IDEAS home Printed from https://ideas.repec.org/a/daw/ijsrmt/v4y2025i9p74-85id790.html

Technological Disruptions and Cybersecurity Risks (A Study of Guaranty Trust Bank in Ilorin Metropolis)

Author

Listed:
  • Baba, K.O.

  • Mohammed, I. L.

  • Mashood, M.

Abstract

The increasing adoption of advanced digital technologies in the Nigerian banking sector has heightened concerns over cybersecurity risks, necessitating a critical investigation into the link between technological disruptions and cybersecurity vulnerabilities. This study investigated the influence of digital banking innovation and IT infrastructure changes on cybersecurity risk in Guaranty Trust Bank Ltd, Ilorin Metropolis. The study objectives were to examine the extent to which internet/mobile banking, new tech-driven product introductions, system upgrades/overhauls, and cloud adoption influence cybersecurity risk. The study adopted a quantitative survey research design. Data were collected using a structured questionnaire administered to a sample of 96 employees drawn from a population of 124 through stratified random sampling. Data analysis was conducted using multiple regression analysis via SPSS. Findings revealed that digital banking innovation significantly influences cybersecurity risk (R² = 0.610, p < 0.05), with both internet/mobile banking and new tech-driven products contributing positively to risk levels. Similarly, IT infrastructure changes also had a significant influence (R² = 0.536, p < 0.05), with system upgrades and cloud service adoption increasing cybersecurity exposure. Based on the study findings, it was concluded that while digital transformation is essential for banking efficiency and customer experience, it must be strategically aligned with proactive cybersecurity measures. The study therefore recommendations embedding security frameworks in digital banking rollouts and IT infrastructure changes, conducting regular risk assessments, and adopting secure cloud practices to mitigate emerging threats.

Suggested Citation

  • Baba, K.O. & Mohammed, I. L. & Mashood, M., 2025. "Technological Disruptions and Cybersecurity Risks (A Study of Guaranty Trust Bank in Ilorin Metropolis)," International Journal of Scientific Research and Modern Technology, Prasu Publications, vol. 4(9), pages 74-85.
  • Handle: RePEc:daw:ijsrmt:v:4:y:2025:i:9:p:74-85:id:790
    as

    Download full text from publisher

    File URL: https://www.ijsrmt.com/index.php/ijsrmt/article/view/790
    Download Restriction: no
    ---><---

    References listed on IDEAS

    as
    1. Mothobi, Onkokame & Grzybowski, Lukasz, 2017. "Infrastructure deficiencies and adoption of mobile money in Sub-Saharan Africa," Information Economics and Policy, Elsevier, vol. 40(C), pages 71-79.
    2. Stanley Kaplan & B. John Garrick, 1981. "On The Quantitative Definition of Risk," Risk Analysis, John Wiley & Sons, vol. 1(1), pages 11-27, March.
    Full references (including those not matched with items on IDEAS)

