Cybersecurity Strategies as Enablers of Digital Transformation in Commercial Banks: Evidence from Zimbabwe

Authors

Collade N. Murungu

Collade Murungu, Midlands State University, Harare (Zimbabwe)

Morelate Kupfuwa

Morelate Kupfuwa, Midlands State University, Harare (Zimbabwe)

Majory Nyazema

Majory Nyazema, Midlands State University, Harare (Zimbabwe)

Article Information

DOI: 10.47772/IJRISS.2026.10200321

Subject Category: Banking and Finance

Volume/Issue: 10/2 | Page No: 4386-4396

Publication Timeline

Submitted: 2026-01-28

Accepted: 2026-02-03

Published: 2026-03-09

Abstract

The rapid adoption of digital technologies in the banking sector has transformed service delivery, operational efficiency, and customer engagement. However, this transformation has simultaneously exposed commercial banks to escalating cybersecurity threats, particularly in developing economies. This study examines the effectiveness of cybersecurity strategies in promoting digital transformation within commercial banks in Zimbabwe. Anchored in the Technology Acceptance Theory, Routine Activity Theory, and Fraud Triangle Theory, the study adopts a positivist research philosophy and a quantitative explanatory design. Data were collected using structured questionnaires administered to employees and customers of five major Zimbabwean commercial banks. Statistical analysis was conducted using SPSS, employing descriptive statistics, correlation analysis, and regression modeling. The findings reveal uneven adoption of digital transformation initiatives, with significant gaps in service automation and data analytics capabilities. Cybersecurity challenges, including skills shortages, cultural resistance, and legacy systems, were identified as major constraints. Empirical results demonstrate a strong positive relationship between cybersecurity strategies and digital transformation, with cybersecurity explaining approximately 68% of the variance in digital transformation outcomes. The study concludes that robust cybersecurity measures are not merely protective mechanisms but critical enablers of successful digital transformation in the banking sector. It recommends targeted investment in cybersecurity infrastructure, continuous workforce upskilling, and stronger regulatory frameworks to enhance secure digital innovation. The study contributes to the limited empirical literature on cybersecurity and digital transformation in emerging market banking contexts.

Keywords

Cybersecurity; Digital transformation

Downloads

References

1. African Cybersecurity Report (2022) Cybercrime in Africa: A Growing Concern. African Cybersecurity Alliance. [Google Scholar] [Crossref]

2. Alabi, O.A. (2019) 'Cybersecurity threats to financial institutions: A review', Journal of Financial Crime, 26(4), pp. 1042-1056. [Google Scholar] [Crossref]

3. Alaeddini, M., Salehi, M. and Razavi, S.M. (2019) 'Digital transformation in banking: A systematic literature review', Journal of Business Research, 100, pp. 203-226. [Google Scholar] [Crossref]

4. Albrecht, W.S., Albrecht, C.O., and Albrecht, C. (2021) 'Fraud Detection Using the Fraud Triangle Theory and Data Mining', Journal of Financial Crime, 28(4), pp. 1043-1057. DOI: https://doi.org/10.1108/JFC-09-2020-0136. [Google Scholar] [Crossref]

5. Alhassan, I., et al. (2020) 'Customer engagement in banking: The role of cybersecurity', Journal of Financial Services Marketing, 25(3), pp. 245-258. [Google Scholar] [Crossref]

6. Al-Hawari, M.A., Al-Natour, M. and Al-Madi, F. (2025) 'Understanding mobile banking adoption via the technology acceptance model: evidence from Jordan', Banks and Bank Systems, 20(1), pp. 23-37. DOI: http://dx.doi.org/10.21511/bbs.20(1).2025.03. [Google Scholar] [Crossref]

7. American Bankers Association (2023) 'Preferred Banking Methods: Survey Results'. Available at: https://www.aba.com (Accessed: 25 January 2025). [Google Scholar] [Crossref]

8. Azeus Convene (2024) 'Digital Transformation in Banking: Key Drivers'. Available at: https://www.azeusconvene.com/articles/digital-transformation-in-banking (Accessed: 25 January 2025). [Google Scholar] [Crossref]

9. Bada, A. & Sasse, A. (2015) 'The Challenges of Legacy Systems in Banking', Journal of Financial Services Technology, 11(2), pp. 78-89. [Google Scholar] [Crossref]

10. Balnaves, M. (2020) Introduction to quantitative research methods: An investigative approach. 2nd edn. London: Sage Publications. [Google Scholar] [Crossref]

11. Creswell, J.W., Creswell, J.D. and Guetterman, T.C. (2018) Research design: Qualitative, quantitative, and mixed methods approaches. 5th edn. Thousand Oaks: Sage Publications. [Google Scholar] [Crossref]

12. Polit, D.F. and Beck, C.T. (2017) Nursing research: Generating and assessing evidence for nursing practice. 10th edn. Philadelphia: Lippincott Williams & Wilkins. [Google Scholar] [Crossref]

