{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,16]],"date-time":"2026-01-16T13:47:07Z","timestamp":1768571227263,"version":"3.49.0"},"reference-count":63,"publisher":"IGI Global","issue":"1","license":[{"start":{"date-parts":[[2025,5,22]],"date-time":"2025-05-22T00:00:00Z","timestamp":1747872000000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/3.0\/deed.en_US"},{"start":{"date-parts":[[2025,5,22]],"date-time":"2025-05-22T00:00:00Z","timestamp":1747872000000},"content-version":"am","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/3.0\/deed.en_US"},{"start":{"date-parts":[[2025,5,22]],"date-time":"2025-05-22T00:00:00Z","timestamp":1747872000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/3.0\/deed.en_US"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,5,22]]},"abstract":"<p>The purpose of this study is to investigate the relationship between the factors responsible for cyberfraud perpetration and the rate of cyberfraud perpetration in the South African banking industry using technology as a mediating variable. Structured questionnaire was employed as survey instrument. Using purposive sampling, it was distributed to 42 selected staff members of the 17 licensed banks in South Africa. The use of emerging technologies was found to have positive and significant relationship with internal controls, accountability, record keeping and ethical culture. This is justified by their p-values less than 0.05 except for the relationship between technology and poor organisation whose p-value was greater than 0.05. Overall, the mediating variable (technology) was found to indeed influence the rate of cyberfraud perpetration in the South African banking industry. This study provides an insight into the factors responsible for cyberfraud perpetration in South Africa and the moderating role of technology to reduce cyberfraud perpetration.<\/p>","DOI":"10.4018\/ijcbpl.378306","type":"journal-article","created":{"date-parts":[[2025,5,22]],"date-time":"2025-05-22T19:04:48Z","timestamp":1747940688000},"page":"1-19","source":"Crossref","is-referenced-by-count":0,"title":["Emerging Technologies as a Mediating Factor Between Causes of Cyberfraud and Cyberfraud Perpetration in the South African Banking Industry"],"prefix":"10.4018","volume":"15","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5886-3018","authenticated-orcid":true,"given":"Oluwatoyin Esther","family":"Akinbowale","sequence":"first","affiliation":[{"name":"Faculty of Economics & Finance, Tshwane University of Technology, Pretoria, South Africa"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8715-0519","authenticated-orcid":true,"given":"Heinz Eckart","family":"Klingelh\u00f6fer","sequence":"additional","affiliation":[{"name":"Faculty of Economics & Finance, Tshwane University of Technology, Pretoria, South Africa"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4797-928X","authenticated-orcid":true,"given":"Mulatu Fekadu","family":"Zerihun","sequence":"additional","affiliation":[{"name":"Faculty of Economics & Finance, Tshwane University of Technology, Pretoria, South Africa"}]},{"given":"Polly","family":"Mashigo","sequence":"additional","affiliation":[{"name":"Faculty of Economics & Finance, Tshwane University of Technology, Pretoria, South Africa"}]}],"member":"2432","reference":[{"key":"IJCBPL.378306-0","unstructured":"Akinbowale, O. E., Klingelh\u00f6fer, H. E., & Zerihun, M. F. (2021). The integration of forensic accounting and the management control system as tools for combating cyberfraud. Academy of Accounting and Financial Studies Journal, 25(2), 