SlideShare a Scribd company logo
1 of 1
Download to read offline
References
Clayton, E.R. (2008). Information Management Security System.
Advanced Management Journal, Vol.17(14): p. 58-63.
Saunders, M., Lewis, P., & Thornhill, A. (2009). Research methods for
business students. Pearson Education: London.
Background & Rationale
Security is one of the major concerns of digital banking.
Digital banking dominates in the banking industry (Clayton,
2008, p. 59). While looking at the benefits of digital
banking in the current technological landscape it is also
important to pay attention to information security threats
that can impact on the use of digital banking.
Research Question
What are the information security threats
that impact on digital banking within a
financial institution?
Methodology & Design
The study used a qualitative case study approach. The
sample included employees and clients of a financial
institution. Different methods were used for data collection
from both groups including semi-structured interviews for
employees in different departments at a financial institution
and questionnaires for clients of the same financial
institution. This was done so that the researchers could
collect representative and reliable data (Saunders, Lewis
and Thornhill, 2009, p. 123).
The findings are based on data collected from
both groups, employees and clients. This was
done with the purpose of determining the
gap on the knowledge of information security
threats between clients and employees.
Phishing, profile cloning, virus/spam, and
spyware were identified as potential threats
in digital banking by clients and employees.
The findings indicate how the threats in Figure
1 are rated by employees and clients of a
financial institution. Employees and clients
rated phishing as a security threat to be
aware of most, whereas spyware is rated as a
least security threat to be aware of by clients
and employees.
Research Findings
Information security
threats in digital banking
Clients & employees of a financial institution
Ratings
Phishing
Profile Cloning
Virus/Spam
Spyware
Threats
0% 10% 20% 30% 40% 50% 60%
Employees
Clients
Figure 1
Mr Mmako, Ms Mathebula & Prof Tanya du Plessis
Department of Information & Knowledge Management | Contact: 0792635077/201207327@student.uj.ac.za
Conclusion
There are four main digital banking security threats
identified by both clients and employees of a financial
institution. The financial institution is facing a challenge of
being able to deal with the digital banking security threats.
A financial institution should always upgrade its systems to
address new security threats.

More Related Content

Viewers also liked

50 Good ideas for chasing, catching, and holding on to Google's page 1
50 Good ideas for chasing, catching, and holding on to Google's page 150 Good ideas for chasing, catching, and holding on to Google's page 1
50 Good ideas for chasing, catching, and holding on to Google's page 1Spider Trainers
 
жансултанмагзумов+автосервис+идея
жансултанмагзумов+автосервис+идеяжансултанмагзумов+автосервис+идея
жансултанмагзумов+автосервис+идеяЖансултан Магзумов
 
Family tree project_and_rubric_5th_grade
Family tree project_and_rubric_5th_gradeFamily tree project_and_rubric_5th_grade
Family tree project_and_rubric_5th_gradeedelgad
 
Dominika zatovská 1.b,soš, levice
Dominika zatovská 1.b,soš, leviceDominika zatovská 1.b,soš, levice
Dominika zatovská 1.b,soš, levicevierah
 
Progettazione e sviluppo di un software applicativo su un single board computer
Progettazione e sviluppo di un software applicativo su un single board computerProgettazione e sviluppo di un software applicativo su un single board computer
Progettazione e sviluppo di un software applicativo su un single board computerAlessandro Mascherin
 
Curriculum Vitae Michael Visschers-January 2016 v1 NED
Curriculum Vitae Michael Visschers-January 2016 v1 NEDCurriculum Vitae Michael Visschers-January 2016 v1 NED
Curriculum Vitae Michael Visschers-January 2016 v1 NEDMichael Visschers
 
Microring Extensions FAQ
Microring Extensions FAQMicroring Extensions FAQ
Microring Extensions FAQElegance-Hair
 

Viewers also liked (10)

Morica Hutchison CV
Morica Hutchison CVMorica Hutchison CV
Morica Hutchison CV
 
50 Good ideas for chasing, catching, and holding on to Google's page 1
50 Good ideas for chasing, catching, and holding on to Google's page 150 Good ideas for chasing, catching, and holding on to Google's page 1
50 Good ideas for chasing, catching, and holding on to Google's page 1
 
жансултанмагзумов+автосервис+идея
жансултанмагзумов+автосервис+идеяжансултанмагзумов+автосервис+идея
жансултанмагзумов+автосервис+идея
 