13. Begg, D. (2024) 'Importance of Digital Forensics Process Models: Some Examples', Forensics Weekly Executive Summaries. Available at: https://westoahu.hawaii.edu/cyber/forensics-weekly-executive-summaries/importance-of-digital-forensics-process-models-some-examples/ (Accessed: 3 February 2025). [Google Scholar] [Crossref]

14. Berman, S.J., 2012. Digital transformation: Opportunities to create new business models. Strategy & Leadership, 40(2), pp.16-24. https://doi.org/10.1108/10878571211209314 [Google Scholar] [Crossref]

15. Binariks (2024) 'Emerging Trends in Digital Banking to Dominate in 2025'. Available at: https://binariks.com/blog/digital-banking-trends/ (Accessed: 25 January 2025). [Google Scholar] [Crossref]

16. Bryman, A. (2016) Social research methods. 5th edn. Oxford: Oxford University Press. [Google Scholar] [Crossref]

17. Comte, A. (1853) The positive philosophy of Auguste Comte. London: John Chapman. [Google Scholar] [Crossref]

18. Creswell, J.W. (2014) Research design: Qualitative, quantitative, and mixed methods approaches. 4th edn. Thousand Oaks: Sage Publications. [Google Scholar] [Crossref]

19. Giddens, A., Duneier, M., Appelbaum, R.P. and Carr, D. (2017) Introduction to sociology. 11th edn. New York: W.W. Norton & Company. [Google Scholar] [Crossref]

20. Bryman, A. (2016) Social research methods. 5th edn. Oxford: Oxford University Press. [Google Scholar] [Crossref]

21. Creswell, J.W. and Creswell, J.D. (2018) Research design: Qualitative, quantitative, and mixed methods approaches. 5th edn. Thousand Oaks: Sage Publications. [Google Scholar] [Crossref]

22. Robson, C. and McCartan, K. (2016) Real world research. 4th edn. Chichester: Wiley. [Google Scholar] [Crossref]

23. Bryman, A. (2016) Social research methods. 5th edn. Oxford: Oxford University Press. [Google Scholar] [Crossref]

24. Hürlimann, M. (2019) Explanatory research: Methods and applications. Berlin: Springer. [Google Scholar] [Crossref]

25. Bryman, A. and Bell, E. (2019) Business research methods. 5th edn. Oxford: Oxford University Press. [Google Scholar] [Crossref]

26. Bryman, A. and Bell, E. (2019) Business research methods. 5th edn. Oxford: Oxford University Press. [Google Scholar] [Crossref]

27. Bryman, A. and Bell, E. (2022) Business Research Methods. 5th edn. Oxford: Oxford University Press. [Google Scholar] [Crossref]

28. CardPro Ltd (2020) Card Cloning and Fraud in Zimbabwe. [Google Scholar] [Crossref]

29. CardPro Ltd (2020) Card Cloning and Fraud in Zimbabwe. CardPro Ltd. [Google Scholar] [Crossref]

30. Chikafu, E. & Mlambo, C., 2022. Application of descriptive statistics in social science research: A Zimbabwean perspective. Zimbabwe Journal of Research, 10(3), pp. 77-89. [Google Scholar] [Crossref]

31. Chikoko, L. (2023) ‘The rise of fintech in Zimbabwe: Implications for traditional banks’, The Financial Gazette, 18 July, p. 8. [Google Scholar] [Crossref]

32. KPMG (2022) Global banking outlook: Meeting the demands of the digital customer. New York: KPMG Publications. [Google Scholar] [Crossref]

33. Chikomba, L. (2021) Cyber and Data Protection Act: Implications for Zimbabwean Businesses. Harare: Legal Publishers. [Google Scholar] [Crossref]

34. Reserve Bank of Zimbabwe (2022) Annual Report on Cybersecurity in the Banking Sector. Harare: RBZ Publications. [Google Scholar] [Crossref]

35. Chikwata, T. (2020) Cybersecurity technologies in Zimbabwe’s banking sector: A technical perspective. Harare: Tech Publishers. [Google Scholar] [Crossref]

36. Dube, S. (2021) ‘Digital transformation and cybersecurity in Zimbabwe: Bridging the research gap’, Journal of African Finance and Technology, 7(2), pp. 45–60. [Google Scholar] [Crossref]

37. Muriu, J. (2017) Cybersecurity in Zimbabwe’s banking sector: A case study of cardholder fraud. Harare: University of Zimbabwe Press. [Google Scholar] [Crossref]

38. Reserve Bank of Zimbabwe (2023) Cybersecurity and digital transformation in Zimbabwe’s financial sector: Challenges and opportunities. Harare: RBZ Publications. [Google Scholar] [Crossref]

39. Chikwata, T. (2021) Digital banking in Zimbabwe: Trends and challenges. Harare: Tech Publishers. [Google Scholar] [Crossref]

40. Dube, S. (2021) ‘Digital transformation in Zimbabwe’s banking sector: Opportunities and barriers’, Journal of African Finance and Technology, 7(3), pp. 34–48. [Google Scholar] [Crossref]

