AI-Enabled cybersecurity and its influence on organisational performance in the financial services sector: an empirical investigation
DOI:
https://doi.org/10.22399/ijcesen.5009Keywords:
Artificial intelligence, Cybersecurity, Financial services, Organisational performance, Technology adoption, NigeriaAbstract
This study examined the influence of AI-enabled cybersecurity on organisational performance within Nigeria’s financial services sector, grounded in the Technology Acceptance Model (TAM) and DeLone and McLean’s Information Systems Success Model. A quantitative survey collected data from 407 respondents across commercial banks, microfinance institutions, insurance companies, and investment firms using a structured Google Forms questionnaire. Results indicate that 42.75% of organisations have fully implemented AI-enabled cybersecurity, with an additional 22.11% reporting partial implementation. Statistical analysis revealed that 56.02% of respondents reported a high to very great extent of overall performance improvement. Regulatory compliance emerged as the primary performance beneficiary (34.40%), followed by risk management and security control (25.06%), and operational efficiency (19.16%).
Regarding threat mitigation, 86.49% reported slight to significant reductions in cyber fraud losses, while 78.62% rated AI systems as moderately to very effective in threat detection and prevention. Implementation challenges include high costs (50.12%) and lack of skilled personnel (22.36%). The identified critical success factors were continuous training and system updates (36.12%), adequate funding (26.54%), and skilled cybersecurity professionals (16.95%). The study validates the application of TAM and the IS Success Model to cybersecurity contexts, demonstrating that AI adoption significantly predicts organisational performance. Findings contribute to understanding AI adoption in developing economies and provide practical insights for financial institutions and policymakers. The study concludes that AI-driven cybersecurity significantly enhances organisational efficiency, resilience, and compliance in the financial services sector.
References
[1] Abomhara, M., & Køien, G. M. (2015). Cyber security and the internet of things: Vulnerabilities, threats, intruders and attacks. Journal of Cyber Security and Mobility, 4(1), 65-88.
[2] Abubakar, M., & Mohammed, A. (2025). Banking and artificial intelligence-based cybersecurity: Opportunities, challenges, and a realistic defence paradigm. Journal of Cognitive Computing and Cybernetic Innovations, 1(3), 01–06. https://doi.org/10.21276/jccci.2025.v1.i3.1
[3] Adam, M. S., Abubakar, S., & Awal, J. Y. (2024). Cybersecurity: A study on attacks, threats, and vulnerabilities. International Journal of Creative Research Thoughts, 12(8), 892–896.
[4] AllAboutAI. (2025, November 7). 33+ AI statistics in cybersecurity for 2025. https://www.allaboutai.com/resources/ai-statistics/cybersecurity/
[5] Alshamaila, Y., Papagiannidis, S., & Li, F. (2013). Cloud computing adoption by SMEs in the north east of England. Journal of Enterprise Information Management, 26(3), 250–275. https://doi.org/10.1108/17410391311325225
[6] Awa, H. O., Ojiabo, O. U., & Emecheta, B. C. (2015). Integrating TAM, TPB and TOE frameworks and expanding their characteristic constructs for e-commerce adoption by SMEs. Journal of Science & Technology Policy Management, 6(1), 76–94. https://doi.org/10.1108/JSTPM-04-2014-0012
[7] Bangar, R. C. (2024). AI-driven security solutions: Combating cyber threats with machine learning models. International Journal for Multidisciplinary Research, 6(5), 1–18.
[8] Bright, O., & Chukwudi, T. A. (2024). AI-driven cybersecurity solutions for real-time threat detection in critical infrastructure. International Journal of Science and Research Archive, 12(02), 1716-1726.
[9] Butt, I., & Muneer, A. (2024). AI-driven cybersecurity in financial services: Opportunities and challenges. Journal of Financial Crime. https://doi.org/10.1108/JFC-08-2024-0228
[10] Cohen, J. (1988). Statistical power analysis for the behavioural sciences (2nd ed.). Lawrence Erlbaum Associates.
[11] Cohen, J., Cohen, P., West, S. G., & Aiken, L. S. (2003). Applied multiple regression/correlation analysis for the behavioural sciences (3rd ed.). Routledge.
[12] Davis, F. D. (1989). Perceived usefulness, perceived ease of use, and user acceptance of information technology. MIS Quarterly, 13(3), 319–340. https://doi.org/10.2307/249008
[13] DeLone, W. H., & McLean, E. R. (2003). The DeLone and McLean model of information systems success: A ten-year update. Journal of Management Information Systems, 19(4), 9–30. https://doi.org/10.1080/07421222.2003.11045748
[14] Field, A. (2013). Discovering statistics using IBM SPSS Statistics (4th ed.). SAGE Publications.