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Gundula Glowka & Andreas Kallmünzer & Anita Zehrer, 2021. "Enterprise risk management in small and medium family enterprises: the role of family involvement and CEO tenure," International Entrepreneurship and Management Journal, Springer, vol. 17(3), pages 1213-1231, September.
    2. Benischke, Mirko H. & Guldiken, Orhun & Doh, Jonathan P. & Martin, Geoffrey & Zhang, Yanze, 2022. "Towards a behavioral theory of MNC response to political risk and uncertainty: The role of CEO wealth at risk," Journal of World Business, Elsevier, vol. 57(1).
    3. N'dri, Lasme Mathieu & Kakinaka, Makoto, 2020. "Financial inclusion, mobile money, and individual welfare: The case of Burkina Faso," Telecommunications Policy, Elsevier, vol. 44(3).
    4. S. Cucurachi & E. Borgonovo & R. Heijungs, 2016. "A Protocol for the Global Sensitivity Analysis of Impact Assessment Models in Life Cycle Assessment," Risk Analysis, John Wiley & Sons, vol. 36(2), pages 357-377, February.
    5. K. Karthikeyan & S. Bharath & K. Ranjith Kumar, 2012. "An Empirical Study on Investors’ Perception towards Mutual Fund Products through Banks with Reference to Tiruchirapalli City, Tamil Nadu," Vision, , vol. 16(2), pages 101-108, June.
    6. Nicola Paltrinieri & Nicolas Dechy & Ernesto Salzano & Mike Wardman & Valerio Cozzani, 2012. "Lessons Learned from Toulouse and Buncefield Disasters: From Risk Analysis Failures to the Identification of Atypical Scenarios Through a Better Knowledge Management," Risk Analysis, John Wiley & Sons, vol. 32(8), pages 1404-1419, August.
    7. Louis Anthony (Tony) Cox, Jr., 2012. "Community Resilience and Decision Theory Challenges for Catastrophic Events," Risk Analysis, John Wiley & Sons, vol. 32(11), pages 1919-1934, November.
    8. Ozgur Satici & Esra Satici, 2024. "Theoretical semi-quantitative risk assessment methodology for tunnel design and construction processes," International Journal of System Assurance Engineering and Management, Springer;The Society for Reliability, Engineering Quality and Operations Management (SREQOM),India, and Division of Operation and Maintenance, Lulea University of Technology, Sweden, vol. 15(7), pages 3385-3405, July.
    9. Chen, Fuzhong & Hsu, Chien-Lung & Lin, Arthur J. & Li, Haifeng, 2020. "Holding risky financial assets and subjective wellbeing: Empirical evidence from China," The North American Journal of Economics and Finance, Elsevier, vol. 54(C).
    10. Niël Almero Krüger & Natanya Meyer, 2021. "The Development of a Small and Medium-Sized Business Risk Management Intervention Tool," JRFM, MDPI, vol. 14(7), pages 1-14, July.
    11. Cariolle, Joël, 2021. "International connectivity and the digital divide in Sub-Saharan Africa," Information Economics and Policy, Elsevier, vol. 55(C).
    12. Zhao, Yujia & McLellan, Benjamin Craig & Wang, Chaofan & Shuai, Jing & Xiang, Wanting & Shuai, Chuanmin, 2026. "Risk dynamics and strategies of China's solar PV industry chain under trade frictions: A review," Energy Policy, Elsevier, vol. 208(C).
    13. James H. Lambert & Rachel K. Jennings & Nilesh N. Joshi, 2006. "Integration of risk identification with business process models," Systems Engineering, John Wiley & Sons, vol. 9(3), pages 187-198, September.
    14. Johnson, Caroline A. & Flage, Roger & Guikema, Seth D., 2021. "Feasibility study of PRA for critical infrastructure risk analysis," Reliability Engineering and System Safety, Elsevier, vol. 212(C).
    15. Kasai, Naoya & Matsuhashi, Shigemi & Sekine, Kazuyoshi, 2013. "Accident occurrence model for the risk analysis of industrialfacilities," Reliability Engineering and System Safety, Elsevier, vol. 114(C), pages 71-74.
    16. J. C. Helton & F. J. Davis, 2002. "Illustration of Sampling‐Based Methods for Uncertainty and Sensitivity Analysis," Risk Analysis, John Wiley & Sons, vol. 22(3), pages 591-622, June.
    17. Michael Greenberg & Paul Lioy & Birnur Ozbas & Nancy Mantell & Sastry Isukapalli & Michael Lahr & Tayfur Altiok & Joseph Bober & Clifton Lacy & Karen Lowrie & Henry Mayer & Jennifer Rovito, 2013. "Passenger Rail Security, Planning, and Resilience: Application of Network, Plume, and Economic Simulation Models as Decision Support Tools," Risk Analysis, John Wiley & Sons, vol. 33(11), pages 1969-1986, November.
    18. Felipe Aguirre & Mohamed Sallak & Walter Schön & Fabien Belmonte, 2013. "Application of evidential networks in quantitative analysis of railway accidents," Journal of Risk and Reliability, , vol. 227(4), pages 368-384, August.
    19. Naomi Aoki, 2018. "Who Would Be Willing to Accept Disaster Debris in Their Backyard? Investigating the Determinants of Public Attitudes in Post‐Fukushima Japan," Risk Analysis, John Wiley & Sons, vol. 38(3), pages 535-547, March.
    20. Yacov Y. Haimes, 2012. "Systems‐Based Guiding Principles for Risk Modeling, Planning, Assessment, Management, and Communication," Risk Analysis, John Wiley & Sons, vol. 32(9), pages 1451-1467, September.

    More about this item

    Keywords

    ;
    ;
    ;
    ;

    Statistics

    Access and download statistics

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:daw:ijsrmt:v:4:y:2025:i:9:p:74-85:id:790. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Rahul Goyal (email available below). General contact details of provider: https://ijsrmt.com/index.php/ijsrmt/ .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.