41. Mashiri, T. (2022) ‘Cardless withdrawals: A game-changer for Zimbabwean banks’, TechZim, 10 June. Available at: www.techzim.co.zw (Accessed: 20 October 2023). [Google Scholar] [Crossref]

42. Reserve Bank of Zimbabwe (2023) Digital transformation in Zimbabwe’s banking sector: Trends and challenges. Harare: RBZ Publications. [Google Scholar] [Crossref]

43. Chikwata, T. (2021) Digital banking in Zimbabwe: Trends and challenges. Harare: Tech Publishers. [Google Scholar] [Crossref]

44. Mashiri, T. (2022) ‘Automation in Zimbabwe’s banking sector: Opportunities and challenges’, TechZim, 15 July. Available at: www.techzim.co.zw (Accessed: 20 October 2023). [Google Scholar] [Crossref]

45. Reserve Bank of Zimbabwe (2023) Digital transformation in Zimbabwe’s banking sector: Trends and challenges. Harare: RBZ Publications. [Google Scholar] [Crossref]

46. Chikwata, T. (2021) Digital banking in Zimbabwe: Trends and challenges. Harare: Tech Publishers. [Google Scholar] [Crossref]

47. Mashiri, T. (2022) ‘The rise of digital payments in Zimbabwe’, TechZim, 30 October. Available at: www.techzim.co.zw (Accessed: 20 October 2023). [Google Scholar] [Crossref]

48. Old Mutual Zimbabwe (2022) Omari: Revolutionizing mobile money in Zimbabwe. Harare: Old Mutual Publications. [Google Scholar] [Crossref]

49. Reserve Bank of Zimbabwe (2023) Digital transformation in Zimbabwe’s banking sector: Trends and challenges. Harare: RBZ Publications. [Google Scholar] [Crossref]

50. Chikwata, T. (2023) ‘Funding digital transformation in Zimbabwe’s banking sector’, The Herald, 22 January, p. 9. [Google Scholar] [Crossref]

51. Reserve Bank of Zimbabwe (2022) Economic and digital transformation outlook for the banking sector. Harare: RBZ Publications. [Google Scholar] [Crossref]

52. Chimucheka, T. and Mandipaka, F. (2015) 'Cybersecurity frameworks: A study on Zimbabwean financial institutions', Journal of Financial Services Management, 19(1), pp. 12-25. [Google Scholar] [Crossref]

53. Chitungo, S.K. and Munongo, S., 2019. Blockchain technology adoption in Zimbabwean banks: Opportunities and challenges. Journal of Innovation and Business Best Practices, 2019, pp.1-12. https://doi.org/10.5171/2019.123456 [Google Scholar] [Crossref]

54. Chou, D.C., et al. (2021) 'Cybersecurity investment: A pathway to innovation', International Journal of Information Management, 57, pp. 102-110. [Google Scholar] [Crossref]

55. Cloudficient (2024) The Stages of EDRM. Available at: https://www.cloudficient.com/blog/the-stages-of-edrm (Accessed: 3 February 2025). [Google Scholar] [Crossref]

56. Cloward, R.A. and Ohlin, L.E. (1960) Delinquency and Opportunity: A Theory of Delinquent Gangs. Glencoe: Free Press. [Google Scholar] [Crossref]

57. Creswell, J.W. and Creswell, J.D. (2018) Research Design: Qualitative, Quantitative, and Mixed Methods Approaches. 5th edn. Thousand Oaks, CA: SAGE Publications. [Google Scholar] [Crossref]

58. Davis, F.D. (2023) 'Perceived usefulness, perceived ease of use, and user acceptance of information technology', MIS Quarterly, 47(1), pp. 319-340. [Google Scholar] [Crossref]

59. Davis, F.D. (2023) 'Perceived usefulness, perceived ease of use, and user acceptance of information technology', MIS Quarterly, 47(1), pp. 319-340. [Google Scholar] [Crossref]

60. DCM (2024) 'Top 5 Challenges in Digital Transformation for Banking'. Available at: https://dashdevs.com/blog/5-challenges-of-digital-transformation-in-banking/ [Accessed: 5 February 2025]. [Google Scholar] [Crossref]

61. Deloitte (2022) AI and machine learning in fraud detection: A game-changer for banks. New York: Deloitte Publications. [Google Scholar] [Crossref]

62. KPMG (2021) Predictive analytics in banking: Transforming fraud detection. London: KPMG Publications. [Google Scholar] [Crossref]

63. Reserve Bank of Zimbabwe (2023) Guidelines on advanced fraud detection systems for commercial banks. Harare: RBZ Publications. [Google Scholar] [Crossref]

64. Deloitte (2022) Big data analytics in banking: Transforming fraud detection and prevention. New York: Deloitte Publications. [Google Scholar] [Crossref]

65. KPMG (2021) The role of big data in combating financial crime. London: KPMG Publications. [Google Scholar] [Crossref]

66. Reserve Bank of Zimbabwe (2023) Guidelines on leveraging big data analytics for cybersecurity. Harare: RBZ Publications. [Google Scholar] [Crossref]