ვაჟა
ვაჟავაჟა
ვაჟა
 
Family tree project_and_rubric_5th_grade
Family tree project_and_rubric_5th_gradeFamily tree project_and_rubric_5th_grade
Family tree project_and_rubric_5th_grade
 
Dominika zatovská 1.b,soš, levice
Dominika zatovská 1.b,soš, leviceDominika zatovská 1.b,soš, levice
Dominika zatovská 1.b,soš, levice
 
Progettazione e sviluppo di un software applicativo su un single board computer
Progettazione e sviluppo di un software applicativo su un single board computerProgettazione e sviluppo di un software applicativo su un single board computer
Progettazione e sviluppo di un software applicativo su un single board computer
 
Curriculum Vitae Michael Visschers-January 2016 v1 NED
Curriculum Vitae Michael Visschers-January 2016 v1 NEDCurriculum Vitae Michael Visschers-January 2016 v1 NED
Curriculum Vitae Michael Visschers-January 2016 v1 NED
 
Microring Extensions FAQ
Microring Extensions FAQMicroring Extensions FAQ
Microring Extensions FAQ
 
Priyesh Manudhanya
Priyesh ManudhanyaPriyesh Manudhanya
Priyesh Manudhanya
 

Similar to Edwin A1 poster (2)

CYBERSECURITY STRATEGIES FOR SAFEGUARDING CUSTOMER’S DATA AND PREVENTING FINA...
CYBERSECURITY STRATEGIES FOR SAFEGUARDING CUSTOMER’S DATA AND PREVENTING FINA...CYBERSECURITY STRATEGIES FOR SAFEGUARDING CUSTOMER’S DATA AND PREVENTING FINA...
CYBERSECURITY STRATEGIES FOR SAFEGUARDING CUSTOMER’S DATA AND PREVENTING FINA...ijsc
 
Cybersecurity Strategies for Safeguarding Customer’s Data and Preventing Fina...
Cybersecurity Strategies for Safeguarding Customer’s Data and Preventing Fina...Cybersecurity Strategies for Safeguarding Customer’s Data and Preventing Fina...
Cybersecurity Strategies for Safeguarding Customer’s Data and Preventing Fina...ijsc
 
Database Security Is Vital For Any And Every Organization
Database Security Is Vital For Any And Every OrganizationDatabase Security Is Vital For Any And Every Organization
Database Security Is Vital For Any And Every OrganizationApril Dillard
 
Analyzing the Effect of Risks on Adopting Internet Banking using SEM approach
Analyzing the Effect of Risks on Adopting Internet Banking using SEM approachAnalyzing the Effect of Risks on Adopting Internet Banking using SEM approach
Analyzing the Effect of Risks on Adopting Internet Banking using SEM approachIOSRJBM
 
Customer Adoption of Internet Banking in Mauritius
Customer Adoption of Internet Banking in MauritiusCustomer Adoption of Internet Banking in Mauritius
Customer Adoption of Internet Banking in MauritiusWaqas Tariq
 
Effectiveness of fraud prevention and detection techniques in malaysian islam...
Effectiveness of fraud prevention and detection techniques in malaysian islam...Effectiveness of fraud prevention and detection techniques in malaysian islam...
Effectiveness of fraud prevention and detection techniques in malaysian islam...arsalanr
 
Healthcares Vulnerability to Ransomware AttacksResearch questio
Healthcares Vulnerability to Ransomware AttacksResearch questioHealthcares Vulnerability to Ransomware AttacksResearch questio
Healthcares Vulnerability to Ransomware AttacksResearch questioSusanaFurman449
 
A SYSTEMATIC REVIEW ON MACHINE LEARNING INSIDER THREAT DETECTION MODELS, DATA...
A SYSTEMATIC REVIEW ON MACHINE LEARNING INSIDER THREAT DETECTION MODELS, DATA...A SYSTEMATIC REVIEW ON MACHINE LEARNING INSIDER THREAT DETECTION MODELS, DATA...
A SYSTEMATIC REVIEW ON MACHINE LEARNING INSIDER THREAT DETECTION MODELS, DATA...IJNSA Journal
 
Risks and Trust in Internet Banking: Sample Evidence from Pathanamthitta Dist...
Risks and Trust in Internet Banking: Sample Evidence from Pathanamthitta Dist...Risks and Trust in Internet Banking: Sample Evidence from Pathanamthitta Dist...
Risks and Trust in Internet Banking: Sample Evidence from Pathanamthitta Dist...IOSR Journals
 