1\u201314. https:\/\/www.abacademies.org\/articles\/The-Integration-of-Forensic-Accounting-and-The-Management-Control-System-as-Tools-For-Combating-Cyber-Fraud-1528-2635-25-2-692.pdf"},{"key":"IJCBPL.378306-1","doi-asserted-by":"publisher","DOI":"10.1016\/j.heliyon.2022.e12054"},{"key":"IJCBPL.378306-2","doi-asserted-by":"publisher","DOI":"10.1080\/23322039.2022.2153412"},{"key":"IJCBPL.378306-3","doi-asserted-by":"publisher","DOI":"10.1080\/23311975.2022.2163560"},{"key":"IJCBPL.378306-4","doi-asserted-by":"publisher","DOI":"10.17706\/ijeeee.2017.7.1.70-78"},{"key":"IJCBPL.378306-5","doi-asserted-by":"publisher","DOI":"10.1108\/IJOES-05-2022-0092"},{"key":"IJCBPL.378306-6","doi-asserted-by":"publisher","DOI":"10.1108\/JFC-05-2017-0050"},{"key":"IJCBPL.378306-7","doi-asserted-by":"publisher","DOI":"10.5281\/zenodo.3697886"},{"key":"IJCBPL.378306-8","unstructured":"Banking Association of South Africa. (2020). Transformation report 2020. https:\/\/www.banking.org.za\/wp-content\/uploads\/2021\/04\/BASA_Transformation-in-Banking-Report-2020_.pdf"},{"key":"IJCBPL.378306-9","unstructured":"Bhasin, M. L. (2016). The role of technology in combating bank frauds: Perspectives and prospects. EcoForum, 5(2), 200\u2013212. https:\/\/ecoforumjournal.ro\/index.php\/eco\/article\/view\/2648"},{"key":"IJCBPL.378306-10","doi-asserted-by":"publisher","DOI":"10.25300\/MISQ\/2015\/39.4.5"},{"key":"IJCBPL.378306-11","doi-asserted-by":"publisher","DOI":"10.2307\/25750690"},{"issue":"1","key":"IJCBPL.378306-12","first-page":"123","article-title":"Addressing the growing spectre of cyber crime in Africa: Evaluating measures adopted by South Africa and other regional role players.","volume":"44","author":"F.Cassim","year":"2011","journal-title":"The Comparative and International Law Journal of Southern Africa"},{"key":"IJCBPL.378306-13","doi-asserted-by":"publisher","DOI":"10.1111\/joes.12452"},{"key":"IJCBPL.378306-14","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511845123"},{"key":"IJCBPL.378306-15","unstructured":"Coovadia, C. (2011). Banking sector overview. http:\/\/www.epiccommunications.co.za\/sites\/epic\/files\/cascoovadia_1_0.pdf"},{"key":"IJCBPL.378306-16","doi-asserted-by":"publisher","DOI":"10.1145\/2691517.2691521"},{"key":"IJCBPL.378306-17","doi-asserted-by":"publisher","DOI":"10.1177\/0032258X221107584"},{"key":"IJCBPL.378306-18","unstructured":"CyberPeace Institute. (2022, May 24). Cyber peace and the UN SDGs. https:\/\/cyberpeaceinstitute.org\/news\/cyber-peace-and-the-un-sdgs\/"},{"key":"IJCBPL.378306-19","unstructured":"Deloitte. (2022, Jan 25). India banking fraud survey report, edition IV.https:\/\/www.deloitte.com\/in\/en\/services\/financial-advisory\/research\/india-banking-fraud-survey-edition-IV-2021.html"},{"key":"IJCBPL.378306-20","doi-asserted-by":"publisher","DOI":"10.1080\/23311886.2019.1675404"},{"key":"IJCBPL.378306-21","doi-asserted-by":"publisher","DOI":"10.22495\/rgcv4i2art2"},{"key":"IJCBPL.378306-22","unstructured":"Dzomira, S. (2015). Cyber-banking fraud risk mitigation conceptual model. Banks and Bank Systems, 10(2), 7\u201314. https:\/\/www.businessperspectives.org\/images\/pdf\/applications\/publishing\/templates\/article\/assets\/6695\/BBS_en_2015_02_Dzomira.pdf"},{"key":"IJCBPL.378306-23","unstructured":"Ernst & Young. (2023). Forensic and integrity services. https:\/\/www.ey.com\/en_us\/services\/forensic-integrity-services"},{"key":"IJCBPL.378306-24","doi-asserted-by":"publisher","DOI":"10.18178\/ijtef.2015.6.5.481"},{"key":"IJCBPL.378306-25","unstructured":"Finance, U. K. (2020). Fraud\u2014The facts 2020: The definitive overview of payment industry fraud. https:\/\/www.ukfinance.org.uk\/system\/files\/Fraud-The-Facts-2020-FINAL-ONLINE-11-June.pdf"},{"key":"IJCBPL.378306-26","unstructured":"Global News Wire. (2019, Feb 20). South African banking report 