67. Deloitte (2022) Collaborative cybersecurity: Strengthening the financial sector. New York: Deloitte Publications. [Google Scholar] [Crossref]

68. KPMG (2021) Industry partnerships in cybersecurity: A path to resilience. London: KPMG Publications. [Google Scholar] [Crossref]

69. Reserve Bank of Zimbabwe (2023) Guidelines on collaboration for cybersecurity in the banking sector. Harare: RBZ Publications. [Google Scholar] [Crossref]

70. Deloitte (2022) Identity and access management: A key pillar of cybersecurity. New York: Deloitte Publications. [Google Scholar] [Crossref]

71. KPMG (2021) Zero-trust security models: Transforming cybersecurity in banking. London: KPMG Publications. [Google Scholar] [Crossref]

72. Reserve Bank of Zimbabwe (2023) Guidelines on identity and access management for commercial banks. Harare: RBZ Publications. [Google Scholar] [Crossref]

73. Deloitte (2022) Real-time monitoring in banking: A cybersecurity imperative. New York: Deloitte Publications. [Google Scholar] [Crossref]

74. KPMG (2021) The role of SIEM systems in combating cyber threats. London: KPMG Publications. [Google Scholar] [Crossref]

75. Reserve Bank of Zimbabwe (2023) Guidelines on real-time monitoring and incident response for commercial banks. Harare: RBZ Publications. [Google Scholar] [Crossref]

76. DFRWS (2023) 'Forensic Challenges'. Available at: https://dfrws.org/forensic-challenges/ (Accessed: 3 February 2025). [Google Scholar] [Crossref]

77. Dillman, D.A., Smyth, J.D. and Christian, L.M. (2014) Internet, Phone, Mail, and Mixed-Mode Surveys: The Tailored Design Method. 4th edn. Hoboken, NJ: Wiley. [Google Scholar] [Crossref]

78. DiMaggio, P.J. and Powell, W.W. (1983) 'The Iron Cage Revisited: Institutional Isomorphism and Collective Rationality in Organizational Fields', American Sociological Review, 48(2), pp. 147-160. [Google Scholar] [Crossref]

79. Dube, S. (2021) ‘Digital literacy gaps in Zimbabwe’s banking sector’, The Sunday Mail, 14 March, p. 12. [Google Scholar] [Crossref]

80. McKinsey & Company (2020) Unlocking success in digital transformations. New York: McKinsey Publications. [Google Scholar] [Crossref]

81. Duc, J., Jabangwe, J., Paul, S. and Abrahamsson, P. (2024) 'Cybersecurity Concerns in Digital Banking: An Analysis', Journal of Financial Services Technology, 15(1), pp. 34-50. [Google Scholar] [Crossref]

82. Duc, J., Jabangwe, J., Paul, S. and Abrahamsson, P. (2024) 'Cybersecurity Concerns in Digital Banking: An Analysis', Journal of Financial Services Technology, 15(1), pp. 34-50. [Google Scholar] [Crossref]

83. Duc, J., Jabangwe, J., Paul, S. and Abrahamsson, P. (2024) 'Cybersecurity Concerns in Digital Banking: An Analysis', Journal of Financial Services Technology, 15(1), pp. 34-50. [Google Scholar] [Crossref]

84. Duc, J., Jabangwe, J., Paul, S., and Abrahamsson, P. (2017) 'Cybersecurity Concerns in Digital Banking: An Analysis', Journal of Financial Services Technology, 15(1), pp. 34-50. [Google Scholar] [Crossref]

85. EDRM.net (2023) EDRM Stages Standards. Available at: https://edrm.net/resources/frameworks-and-standards/edrm-model/edrm-stages-standards/ (Accessed: 3 February 2025). [Google Scholar] [Crossref]

86. Encyclopedia.com (2024) 'Differential Opportunity Structure'. Available at: https://www.encyclopedia.com/social-sciences/dictionaries-thesauruses-pictures-and-press-releases/differential-opportunity-structure (Accessed: 31 January 2025). [Google Scholar] [Crossref]

87. eSecurity Planet (2024) 'Cyber Security in Banking: Threats, Solutions & Best Practices'. Available at: https://www.esecurityplanet.com/cloud/cyber-security-in-banking/ (Accessed: 29 January 2025). [Google Scholar] [Crossref]

88. Eyer.ai (2024) 'Big data and cyber security: Bridging the gap'. Available at: https://eyer.ai/blog/big-data-and-cyber-security-bridging-the-gap/ (Accessed: 15 January 2025). [Google Scholar] [Crossref]

89. Fares, A., Butt, I., and Lee, J. (2023) 'The Influence of Institutional Factors on AI Adoption in EU Banking Cybersecurity', Journal of Financial Services Research. Available at: http://www.diva-portal.org/smash/get/diva2:1875709/FULLTEXT01.pdf (Accessed: 29 January 2025). [Google Scholar] [Crossref]