AN EFFECTIVE METHOD FOR INFORMATION SECURITY AWARENESS RAISING INITIATIVES
AN EFFECTIVE METHOD FOR INFORMATION SECURITY AWARENESS RAISING INITIATIVESAN EFFECTIVE METHOD FOR INFORMATION SECURITY AWARENESS RAISING INITIATIVES
AN EFFECTIVE METHOD FOR INFORMATION SECURITY AWARENESS RAISING INITIATIVESijcsit
 
Consumer_Perception_Of_Electronic-commerce.pdf
Consumer_Perception_Of_Electronic-commerce.pdfConsumer_Perception_Of_Electronic-commerce.pdf
Consumer_Perception_Of_Electronic-commerce.pdfRidhwanMG
 
Plagiarism Check Results· Question$ 40.00 Due in 24 hours. Wee.docx
Plagiarism Check Results· Question$ 40.00 Due in 24 hours. Wee.docxPlagiarism Check Results· Question$ 40.00 Due in 24 hours. Wee.docx
Plagiarism Check Results· Question$ 40.00 Due in 24 hours. Wee.docxstilliegeorgiana
 
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docxRunning head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docxjeanettehully
 
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docxRunning head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docxglendar3
 
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docxRunning head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docxtodd581
 
Phishing: A Field Experiment
Phishing: A Field ExperimentPhishing: A Field Experiment
Phishing: A Field ExperimentCSCJournals
 
Information Risk Insurance Concept and Basic Aspects
Information Risk Insurance Concept and Basic AspectsInformation Risk Insurance Concept and Basic Aspects
Information Risk Insurance Concept and Basic Aspectsijtsrd
 
Junyan Wu Healthcare information security control on insider threat proposal
Junyan Wu Healthcare information security control on insider threat proposalJunyan Wu Healthcare information security control on insider threat proposal
Junyan Wu Healthcare information security control on insider threat proposalJunyan Wu
 
Microfinance risk 2
Microfinance risk 2Microfinance risk 2
Microfinance risk 2behuraalok
 

Similar to Edwin A1 poster (2) (20)

CYBERSECURITY STRATEGIES FOR SAFEGUARDING CUSTOMER’S DATA AND PREVENTING FINA...
CYBERSECURITY STRATEGIES FOR SAFEGUARDING CUSTOMER’S DATA AND PREVENTING FINA...CYBERSECURITY STRATEGIES FOR SAFEGUARDING CUSTOMER’S DATA AND PREVENTING FINA...
CYBERSECURITY STRATEGIES FOR SAFEGUARDING CUSTOMER’S DATA AND PREVENTING FINA...
 
Cybersecurity Strategies for Safeguarding Customer’s Data and Preventing Fina...
Cybersecurity Strategies for Safeguarding Customer’s Data and Preventing Fina...Cybersecurity Strategies for Safeguarding Customer’s Data and Preventing Fina...
Cybersecurity Strategies for Safeguarding Customer’s Data and Preventing Fina...
 
Database Security Is Vital For Any And Every Organization
Database Security Is Vital For Any And Every OrganizationDatabase Security Is Vital For Any And Every Organization
Database Security Is Vital For Any And Every Organization
 
Analyzing the Effect of Risks on Adopting Internet Banking using SEM approach
Analyzing the Effect of Risks on Adopting Internet Banking using SEM approachAnalyzing the Effect of Risks on Adopting Internet Banking using SEM approach
Analyzing the Effect of Risks on Adopting Internet Banking using SEM approach
 
Customer Adoption of Internet Banking in Mauritius
Customer Adoption of Internet Banking in MauritiusCustomer Adoption of Internet Banking in Mauritius
Customer Adoption of Internet Banking in Mauritius
 
Effectiveness of fraud prevention and detection techniques in malaysian islam...
Effectiveness of fraud prevention and detection techniques in malaysian islam...Effectiveness of fraud prevention and detection techniques in malaysian islam...
Effectiveness of fraud prevention and detection techniques in malaysian islam...
 
ISSC451 Cybercrime.docx
ISSC451 Cybercrime.docxISSC451 Cybercrime.docx
ISSC451 Cybercrime.docx
 
Healthcares Vulnerability to Ransomware AttacksResearch questio
Healthcares Vulnerability to Ransomware AttacksResearch questioHealthcares Vulnerability to Ransomware AttacksResearch questio
Healthcares Vulnerability to Ransomware AttacksResearch questio
 
A SYSTEMATIC REVIEW ON MACHINE LEARNING INSIDER THREAT DETECTION MODELS, DATA...
A SYSTEMATIC REVIEW ON MACHINE LEARNING INSIDER THREAT DETECTION MODELS, DATA...A SYSTEMATIC REVIEW ON MACHINE LEARNING INSIDER THREAT DETECTION MODELS, DATA...
A SYSTEMATIC REVIEW ON MACHINE LEARNING INSIDER THREAT DETECTION MODELS, DATA...
 