[15] Fornell, C., & Larcker, D. F. (1981). Evaluating structural equation models with unobservable variables and measurement error. Journal of Marketing Research, 18(1), 39–50. https://doi.org/10.1177/002224378101800104
[16] Frontiers in Artificial Intelligence. (2024, December 27). The technology acceptance model and adopter type analysis in the context of artificial intelligence. https://www.frontiersin.org/journals/artificial-intelligence/articles/10.3389/frai.2024.1496518/full
[17] G7 Cyber Expert Group. (2025). Artificial intelligence and cybersecurity: Navigating risk and resilience in the financial sector. U.S. Department of the Treasury. https://home.treasury.gov/system/files/136/G7-Cyber-Expert-Group-Statement-AI-and-Cybersecurity-2025.pdf
[18] Ghelani, D., Kian, H. T., Kumar, S., & Koduru, R. (2022). Cybersecurity threats, vulnerabilities, and security solutions models in banking. American Journal of Computer Science and Technology, 5(2), 1–12. https://doi.org/10.22541/au.166385206.63311335/v1
[19] Gu, J., Xu, Y., Xu, H., Zhang, C., & Ling, H. (2017). Privacy concerns for mobile app download: An elaboration likelihood model perspective. Decision Support Systems, 94, 19-28. https://doi.org/10.1016/j.dss.2016.10.002
[20] Hair, J. F., Black, W. C., Babin, B. J., & Anderson, R. E. (2010). Multivariate data analysis (7th ed.). Pearson.
[21] Irshaad, J., & Thembekile, O. M. (2024). The impact of artificial intelligence on organisational cyber security: An outcome of a systematic literature review. Data and Information Management, 8, 100063. https://doi.org/10.1016/j.dim.2024.100063
[22] Kavitha, D., & Thejas, S. (2024). AI-enabled threat detection: Leveraging artificial intelligence for advanced security and cyber threat mitigation. IEEE Access, 12, 173127–173136. https://doi.org/10.1109/ACCESS.2024.3505789
[23] KPMG. (2025, May 26). Cybersecurity considerations 2025: Financial services sector. https://kpmg.com/xx/en/our-insights/ai-and-technology/cybersecurity-considerations-2025/financial-services.html
[24] Mamonov, S., & Benbunan-Fich, R. (2023). The impact of information security threat awareness on privacy-protective behaviours. Computers in Human Behaviour, 83, 32–44. https://doi.org/10.1016/j.chb.2018.01.028
[25] Nunnally, J. C., & Bernstein, I. H. (1994). Psychometric theory (3rd ed.). McGraw-Hill.
[26] Paula, O. P., Salvador, C. R., & Javier, S. G. (2025). Does AI private investment really matter for financial institutions’ efficiency? Evidence from a country panel. Finance Research Open, 1, 100009. https://doi.org/10.1016/j.finro.2024.100009
[27] Petter, S., DeLone, W., & McLean, E. (2008). Measuring information systems success: Models, dimensions, measures, and interrelationships. European Journal of Information Systems, 17(3), 236–263. https://doi.org/10.1057/ejis.2008.15
[28] Phi-Hung, N., The-Vu, P., Lan-Anh, T. N., Hong-Anh, T. P., Thu-Hoai, T. N., & Tra-Giang, V. (2024). Assessing cybersecurity risks and prioritising top strategies in Vietnam’s finance and banking system using strategic decision-making models based on neutrosophic sets and Z-number. Heliyon, 10, e37893. https://doi.org/10.1016/j.heliyon.2024.e37893
[29] RGP. (2025, July 10). AI in financial services 2025. https://rgp.com/research/ai-in-financial-services-2025/
[30] Sedera, D., & Gable, G. (2010). Knowledge management competence for enterprise system success. Journal of Strategic Information Systems, 19(4), 296-306. https://doi.org/10.1016/j.jsis.2010.10.001
[31] Shulha, O., Yanenkova, I., Kuzub, M., Muda, I., & Nazarenko, V. (2022). Banking information resource cybersecurity system modelling. Journal of Open Innovation: Technology, Market, and Complexity, 8(2), 80. https://doi.org/10.3390/joitmc8020080
[32] Tam, C., & Oliveira, T. (2016). Understanding the impact of m-banking on individual performance: DeLone & McLean and TTF perspective. Computers in Human Behaviour, 61, 233–244. https://doi.org/10.1016/j.chb.2016.03.016
[33] U.S. Department of the Treasury. (2024, March 27). U.S. Department of the Treasury releases report on managing artificial intelligence-specific cybersecurity risks in the financial services sector. https://home.treasury.gov/news/press-releases/jy2212
[34] Valentin, L. H., & Bruno, D. (2025). Machine learning in banking risk management: Mapping a decade of evolution. International Journal of Information Management Data Insights, 5, 100324. https://doi.org/10.1016/j.jjimei.2024.100324
[35] Venkatesh, V., & Davis, F. D. (2000). A theoretical extension of the technology acceptance model: Four longitudinal field studies. Management Science, 46(2), 186–204. https://doi.org/10.1287/mnsc.46.2.186.11926
[36] Venkatesh, V., Morris, M. G., Davis, G. B., & Davis, F. D. (2003). User acceptance of information technology: Toward a unified view. MIS Quarterly, 27(3), 425–478. https://doi.org/10.2307/30036540
[37] World Economic Forum. (2024). Global cybersecurity outlook 2024. https://www.weforum.org/reports/global-cybersecurity-outlook-2024
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2025 International Journal of Computational and Experimental Science and Engineering

This work is licensed under a Creative Commons Attribution 4.0 International License.