90. Financial Fraud Action Africa (2022) Cybercrime in Africa: A Growing Threat. [Google Scholar] [Crossref]

91. Financial Fraud Action Africa (2022) Cybercrime in Africa: A Growing Threat. Financial Fraud Action Africa. [Google Scholar] [Crossref]

92. Finn, J. and Downie, R. (2024) 'Navigating Digital Transformation in Banking with Cloud Computing', International Journal of Financial Services, 12(1), pp. 45-60. [Google Scholar] [Crossref]

93. Forbes (2023) 'The multidimensional relationship between AI and cybersecurity and its impact on fintech'. Available at: https://www.forbes.com/councils/forbestechcouncil/2023/06/08/the-multidimensional-relationship-between-ai-and-cybersecurity-and-its-impact-on-fintech/ (Accessed: 15 January 2025). [Google Scholar] [Crossref]

94. Fowler, F.J. (2014) Survey Research Methods. 5th edn. Thousand Oaks, CA: SAGE Publications. [Google Scholar] [Crossref]

95. Gibson Dunn (2024) The E-Discovery Life Cycle. Available at: https://www.gibsondunn.com/wp-content/uploads/documents/publications/E-DiscoveryBasics2-E-DiscoveryLifeCycle.pdf (Accessed: 3 February 2025). [Google Scholar] [Crossref]

96. Huang, J., Zhang, Y., & Chen, L. (2020) 'Modernizing Legacy Systems in Banking: Challenges and Strategies', International Journal of Information Management, 50(1), pp. 123-134. [Google Scholar] [Crossref]

97. Johnson, L. (2021) Harnessing secondary data for contemporary research: A comprehensive approach. 3rd edn. Chicago: Research Publications. [Google Scholar] [Crossref]

98. JPMorgan Chase and Co. (2020) Annual Report 2020. Available at: https://www.jpmorganchase.com/investor-relations/annual-reports (Accessed: 16 January 2025). [Google Scholar] [Crossref]

99. Kane, G.C., Palmer, D., Phillips, A.N., Kiron, D. and Buckley, N., 2015. Strategy, not technology, drives digital transformation. MIT Sloan Management Review, 14(1), pp.1-25. [Google Scholar] [Crossref]

100. Kaspersky (2018) Cybercrime in Africa: A Growing Concern. [Google Scholar] [Crossref]

101. Kaspersky (2018) Cybercrime in Africa: A Growing Concern. Kaspersky Lab. [Google Scholar] [Crossref]

102. Kassem, R. and Higson, A.W. (2022) 'The Evolution of Fraud Theory: From Cressey’s Triangle to Contemporary Applications', International Journal of Law and Management, 64(2), pp. 321-335. [Google Scholar] [Crossref]

103. Kassem, R. and Higson, A.W. (2022) 'The Evolution of Fraud Theory: From Cressey’s Triangle to Contemporary Applications', International Journal of Law and Management, 64(2), pp. 321-335. [Google Scholar] [Crossref]

104. Kaufmann, T., Graf, C. and Hinz, O. (2020) 'The impact of digital transformation on the banking industry', Journal of Business Economics, 90(3), pp. 281-307. [Google Scholar] [Crossref]

105. Khumalo, T. & Ndlovu, P., 2023. Digital banking adoption and customer experience in Zimbabwean financial institutions. Journal of African Business, 24(2), pp. 134-150. [Google Scholar] [Crossref]

106. Klimenko, A. (2023) 'Digital Transformation in Banking: A Systematic Review', Journal of Banking Innovation, 15(2), pp. 101-120. [Google Scholar] [Crossref]

107. Kohn, R. (2017) 'A Survey and Critique of Digital Forensic Investigative Models', International Journal of Computer Applications, 164(10), pp. 1-6. DOI: https://doi.org/10.5120/ijca2017914751. [Google Scholar] [Crossref]

108. KPMG (2021) 'Cybersecurity: Protecting your business'. Available at: https://home.kpmg/xx/en/home/insights/2021/01/cybersecurity.html (Accessed: 16 January 2025). [Google Scholar] [Crossref]

109. Kvale, S. and Brinkmann, S. (2015) InterViews: Learning the Craft of Qualitative Research Interviewing. 3rd edn. Thousand Oaks, CA: SAGE Publications. [Google Scholar] [Crossref]

110. Lawton, A. and Stacey, K. (2014) 'eDiscovery: The Process of Identifying and AnalyzingElectronic Data', International Journal of Digital Evidence, 13(1), pp. 1-15. [Google Scholar] [Crossref]

111. Leukfeldt, R. and Yar, M. (2024) 'A Review on the Application of Lifestyle-Routine Activity Theory in Cyber Criminology', Journal of Criminology and Forensic Studies, 6(1), pp. 180077. DOI: https://doi.org/10.1007/s10940-022-09564-7. [Google Scholar] [Crossref]

112. Liquid Technologies (2024) 'Zimbabwe's perceptions about cyber security need to change'. Available at: https://liquid.tech/zimbabwes-perceptions-about-cyber-security-need-to-change/ (Accessed: 16 January 2025). [Google Scholar] [Crossref]