Risks and Trust in Internet Banking: Sample Evidence from Pathanamthitta Dist...
Risks and Trust in Internet Banking: Sample Evidence from Pathanamthitta Dist...Risks and Trust in Internet Banking: Sample Evidence from Pathanamthitta Dist...
Risks and Trust in Internet Banking: Sample Evidence from Pathanamthitta Dist...
 
AN EFFECTIVE METHOD FOR INFORMATION SECURITY AWARENESS RAISING INITIATIVES
AN EFFECTIVE METHOD FOR INFORMATION SECURITY AWARENESS RAISING INITIATIVESAN EFFECTIVE METHOD FOR INFORMATION SECURITY AWARENESS RAISING INITIATIVES
AN EFFECTIVE METHOD FOR INFORMATION SECURITY AWARENESS RAISING INITIATIVES
 
Consumer_Perception_Of_Electronic-commerce.pdf
Consumer_Perception_Of_Electronic-commerce.pdfConsumer_Perception_Of_Electronic-commerce.pdf
Consumer_Perception_Of_Electronic-commerce.pdf
 
Plagiarism Check Results· Question$ 40.00 Due in 24 hours. Wee.docx
Plagiarism Check Results· Question$ 40.00 Due in 24 hours. Wee.docxPlagiarism Check Results· Question$ 40.00 Due in 24 hours. Wee.docx
Plagiarism Check Results· Question$ 40.00 Due in 24 hours. Wee.docx
 
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docxRunning head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
 
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docxRunning head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
 
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docxRunning head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
 
Phishing: A Field Experiment
Phishing: A Field ExperimentPhishing: A Field Experiment
Phishing: A Field Experiment
 
Information Risk Insurance Concept and Basic Aspects
Information Risk Insurance Concept and Basic AspectsInformation Risk Insurance Concept and Basic Aspects
Information Risk Insurance Concept and Basic Aspects
 
Junyan Wu Healthcare information security control on insider threat proposal
Junyan Wu Healthcare information security control on insider threat proposalJunyan Wu Healthcare information security control on insider threat proposal
Junyan Wu Healthcare information security control on insider threat proposal
 
Microfinance risk 2
Microfinance risk 2Microfinance risk 2
Microfinance risk 2
 

Edwin A1 poster (2)

  • 1. References Clayton, E.R. (2008). Information Management Security System. Advanced Management Journal, Vol.17(14): p. 58-63. Saunders, M., Lewis, P., & Thornhill, A. (2009). Research methods for business students. Pearson Education: London. Background & Rationale Security is one of the major concerns of digital banking. Digital banking dominates in the banking industry (Clayton, 2008, p. 59). While looking at the benefits of digital banking in the current technological landscape it is also important to pay attention to information security threats that can impact on the use of digital banking. Research Question What are the information security threats that impact on digital banking within a financial institution? Methodology & Design The study used a qualitative case study approach. The sample included employees and clients of a financial institution. Different methods were used for data collection from both groups including semi-structured interviews for employees in different departments at a financial institution and questionnaires for clients of the same financial institution. This was done so that the researchers could collect representative and reliable data (Saunders, Lewis and Thornhill, 2009, p. 123). The findings are based on data collected from both groups, employees and clients. This was done with the purpose of determining the gap on the knowledge of information security threats between clients and employees. Phishing, profile cloning, virus/spam, and spyware were identified as potential threats in digital banking by clients and employees. The findings indicate how the threats in Figure 1 are rated by employees and clients of a financial institution. Employees and clients rated phishing as a security threat to be aware of most, whereas spyware is rated as a least security threat to be aware of by clients and employees. Research Findings Information security threats in digital banking Clients & employees of a financial institution Ratings Phishing Profile Cloning Virus/Spam Spyware Threats 0% 10% 20% 30% 40% 50% 60% Employees Clients Figure 1 Mr Mmako, Ms Mathebula & Prof Tanya du Plessis Department of Information & Knowledge Management | Contact: 0792635077/201207327@student.uj.ac.za Conclusion There are four main digital banking security threats identified by both clients and employees of a financial institution. The financial institution is facing a challenge of being able to deal with the digital banking security threats. A financial institution should always upgrade its systems to address new security threats.