Strengthening Ghana’s Banking Security through IoT: Implications for Achieving SDG Goals

Authors

  • Adade Sedom Percy INTI International University, Nilai, Negeri Sembilan, Malaysia
  • Emmanuel Ofotsu Kwesi Bannor INTI International University, Nilai, Negeri Sembilan, Malaysia
  • Doris Enimil INTI International University, Nilai, Negeri Sembilan, Malaysia
  • Khan Sarfaraz Ali INTI International University, Nilai, Negeri Sembilan, Malaysia
  • Ida Hindarsah Universitas Pasundan, Bandung, Indonesia

DOI:

https://doi.org/10.61453/jobss.v2025no37

Keywords:

Internet of Things (Iot), Cybersecurity, Banking Industry

Abstract

The use of the Internet of Things (IoT) in Ghana's banking sector has enormously enhanced efficiency in operations and customer service delivery. The digitalization process, however, poses considerable cybersecurity threats. This study investigates the impact of IoT on Ghanaian banks' cybersecurity with emphasis on the prominent risks, challenges, and strategic interventions. According to secondary data extracted from top banking reports and qualitative analysis by IT security professionals, we have prevalence of threats such as distributed denial-of-service (DDoS) attacks, unauthorised access, and data breaches. The findings quote the highest priority need for robust cybersecurity measures, continuous risk assessment, and government-initiated regulatory structures to offset risks of IoT deployments in financial institutions. The findings reference the greatest need for efficient cybersecurity measures, continued risk evaluation, and regulatory-driven frameworks being initiated by governments in order to offset vulnerabilities of IoT installations in financial institutions It is in line with Sustainable Development Goal 9 (Industry, Innovation, and Infrastructure), SDG 11 (Sustainable Cities and Communities), and SDG 16 (Peace, Justice, and Strong Institutions), as regards providing safe, resilient, and secure financial environments.

References

Albayati, H., 2024. Investigating undergraduate students' perceptions and awareness of using ChatGPT as a regular assistance tool: A user acceptance perspective study. Computers and Education: Artificial Intelligence, 6, p.100203. https://doi.org/10.1016/j.caeai.2024.100203

Aouedi, O., Vu, T.H., Sacco, A., Nguyen, D.C., Piamrat, K., Marchetto, G. and Pham, Q.V., 2024. A survey on intelligent Internet of Things: Applications, security, privacy, and future directions. IEEE communications surveys & tutorials. 1-1 https://doi.org/10.1109/COMST.2024.3430368

C. Fan, S. Ghaemi, H. Khazaei, and P. Musilek, ‘‘Performance evaluation of blockchain systems: A systematic survey,’’ IEEE Access, vol. 8, pp. 126927–126950, 2020, https://doi.org/10.1109/ACCESS.2020.3006078

K. Gai, J. Guo, L. Zhu, and S. Yu, ‘‘Blockchain meets cloud computing: A survey,’’ IEEE Commun. Surveys Tuts., vol. 22, no. 3, pp. 2009–2030, 3rd Quart., 2020, https://doi.org/10.1109/COMST.2020.2989392

Khan, M.A. and Salah, K., 2018. IoT security: Review, blockchain solutions, and open challenges. Future generation computer systems, 82, pp.395-411. https://doi.org/10.1016/j.future.2017.11.022

Kumar, V., Sharma, K.V., Kedam, N., Patel, A., Kate, T.R. and Rathnayake, U., 2024. A comprehensive review on smart and sustainable agriculture using IoT technologies. Smart Agricultural Technology, 8, p.100487. https://doi.org/10.1016/j.atech.2024.100487

Laghari, A.A., Wu, K., Laghari, R.A., Ali, M. and Khan, A.A., 2022. Retracted article: A review and state of art of internet of things (IoT). Archives of Computational Methods in Engineering, 29(3), pp.1395-1413. https://doi.org/10.1007/s11831-021-09622-6

S. Sicari, A. Rizzardi, L. Grieco, and A. Coen-Porisini, “Security, Privacy and Trust in Internet of Things: The Road Ahead,” Computer Networks, vol. 76, pp. 146–164, 2015. https://doi.org/10.1016/j.comnet.2014.11.008

Sarker, I.H., Khan, A.I., Abushark, Y.B. and Alsolami, F., 2023. Internet of things (iot) security intelligence: a comprehensive overview, machine learning solutions and research directions. Mobile Networks and Applications, 28(1), pp.296-312.

https://doi.org/10.20944/preprints202203.0087.v1

Schiller, E., Aidoo, A., Fuhrer, J., Stahl, J., Ziörjen, M. and Stiller, B., 2022. Landscape of IoT security. Computer Science Review, 44, pp.1-18. https://doi.org/10.1016/j.cosrev.2022.100467

Downloads

Published

2025-12-30

How to Cite

Percy, A. S., Kwesi Bannor, E. O., Enimil, D., Ali, K. S., & Hindarsah, I. (2025). Strengthening Ghana’s Banking Security through IoT: Implications for Achieving SDG Goals. Journal of Business and Social Sciences, 2025(3), 1–14. https://doi.org/10.61453/jobss.v2025no37