Spelling suggestions: "subject:"fineline banking security"" "subject:"hineline banking security""
1 |
Perceptions Towards On-line Banking Security: An Empirical Investigation of a Developing Country`s Banking Sector, how secure is On-line BankingBongani Ngwenya, Khanyisa Malufu 01 December 2012 (has links)
Information systems concentrate data in computer files
that have the potential to be accessed by large numbers
of people in and outside of organisations. While security
breaches and damages of information systems still come
from organisational insiders, security breaches are
increasing, especially in developing countries because
organisations are now open to outsiders through the
internet. As a result, automated data are more susceptible
to error, destruction, fraud and misuse.
The banking sector in Zimbabwe has introduced, of late,
on-line banking facilities and these are heavily
dependent on the use of internet. / The increase in computer crime has led to scepticism about the
move made by the banks to introduce on-line banking. Some
view this as a noble move which has made the banking system
more efficient, reliable and secure, while others view it as a
risky and insecure way of banking. The aim of this study was
to assess whether on-line banking in the developing countries
is secure or not. The researcher chose a descriptive-quantitative
research design. Data was collected using a self constructed
questionnaire. Convenience sampling and stratified random
sampling techniques were used to select the main subjects of
the study. Generally on average there was no significant
difference between the perceptions of management bank
personnel and non-management bank personnel on the security
of on-line banking. The study recommends further future
studies on the security of on-line banking in developing
countries based on the perceptions of the customers
themselves, who are using on-line banking services, the
Common Criteria for Information Technology Security and
also a study of the latent dimensions of on-line banking
security as extracted by factor analysis, how they differ from
elements of information security as derived from the theoretical
framework and literature.
|
Page generated in 0.0929 seconds