2018.https:\/\/www.globenewswire.com\/news-release\/2019\/02\/20\/1738270\/0\/en\/South-Africa-Banking-Industry-Report-2018.html"},{"key":"IJCBPL.378306-27","doi-asserted-by":"publisher","DOI":"10.3969\/j.issn.1002-0829.2013.06.009"},{"key":"IJCBPL.378306-28","doi-asserted-by":"publisher","DOI":"10.1057\/ejis.2009.6"},{"key":"IJCBPL.378306-29","doi-asserted-by":"publisher","DOI":"10.28945\/736"},{"key":"IJCBPL.378306-30","doi-asserted-by":"publisher","DOI":"10.1111\/j.1540-5915.2012.00361.x"},{"key":"IJCBPL.378306-31","doi-asserted-by":"publisher","DOI":"10.1145\/1953122.1953142"},{"key":"IJCBPL.378306-32","unstructured":"International Criminal Police Organization. (2021). Africa\u2019s cyberthreat assessment report: INTERPOL\u2019S key insight to cybercrime in Africa.https:\/\/www.interpol.int\/en\/News-and-Events\/News\/2021\/INTERPOL-report-identifies-top-cyberthreats-in-Africa \/"},{"key":"IJCBPL.378306-33","unstructured":"International Criminal Police Organization. (2024). African joint operation against cybercrime: Reinforcing cybersecurity in Africa. https:\/\/www.interpol.int\/en\/Crimes\/Cybercrime\/Cybercrime-operations\/AFJOC-African-Joint-Operation-against-Cybercrime"},{"key":"IJCBPL.378306-34","unstructured":"Kamande, R. W., Kiragu, D., & Musumba, G. (2018). Internal controls, staff red flags and computerized financial fraud among commercial banks in Kenya. International Journal of Economics, Commerce and Management, VI(5), 95\u2013111. https:\/\/ijecm.co.uk\/wp-content\/uploads\/2018\/05\/657.pdf"},{"key":"IJCBPL.378306-35","unstructured":"Kaspersky. (2023, Nov 23). Africa remains one of the regions most targeted by cybercrime in 2023. https:\/\/www.kaspersky.co.za\/about\/press-releases\/africa-remains-one-of-the-regions-most-targeted-by-cybercrime-in-2023"},{"key":"IJCBPL.378306-36","doi-asserted-by":"crossref","unstructured":"Kopp, E., Kaffenberger, L., & Wilson, C. (2017). Cyber risk, market failures, and financial stability (IMF Working Paper No. 2017\/185). https:\/\/www.imf.org\/en\/Publications\/WP\/Issues\/2017\/08\/07\/Cyber-Risk-Market-Failures-and-Financial-Stability-45104","DOI":"10.5089\/9781484313787.001"},{"key":"IJCBPL.378306-37","first-page":"80","article-title":"Cyber risk management frameworks for the South African banking industry","author":"C.Koto","year":"2021","journal-title":"Proceedings of the 6th annual international conference on public administration and development alternatives"},{"key":"IJCBPL.378306-38","doi-asserted-by":"publisher","DOI":"10.1080\/1097198X.2019.1603527"},{"key":"IJCBPL.378306-39","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2014.05.006"},{"key":"IJCBPL.378306-40","doi-asserted-by":"publisher","DOI":"10.3390\/risks7010029"},{"key":"IJCBPL.378306-41","doi-asserted-by":"publisher","DOI":"10.1016\/j.chbr.2021.100165"},{"key":"IJCBPL.378306-42","doi-asserted-by":"publisher","DOI":"10.4102\/sajems.v19i4.1558"},{"key":"IJCBPL.378306-43","unstructured":"Mcanyana, W., Brindley, C., & Seedat, Y. (2020). Insight into the cyberthreat landscape in South Africa. Accenture. https:\/\/www.accenture.com\/content\/dam\/accenture\/final\/a-com-migration\/manual\/r3\/pdf\/pdf-125\/Accenture-Insight-Into-The-Threat-Landscape-Of-South-Africa-V5.pdf#zoom=50"},{"key":"IJCBPL.378306-44","doi-asserted-by":"publisher","DOI":"10.1016\/j.heliyon.2021.e06809"},{"key":"IJCBPL.378306-45","doi-asserted-by":"publisher","DOI":"10.56578\/jafas040108"},{"key":"IJCBPL.378306-46","unstructured":"Obeng-Adjei, A. (2017). Analysis of cybercrime activity: Perceptions from a South African financial bank a research report [Master\u2019s thesis, University of Witwatersrand, Johannesburg]. WIReDSpace. https:\/\/hdl.handle.net\/10539\/24373"},{"key":"IJCBPL.378306-47","author":"A. N.Oppenheim","year":"1992","journal-title":"Questionnaire