[1] | Abdul, Amina & Goyayi, Maria. (2023). Potential Risks of Cloud Computing in Financial Institutions in Tanzania: Perspectives from CRDB Bank Plc. European Journal of Theoretical and Applied Sciences. 1. 43-53. 10.59324/ejtas.2023.1(6).05. |
[2] | Dr, Vinoth & Vemula, Hari & Haralayya, Dr & Mamgain, Pradeep & Hasan, Mohammed Faez & Naved, Mohd. (2021). Application of cloud computing in banking and e-commerce and related security threats. Materials Today: Proceedings. 51. 10.1016/j.matpr.2021.11.121. |
[3] | Buchanan, S., & McMenemy, D. (2012). Digital service analysis and design: The role of process modelling. International Journal of Information Management, 32(3), 251-256. |
[4] | Ogiela, M. R., & Ogiela, U. (2014). Secure information management using linguistic threshold approach. London: Springer. |
[5] | H. -T. Peng, W. W. Y. Hsu, J. -M. Ho and M. -R. Yu, "Homomorphic encryption application on FinancialCloud framework," 2016 IEEE Symposium Series on Computational Intelligence (SSCI), Athens, Greece, 2016, pp. 1-5, doi: 10.1109/SSCI.2016.7850013. |
[6] | Desai, P., & Hamid, T. (2021). Best Practices for Securing Financial Data and PII in Public Cloud. International Journal of Computer Applications, 975, 8887. Kott, A.; Linkov, I. Cyber Resilience of Systems and Networks; Springer: Berlin, Germany, 2019. |
[7] | Dal Pozzolo, A.; Boracchi, G.; Caelen, O.; Alippi, C.; Bontempi, G. Credit card fraud detection: A realistic modeling and a novel learning strategy. IEEE Trans. Neural Netw. Learn. Syst. 2017, 29, 3784–3797. |
[8] | Kaur, G.; Habibi Lashkari, Z.; Habibi Lashkari, A. Cybersecurity Threats in FinTech. Underst. Cybersecur. Manag. Fintech. Future Bus. Financ. 2021. |
[9] | Martins, N.; Magalhães Cruz, J.; Cruz, T.; Abreu, P.H. Adversarial Machine Learning Applied to Intrusion and Malware Scenarios: A Systematic Review. IEEE Access 2020, 8, 35403–35419. |
[10] | Imerman, M.; Patel, R.; Kim, Y.D. Cloud finance: A review and synthesis of cloud computing and cloud security in financial services. J. Financ. Transform. Capco Inst. 2022, 55, 18–25. |
[11] | Kettani, H.; Cannistra, R.M. On Cyber Threats to Smart Digital Environments. In Proceedings of the 2nd International Conference on Smart Digital Environment (ICSDE’18), Rabat, Morocco, 18–20 October 2018. |
[12] | O. H. Alhazmi and Y. K. Malaiya, "Evaluating disaster recovery plans using the cloud," 2013 Proceedings Annual Reliability and Maintainability Symposium (RAMS), Orlando, FL, USA, 2013, pp. 1-6, doi: 10.1109/RAMS.2013.6517700. |
[13] | Wayne Jansen, Timothy Grance, The NIST Guidance on security and privacy in public cloud computing, January 2011. |
[14] | A. Mahalle, J. Yong and X. Tao, "Insider Threat and Mitigation for Cloud Architecture Infrastructure in Banking and Financial Services Industry," 2019 IEEE 23rd International Conference on Computer Supported Cooperative Work in Design (CSCWD), Porto, Portugal, 2019, pp. 16-21, doi: 10.1109/CSCWD.2019.8791906. |
[15] | Shabina, Ali, R.F., Jahankhani, H., Siddiqi, Y., Hassan, B. (2024). Ensuring Securing PII Data in the AWS Cloud: A Comprehensive Guide to PCI DSS Compliance. In: Jahankhani, H., Bowen, G., Sharif, M.S., Hussien, O. (eds) Cybersecurity and Artificial Intelligence. Advanced Sciences and Technologies for Security Applications. Springer, Cham. https://doi.org/10.1007/978-3-031-52272-7_8. |
[16] | Srinivasan, S. (2014). Meeting Compliance Requirements while using Cloud Services. In Security, Trust, and Regulatory Aspects of Cloud Computing in Business Environments (pp. 127-144). IGI Global. |
[17] | Scott, H. S., Gulliver, J., & Nadler, H. (2019). Cloud computing in the financial sector: A global perspective. Program on International Financial Systems. |
[18] | Ruiter, J., & Warnier, M. (2011). Computers, privacy and data protection: an element of choice. |
[19] | Establishing Your Cloud Foundation on AWS - AWS Whitepaper (amazon.com). |
[20] | Ramavarapu, Kiran. (2023). Unleashing the Power of Cloud Computing in Financial Services: Enabling Security Compliance and Innovation. 10.13140/RG.2.2.18460.26243. |
[21] | Bell, Chris & Broklyn, Peter & Egon, Axel & Potter, Kaledio. (2024). CLOUD SECURITY AND DATA PRIVACY. |