Research Article | Open Access | Download Full Text
Volume 3 | Issue 3 | Year 2025 | Article Id: CYS-V3I3P103 DOI: https://doi.org/10.59232/CYS-V3I3P103
Effect of Cyber Security on Organization Network: A Case Study of Selected Commercial Banks in Nigeria
Abba, Monday Okoroma, Osodeke, Efe Charles, Ibekwe, Christopher Chimaobi
| Received | Revised | Accepted | Published |
|---|---|---|---|
| 18 Jul 2025 | 20 Aug 2025 | 05 Sep 2025 | 16 Sep 2025 |
Citation
Abba, Monday Okoroma, Osodeke, Efe Charles, Ibekwe, Christopher Chimaobi. “Effect of Cyber Security on Organization Network: A Case Study of Selected Commercial Banks in Nigeria.” DS Journal of Cyber Security, vol. 3, no. 3, pp. 39-50, 2025.
Abstract
Keywords
Commercial banks, Cyber security, Network, Organization, Threat.
References
[1] Muhammad Afzal, “Human and Organizational Aspects of Cyber Security from a System Suppliers Perspective,” Master Thesis, Department of Industrial Information and Control Systems, Royal Institute of Technology Stockholm, Sweden, 2010. [Google Scholar]
[2] Sesan, Youth and Cybercrime in Nigeria, Punch Newspapers, 2019. [Online] Available: https://punchng.com/youth-and-cybercrime-in-nigeria/
[3] Tope Aladenusi, A Fresh Perspective Nigeria Cyber Security Outlook 2021, Deloitte, pp. 1-14, 2020. [Online] Available: https://www.deloitte.com/ng/en/services/risk-advisory/perspectives/nigeria-cyber-security-outlook-2021.html
[4] Eyitayo Johnson, Police Arrest Nigerian Fraudster Who Stole N1.87Billion After Hacking Into Bank’s Server, Sahara Reporters, 2021. [Online] Available: https://saharareporters.com/2021/08/13/police-arrest-nigerian-fraudster-who-stole-n187billion-after-hacking-bank%E2%80%99s-server
[5] Jacob Obafemi Fatoki, "The Influence of Cyber Security on Financial Fraud in the Nigerian Banking Industry," International Journal of Science and Research Archive, vol. 09, no. 02, pp. 503–515, 2023.
[CrossRef] [Google Scholar] [Publisher link]
[6] Federico Del Giorgio Solfa, "Impacts of Cyber Security and Supply Chain Risk on Digital Operations: Evidence from the Pharmaceutical Industry," International Journal of Technology Innovation and Management (IJTIM), vol. 2, no. 2, pp. 18-32, 2022.
[CrossRef] [Google Scholar] [Publisher link]
[7] Oliver Gulyas, and Gabor Kiss, "Impact of Cyber-Attacks on the Financial Institutions," Procedia Computer Science, vol. 219, pp. 84–90, 2023.
[CrossRef] [Google Scholar] [Publisher link]
[8] Shaikha Hasan et al., "Evaluating the Cyber Security Readiness of Organizations and its Influence on Performance," Journal of Information Security and Applications, vol. 58, 2021.
[CrossRef] [Google Scholar] [Publisher link]
[9] Ibikunle Frank, and Eweniyi Odunayo, "Approach to Cyber Security Issues in Nigeria: Challenges and Solution," International Journal of Cognitive Research in Science, Engineering and Education (IJCRSEE), vol. 1, no. 1, 2013.
[Google Scholar] [Publisher link]
[10] May Robin Permann, and Kenneth Rohde, “Cyber Assessment Methods for SCADA Security,” 15th Annual Joint ISA POWID/EPRI Controls and Instrumentation Conference, 2005.
[Google Scholar] [Publisher Link]
[11] Shari Lawrence Pfleeger, M. Angela Sasse, and Adrian Furnham, “From Weakest Link to Security Hero: Transforming Staff Security Behavior,” Journal of Homeland Security and Emergency Management, vol. 11, no. 4, pp. 489-510, 2014.
[CrossRef] [Google Scholar] [Publisher link]
[12] Bamidele Ikusika, "A Critical Analysis of Cyber Security in Nigeria and the Incidents of Cyber-Attacks on Businesses/Companies", SSRN, pp. 1-19, 2022.
[Google Scholar] [Publisher link]
[13] Yanal Kilani, "Cyber-Security Effect on Organizational Internal Process: Mediating role of Technological Infrastructure," Problems and Perspectives in Management, vol. 18, no. 1, pp. 449-460, 2020.
[CrossRef] [Google Scholar] [Publisher link]
[14] Yakubu Ajiji Makeri, "Cyber Security Issues in Nigeria and Challenges," International Journal of Advanced Research in Computer Science and Software Engineering, vol. 7, no. 4, pp. 315-321, 2017.
[15] Kenneth U. Okereafor, "Impacts of Cyber Attacks on Corporate Business Continuity: Fostering Cyber Security Consciousness in the Citizenry", The 1st National Conference on Cybercrime and Cyber Security, Nigeria, 2008.
[16] Keith Stouffer et al., “Guide to Industrial Control Systems (ICS) Security “, NIST Special Publication, vol. 800, no. 82 Rev. 2, 2011.
[CrossRef] [Google Scholar] [Publisher link]
[17] Anna Zakrzewski et al., Global Wealth 2019: Reigniting Radical Growth, Boston Consulting Group, 2019. [Online]. Available: https://www.bcg.com/publications/2019/global-wealth-reigniting-radical-growth