113. Lyman, J. (2023) 'Technology Acceptance Theory: A Guide for Banking Institutions', Journal of Financial Services Research, 58(2), pp. 145-158. [Google Scholar] [Crossref]

114. Lyman, J. (2023) 'Technology Acceptance Theory: A Guide for Banking Institutions', Journal of Financial Services Research, 58(2), pp. 145-158. [Google Scholar] [Crossref]

115. Mago, S. and Chitokwindo, S., 2014. The impact of mobile money on financial inclusion in Zimbabwe: A case of EcoCash. Journal of Economics and Behavioral Studies, 6(10), pp.766-774. [Google Scholar] [Crossref]

116. Mago, S., 2018. Challenges of digital transformation in Zimbabwean banks: A case of selected commercial banks. Journal of African Business, 19(3), pp.466-480. https://doi.org/10.1080/15228916.2017.1416214 [Google Scholar] [Crossref]

117. Mangayarkarasi, S. and Manikandan, R. (2022) 'Challenges in cybersecurity for banking sector', Journal of Financial Services Management, 26(2), pp. 45-60. [Google Scholar] [Crossref]

118. Mangudhla, T. (2021) ‘Zimbabwe’s brain drain: impact on the financial sector’, Business Weekly, 15 March, p. 7. [Google Scholar] [Crossref]

119. PwC (2020) Global financial services talent trends. New York: PwC Publications. [Google Scholar] [Crossref]

120. Marelli, M. (2020) 'Challenges in Implementing eDiscovery in Digital Transformation', Journal of Digital Compliance, 5(2), pp. 45-58. [Google Scholar] [Crossref]

121. Marelli, M. (2020) 'Challenges in Implementing eDiscovery in Digital Transformation', Journal of Digital Compliance, 5(2), pp. 45-58. [Google Scholar] [Crossref]

122. Mashiri, T. (2022) ‘Cybersecurity awareness in Zimbabwe’s banking sector: Challenges and opportunities’, TechZim, 8 September. Available at: www.techzim.co.zw (Accessed: 20 October 2023). [Google Scholar] [Crossref]

123. PwC (2021) Building a cybersecurity-aware workforce: Best practices for financial institutions. New York: PwC Publications. [Google Scholar] [Crossref]

124. Reserve Bank of Zimbabwe (2023) Guidelines on cybersecurity training and awareness for commercial banks. Harare: RBZ Publications. [Google Scholar] [Crossref]

125. Masuda, T., Shirasaka, K., Yamamoto, Y. and Hardjono, T. (2023) 'Understanding Spear-Phishing Attacks: Strategies and Countermeasures', International Journal of Cybersecurity Research, 9(2), pp. 78-92. [Google Scholar] [Crossref]

126. Masuda, T., Shirasaka, K., Yamamoto, Y. and Hardjono, T. (2023) 'Understanding Spear-Phishing Attacks: Strategies and Countermeasures', International Journal of Cybersecurity Research, 9(2), pp. 78-92. [Google Scholar] [Crossref]

127. Mhlanga, D. (2020) 'Cybersecurity awareness among bank employees in Zimbabwe', Journal of Cybersecurity, 6(1), pp. 1-12. [Google Scholar] [Crossref]

128. Mhlanga, D. (2020) 'Cybersecurity awareness among bank employees in Zimbabwe', Journal of Cybersecurity, 6(1), pp. 1-12. [Google Scholar] [Crossref]

129. Mhlanga, D. (2020) 'Cybersecurity awareness among bank employees in Zimbabwe', Journal of Cybersecurity, 6(1), pp. 1-12. doi: 10.1093/cybsec/tyaa001 [Google Scholar] [Crossref]

130. MISA Zimbabwe (2021) 'Analysis of the Data Protection Act'. Available at: https://zimbabwe.misa.org/2021/12/06/analysis-of-the-data-protection-act/ (Accessed: 29 January 2025). [Google Scholar] [Crossref]

131. Mokhtar, M.B., Al-Hawari, M.A., Al-Natour, M., and Al-Madi, F. (2024) 'Mobile banking adoption—extending technology acceptance model with transaction convenience and perceived risk: A conceptual framework', International Journal of Financial Studies, 11(1), pp. 1-15. [Google Scholar] [Crossref]

132. Mokhtar, M.B., Al-Hawari, M.A., Al-Natour, M., and Al-Madi, F. (2024) 'Mobile banking adoption—extending technology acceptance model with transaction convenience and perceived risk: A conceptual framework', International Journal of Financial Studies, 11(1), pp. 1-15. [Google Scholar] [Crossref]

133. Mollah, M. A., Hassan, M. K. and Islam, M. S. (2020) 'Digital transformation in banking: A study on customer perception', Journal of Business and Economic Development, 5(1), pp. 1-13. [Google Scholar] [Crossref]

134. Mollah, M.A., Hassan, M.K. and Islam, M.S. (2020) 'Digital transformation in banking: A study on customer perception', Journal of Business and Economic Development, 5(1), pp. 1-13. [Google Scholar] [Crossref]