design, interviewing and attitude measurement"},{"key":"IJCBPL.378306-48","unstructured":"PwC. (2020, Mar). Economic crime \u2013 When the boardroom becomes the battlefield: PwC\u2019s global economic crime survey 2020 (7th South African edition). https:\/\/www.corruptionwatch.org.za\/wp-content\/uploads\/2020\/06\/global-economic-crime-survey-20201.pdf"},{"key":"IJCBPL.378306-49","unstructured":"Ramadani, S., & Siahaan, A. P. U. Sutrisno, Ritonga, S., Amelia, W. R., Dalimunthe, H., & Munthe, R. (2018). Impact of cybercrime on technological and financial developments. International Journal for Innovative Research in Multidisciplinary Field, 4(10), 341\u2013344. https:\/\/www.ijirmf.com\/wp-content\/uploads\/IJIRMF201810056.pdf"},{"key":"IJCBPL.378306-50","unstructured":"Republic of South Africa. (2002). Electronic Communication and Transaction Act, 2002. Government Gazette, 446(23708), 1-80. https:\/\/www.gov.za\/sites\/default\/files\/gcis_document\/201409\/a25-02.pdf"},{"key":"IJCBPL.378306-51","doi-asserted-by":"publisher","DOI":"10.1108\/IJBM-12-2016-0186"},{"key":"IJCBPL.378306-52","doi-asserted-by":"publisher","DOI":"10.1365\/s43439-023-00089-8"},{"key":"IJCBPL.378306-53","doi-asserted-by":"publisher","DOI":"10.24251\/HICSS.2020.440"},{"key":"IJCBPL.378306-54","unstructured":"Surfshark. (n.d.). Cybercrime statistics. https:\/\/surfshark.com\/research\/data-breach-impact\/statistics"},{"key":"IJCBPL.378306-55","doi-asserted-by":"publisher","DOI":"10.23962\/10539\/23574"},{"key":"IJCBPL.378306-56","unstructured":"The International Institute for Strategic Studies. (2023). Cyber Capabilities And National Power Volume 2, pp. 127-40. https:\/\/www.iiss.org\/globalassets\/media-library---content--migration\/files\/research-papers\/2023\/09\/cyber-capabilities-and-national-power-vol-2\/cyber-capabilities-and-national-power_volume-2_11-south-africa.pdf"},{"key":"IJCBPL.378306-57","unstructured":"Timeslive. (2023, Mar 24). 41,000 Nedbank clients\u2019 cell phone no retrieved in cyber attack. https:\/\/www.timeslive.co.za\/news\/south-africa\/41000-nedbank-clients-cellphone-numbers-retrieved-in-cyberattack\/"},{"key":"IJCBPL.378306-58","unstructured":"United Nations. (2023a). Cybersecurity and new technologies.https:\/\/www.un.org\/counterterrorism\/cybersecurity#:~:text=The%20UNOCT%2FUNCCT%20Cybersecurity%20and,terrorist%20actors%20against%20criical%20infrastructure"},{"key":"IJCBPL.378306-59","unstructured":"United Nations. (2023b). Sustainable development goals report 2023: Special edition. https:\/\/unstats.un.org\/sdgs\/report\/2023\/"},{"key":"IJCBPL.378306-60","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2019.03.002"},{"key":"IJCBPL.378306-61","doi-asserted-by":"publisher","DOI":"10.1177\/147737080556056"},{"key":"IJCBPL.378306-62","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2021.103454"}],"container-title":["International Journal of Cyber Behavior, Psychology and Learning"],"original-title":[],"language":"ng","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=378306","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,15]],"date-time":"2026-01-15T21:19:57Z","timestamp":1768511997000},"score":1,"resource":{"primary":{"URL":"https:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/IJCBPL.378306"}},"subtitle":[""],"short-title":[],"issued":{"date-parts":[[2025,5,22]]},"references-count":63,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2025,1]]}},"URL":"https:\/\/doi.org\/10.4018\/ijcbpl.378306","relation":{},"ISSN":["2155-7136","2155-7144"],"issn-type":[{"value":"2155-7136","type":"print"},{"value":"2155-7144","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,5,22]]}}}