. Estudios de Economía Aplicada, Vol. 38-3(1), pp. 1-8. http://dx.doi.org/10.25115/eea.v38i4.4000
Gagliani G. (2020). Cybersecurity, Technological Neutrality, and International Trade Law. Journal of International Economic Law, 23(3), pp. 723-745. https://doi.org/10.1093/jiel/jgaa006.
Yarovenko H. (2020). Evaluating the threat to national information security. Problems and Perspectives in Management, 18(3), pp. 195–210. https://doi.org/10.21511/ppm.18(3).2020.17.
Kuzmenko O.V., Yarovenko H.M., Radko V.V. (2021). Poperednii analiz protsesu konverhentsii system kiberbezpeky ta finansovoho monitorynhu krain [Preliminary analysis of the convergence process of cyber security systems and financial monitoring of countries]. Economy and society, 32. https://doi.org/10.32782/2524-0072/2021-32-37 (in Ukrainian).
Gontareva, I., Babenko, V., Kuchmacz, B., Arefiev, S. (2021). Valuation of Information Resources in the Analysis of Cybersecurity Entrepreneurship. Estudios de Economía Aplicada, Vol. 38-3(1), pp. 1-11. http://dx.doi.org/10.25115/eea.v38i4.3984
Halafyan A.A. (2007) STATISTICA 6. Statisticheskiy analiz dannyih [STATISTICA 6. Statistical data analysis]. М. : LLC «Binom-Press» (in Russian).
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication of this work under the terms of a license Creative Commons Attribution License 4.0 International (CC BY 4.0).
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work.