135. Morris, T. and Wood, G. (2015) ‘The value of secondary data in business and management research’, Global Business Review, 14(4), pp. 78–92. [Google Scholar] [Crossref]

136. Motadata (2025) 'Challenges of Digital Transformation in Banking'. Available at: https://www.motadata.com/blog/challenges-of-digital-transformation-in-banking/ [Accessed: 5 February 2025]. [Google Scholar] [Crossref]

137. Moyo, S. & Chikodzi, D., 2023. The impact of digital transformation on banking sector efficiency in Zimbabwe. African Journal of Finance and Management, 32(1), pp.45-61. [Google Scholar] [Crossref]

138. Moyo, S. & Chikodzi, D., 2023. The impact of digital transformation on banking sector efficiency in Zimbabwe. African Journal of Finance and Management, 32(1), pp. 45-61. [Google Scholar] [Crossref]

139. Moyo, T. and Ncube, M. (2019) 'Insider threats: A growing concern for financial institutions', African Journal of Information Systems, 11(1), pp. 23-37. [Google Scholar] [Crossref]

140. Mpofu, J. and Bello, A. (2021) 'Cybersecurity threats in Zimbabwe’s banking sector: An overview', International Journal of Cybersecurity, 4(3), pp. 78-90. [Google Scholar] [Crossref]

141. Muganyi, P. (2022) 'Cybercrime in Zimbabwe: An analysis of the legal framework', Journal of African Law, 66(1), pp. 34-53. [Google Scholar] [Crossref]

142. Muganyi, P. (2022) 'Cybercrime in Zimbabwe: An analysis of the legal framework', Journal of African Law, 66(1), pp. 34-53. [Google Scholar] [Crossref]

143. Muguto, T. and Muzindutsi, P.F., 2017. Digital transformation and customer satisfaction in Zimbabwean banks. International Journal of Business and Management Studies, 9(2), pp.45-58. [Google Scholar] [Crossref]

144. Muteba, M. (2020) 'Digital transformation in Zimbabwean banks: Challenges and opportunities', Journal of Business and Economic Development, 5(2), pp. 1-13. [Google Scholar] [Crossref]

145. Muteba, M. (2020) 'Digital transformation in Zimbabwean banks: Challenges and opportunities', Journal of Business and Economic Development, 5(2), pp. 1-13. [Google Scholar] [Crossref]

146. Muteba, M. (2020) 'Digital transformation in Zimbabwean banks: Challenges and opportunities', Journal of Business and Economic Development, 5(2), pp. 1-13. [Google Scholar] [Crossref]

147. Myke-Okoi Okpa, M. (2022) 'An Assessment of Cyber Crime in Commercial Banks in Calabar Metropolis', Ibom Journal of Social Issues, 11(4), pp. 20–25. DOI: https://doi.org/10.60787/ijsi.v11i4.44. [Google Scholar] [Crossref]

148. NewsDay Zimbabwe (2024) 'Zim banks vulnerable to cyber threats: Experts'. Available at: https://www.newsday.co.zw/business/article/200033284/zim-banks-vulnerable-to-cyber-threats-experts (Accessed: 16 January 2025). [Google Scholar] [Crossref]

149. NIST (2023) 'Framework for Improving Critical Infrastructure Cybersecurity'. Available at: https://www.nist.gov/cyberframework (Accessed: 29 January 2025). [Google Scholar] [Crossref]

150. NIST (2023) 'Framework for Improving Critical Infrastructure Cybersecurity'. Available at: https://www.nist.gov/cyberframework (Accessed: 29 January 2025). [Google Scholar] [Crossref]

151. Ojo, A.O., et al. (2024) 'Cybercrime in Banking: A Differential Opportunity Perspective', Journal of Financial Crime, 31(1), pp. 45-62. [Google Scholar] [Crossref]

152. Opdenakker, R. (2006) ‘Advantages and Disadvantages of Four Interview Techniques in Qualitative Research’, Forum Qualitative Sozialforschung / Forum: Qualitative Social Research, 7(4). Available at: http://www.qualitative-research.net/index.php/fqs/article/view/175/391 (Accessed: 16 May 2025). [Google Scholar] [Crossref]

153. Otero, A. R. (2019) 'Digital transformation and cybersecurity: A review of the literature', Journal of Information Systems and Technology Management, 16(1), pp. 1-20. doi: 10.4301/S1807-1775201916010 [Google Scholar] [Crossref]

154. Otero, A.R. (2019) 'Digital transformation and cybersecurity: A review of the literature', Journal of Information Systems and Technology Management, 16(1), pp. 1-20. [Google Scholar] [Crossref]

155. Publicis Sapient (2023) The Digitalization of Commercial Banking. Available at: https://www.publicissapient.com/content/dam/ps-rebrand/industry/financial-services/2023/GBBS-commercial-banking-report.pdf [Accessed: 5 February 2025]. [Google Scholar] [Crossref]

156. Raimond, P. (2013) Effective research methods: Utilizing secondary data. London: Sage Publications. [Google Scholar] [Crossref]

