• editor@ijmra.in
  • ISSN[Online] : 2643-9875  ||  ISSN[Print] : 2643-9840

Volume 06 Issue 12 December 2023

Navigating the Data Security Landscape: Challenges and Solutions in Financial Markets amid Digitalization and Artificial Intelligence
1Mithilesh Gupta, 2Urvi Naresh Shah
1Assistant Professor at St. Peter Degree College
2Assistant Professor at Mount Carmel Junior College
DOI : https://doi.org/10.47191/ijmra/v6-i12-77

Google Scholar Download Pdf
ABSTRACT:

Financial markets have the risk of data mishandling or leakage of information. Regarding consumer, privacy breach and information mismanagement affects the overall trust in the system. With faster digitalization and online usage of information, a large section of economic markets require that consumers reveal their individual information constituting a part of regulatory requirements and privacy agreements. Financial systems gather information such as identity, payment passwords, shopping choices, and other similar details that can be shared online. Financial data is prone to misuse and leakage through big data pricing discrimination and over-marketing. Furthermore, the adoption of artificial intelligence/ Machine learning (AI/ML) creates new, distinct cyber risks and expands possibilities for cyber-attacks. AI/ML systems are susceptible to new threats along with the usual cyber threats posed by human error or software malfunctions. Encroachment of personal details and disruption of law by certain organizations make it difficult for individuals to assess the challenges or problems encountered within financial markets. Therefore, the lack of systematic arrangement of the financial system results in financial losses and psychological disruption presenting as mistrust of the government’s accountability, impairment of the social balance, and erratic behavior. The present study aims to assess: 1) The scope of data security in financial markets; 2) the Challenges encountered by financial markets in maintaining data security, 3) the Role of Artificial intelligence in data breaches and Current methods (Technical and non-technical) utilized for data security.

KEYWORDS:

Data protection, data privacy, financial markets, financial data, personal, AI

REFERENCES
1) Lindgreen, E. R. (2018). Privacy from an economic perspective. The Handbook of Privacy Studies: An Interdisciplinary Introduction (pp. 181–208). Amsterdam: Amsterdam University Press

2) World Bank. (2021). World Development Report 2021: Data for Better Lives. Washington, D.C.: World Bank.

3) Fara Soubouti, Data Privacy and the Financial Services Industry: A Federal Approach to Consumer Protection, 24 N.C. BANKING INST. 527 (2020).

4) Sophia et al., (2014) A survey of Cryptographic approaches to securing BigData Analytics in Cloud, Sophia, p1-p2, 978-1-4799-6233- 4/14,@IEEE, 2014

5) France Belanger Privacy in the Digital Age: A review of Information privacy research in Information systems, MIS Quarterly, Vol. 35, No.4, pp 1017-1041/December 2011

6) An overview of the security concern in enterprise cloud computing, Anthony Bisong et. al., International Journal of network security & its applications (IJNSA), Vol.3, No.1, January 2011, P.36

7) Data-Intensive Applications, challenges, techniques and technologies: A survey on Big Data, C.L. Phillip Chen, C.-Y. Zhang / Information Sciences, 275, (2014). p 314 – p 347

8) Mahalle et al., Data Privacy and System Security for Banking and Financial Services Industry based on Cloud Computing Infrastructure, 2018 IEEE 22nd International Conference on Computer Supported Cooperative Work in Design

9) Huo, H.; Guo, J.; Yang, X.; Lu, X.; Wu, X.; Li, Z.; Li, M.; Ren, J. An Accelerated Method for Protecting Data Privacy in Financial Scenarios Based on Linear Operation. Appl. Sci. 2023, 13, 1764. https:// doi.org/10.3390/app13031764

10) Tramer, F.; Boneh, D. Slalom: Fast, verifiable and private execution of neural networks in trusted hardware. arXiv 2018, arXiv:1806.03287

11) Sun, Y.; Shi, Y.; Zhang, Z. Finance big data: Management, analysis, and applications. Int. J. Electron. Commer. 2019, 23, 1512270.

12) Stewart, H., & Jürjens, J. (2018). Data security and consumer trust in fintech innovation in Germany. Information and Computer Security, 26(1), 109–128

13) Gai, K., Qiu, M., Sun, X., & Zhao, H. (2017). Security and privacy issues: A survey on fintech. In M. Qiu (Ed.), Smart Computing and Communication (pp. 236–247). Cham: Springer International Publishing

14) Ingram Bogusz, C. (2018). Digital traces, ethics, and insight: Datadriven services in FinTech. In R. Teigland, S. Siri, A. Larsson, A. M. Puertas, & C. Ingram Bogusz (Eds.), The Rise and Development of Fintech: Accounts of Disruption from Sweden and Beyond (pp. 207–222). London: Routledge

15) Berg, T., Burg, V., Gombovi´c, A., & Puri, M. (2020). On the rise of FinTechs: Credit scoring using digital footprints. The Review of Financial Studies, 33(7), 2845–2897

16) Dorfleitner, G., & Hornuf, L. (2019). FinTech and Data Privacy in Germany: An Empirical Analysis with Policy Recommendations. Cham: Springer International Publishing

17) Yueyue Zhang, Effect of data privacy and security investment on the value of big data firms, Decision Support Systems, https://doi.org/10.1016/j.dss.2021.113543

18) Bose, A. Chung, M. Leung, Adoption of identity theft countermeasures and its short-and long-term impact on firm value, MIS Q. 43 (2019) 313–327

19) S. Dewan, F. Ren, Risk and return of information technology initiatives: evidence from electronic commerce announcements, Inf. Syst. Res. 18 (2007) 370–394

20) J. Brill, P. Lee, Preserving privacy while addressing COVID-19, Microsoft (2020). https://blogs.microsoft.com/on-the-issues/2020/04/20/privacy-covid-19-data-co llection/

21) Liu et al., (2018). Fine-Pruning: Defending Against Backdooring Attacks on Deep Neural Networks, Available at: https://arxiv.org/abs/1805.12185

22) El Bachir Boukherouaa (2021). Powering the Digital Economy: Opportunities and Risks of Artificial Intelligence in Finance, 24, 1-34

23) Hassan Takabi (2011). Security and privacy challenges in cloud computing environments, , Jmaes Joshi, p.5- p.8, IEE Security and privacy magazine, January 2011

24) Secure use of cloud computing in the finance sector, Good Practices and recommendations, European network for network and information security, p.7-p36, December 2015.

25) Officer, Chief Privacy, and Timothy J Keefer. 2009. “Privacy and Civil Liberties Policy Guidance Memorandum.”

26) Bamberger, Kenneth A, and Deirdre K Mulligan. 2015. Privacy on the ground: driving corporate behavior in the United States and Europe. MIT Press

27) Sedenberg, Elaine M, and Deirdre K Mulligan. 2015. “Public Health as a model for cybersecurity information sharing.” Berkeley Tech. LJ, 30: 16

28) Bowman, Courtney, Ari Gesher, John K Grant, Daniel Slate, and Elissa Lerner. 2015. The architecture of privacy: On engineering technologies that can deliver trustworthy safeguards. ” O’Reilly Media, Inc.”

29) Abebe, Rediet, Kehinde Aruleba, Abeba Birhane, Sara Kingsley, George Obaido, Sekou L Remy, and Swathi Sadagopan. 2021. “Narratives and counternarratives on data sharing in Africa.” 329–341.
Volume 06 Issue 12 December 2023

There is an Open Access article, distributed under the term of the Creative Commons Attribution – Non Commercial 4.0 International (CC BY-NC 4.0) (https://creativecommons.org/licenses/by-nc/4.0/), which permits remixing, adapting and building upon the work for non-commercial use, provided the original work is properly cited.


Our Services and Policies

Authors should prepare their manuscripts according to the instructions given in the authors' guidelines. Manuscripts which do not conform to the format and style of the Journal may be returned to the authors for revision or rejected.

The Journal reserves the right to make any further formal changes and language corrections necessary in a manuscript accepted for publication so that it conforms to the formatting requirements of the Journal.

International Journal of Multidisciplinary Research and Analysis will publish 12 monthly online issues per year,IJMRA publishes articles as soon as the final copy-edited version is approved. IJMRA publishes articles and review papers of all subjects area.

Open access is a mechanism by which research outputs are distributed online, Hybrid open access journals, contain a mixture of open access articles and closed access articles.

International Journal of Multidisciplinary Research and Analysis initiate a call for research paper for Volume 07 Issue 05 (May 2024).

PUBLICATION DATES:
1) Last Date of Submission : 26 May 2024 .
2) Article published within a week.
3) Submit Article : editor@ijmra.in or Online

Why with us

International Journal of Multidisciplinary Research and Analysis is better then other journals because:-
1 : IJMRA only accepts original and high quality research and technical papers.
2 : Paper will publish immediately in current issue after registration.
3 : Authors can download their full papers at any time with digital certificate.

The Editors reserve the right to reject papers without sending them out for review.

Authors should prepare their manuscripts according to the instructions given in the authors' guidelines. Manuscripts which do not conform to the format and style of the Journal may be returned to the authors for revision or rejected. The Journal reserves the right to make any further formal changes and language corrections necessary in a manuscript accepted for publication so that it conforms to the formatting requirements of the Journal.

Indexed In
Avatar Avatar Avatar Avatar Avatar Avatar Avatar Avatar Avatar Avatar Avatar Avatar Avatar Avatar Avatar Avatar Avatar Avatar Avatar Avatar Avatar Avatar Avatar Avatar Avatar Avatar Avatar Avatar Avatar Avatar Avatar Avatar Avatar Avatar Avatar Avatar