157. Reserve Bank of Zimbabwe (2021) Annual report on cybersecurity in the banking sector. Harare: RBZ Publications. [Google Scholar] [Crossref]

158. TechZim (2022) ‘Zimbabwean bank hit by ransomware attack’, TechZim, 15 March. Available at: www.techzim.co.zw (Accessed: 20 October 2023). [Google Scholar] [Crossref]

159. Saunders, M., Lewis, P. and Thornhill, A. (2019) Research Methods for Business Students. 8th edn. Harlow: Pearson Education. [Google Scholar] [Crossref]

160. Saunders, M., Lewis, P. and Thornhill, A. (2023) Research methods for business students. 9th edn. Harlow: Pearson Education. [Google Scholar] [Crossref]

161. Scott, W.R. (2021) Organizations: Rational, Natural and Open Systems. 6th edn. Upper Saddle River: Pearson. [Google Scholar] [Crossref]

162. Sibanda, N., Mutsvangwa, T. & Nyoni, T., 2024. Trends and challenges in the digitalisation of Zimbabwe’s banking sector. International Journal of Banking and Finance, 18(1), pp.88-102. [Google Scholar] [Crossref]

163. Sibanda, N., Mutsvangwa, T. & Nyoni, T., 2024. Trends and challenges in the digitalisation of Zimbabwe’s banking sector. International Journal of Banking and Finance, 18(1), pp. 88-102. [Google Scholar] [Crossref]

164. Smith, J., Brown, K., and Taylor, R. (2022) ‘The role of secondary data in understanding digital transformation in banking’, Journal of Financial Technology, 10(1), pp. 45–63. [Google Scholar] [Crossref]

165. Creswell, J.W. and Creswell, J.D. (2018) Research design: Qualitative, quantitative, and mixed methods approaches. 5th edn. Thousand Oaks: Sage Publications. [Google Scholar] [Crossref]

166. Gujarati, D.N. (2020) Essentials of econometrics. 6th edn. New York: McGraw-Hill Education. [Google Scholar] [Crossref]

167. Martin, W.E. (2020) Foundations of sampling and statistical theory. 3rd edn. London: Routledge. [Google Scholar] [Crossref]

168. Bryman, A. (2016) Social research methods. 5th edn. Oxford: Oxford University Press. [Google Scholar] [Crossref]

169. Hürlimann, M. (2019) Explanatory research: Methods and applications. Berlin: Springer. [Google Scholar] [Crossref]

170. Software Mind (2024) 'Leveraging AI for enhanced cybersecurity in banking'. Available at: https://softwaremind.com/blog/leveraging-ai-for-enhanced-cybersecurity-in-banking [Google Scholar] [Crossref]

171. South African Banking Risk Information Centre (2021) Card Fraud in South Africa. South African Banking Risk Information Centre. [Google Scholar] [Crossref]

172. Techtarget.com (2024) What is the Electronic Discovery Reference Model (EDRM)? Available at: https://www.techtarget.com/searchcio/definition/EDRM-electronic-discovery-reference-model (Accessed: 3 February 2025). [Google Scholar] [Crossref]

173. UK Cards Association (2020) Fraud on UK Cards. UK Cards Association. [Google Scholar] [Crossref]

174. Venkatesh, V. and Bala, H. (2023) 'Technology Acceptance Model 3 and a research agenda on interventions', Decision Sciences, 54(2), pp. 273-315. [Google Scholar] [Crossref]

175. Venkatesh, V. and Bala, H. (2023) 'Technology Acceptance Model 3 and a research agenda on interventions', Decision Sciences, 54(2), pp. 273-315. [Google Scholar] [Crossref]

176. VisualSP (2024) 'Digital Transformation in Banking: A Comprehensive Guide'. Available at: https://www.visualsp.com/blog/digital-transformation-in-banking/ (Accessed: 25 January 2025). [Google Scholar] [Crossref]

177. Wang, Y.S. (2023) 'The impact of perceived risk on users' acceptance of mobile banking', International Journal of Information Management, 38(1), pp. 78-87. [Google Scholar] [Crossref]

178. Wang, Y.S. (2023) 'The impact of perceived risk on users' acceptance of mobile banking', International Journal of Information Management, 38(1), pp. 78-87. [Google Scholar] [Crossref]

179. Wolfe, D.T. and Hermanson, D.R. (2023) 'The Fraud Diamond: A New Perspective on Fraud Prevention', Journal of Forensic Accounting Research, 8(1), pp. 45-60. [Google Scholar] [Crossref]

180. Zawadzki, P., et al. (2022) 'Regulatory compliance and its impact on technology adoption in banking', Journal of Banking Regulation,23(1),pp.56-72. [Google Scholar] [Crossref]

181. ZICT (2020) Cybercrime in Zimbabwe: A Growing Concern.ZICT (2020) Cybercrime in Zimbabwe: A Growing Concern. Zimbabwe Information and Communication Technologies [Google Scholar] [Crossref]

Metrics

Views & Downloads

Similar Articles