SlideShare a Scribd company logo
1 of 6
A Research Project Presentation
Online Policies for Enabling Financial Companies to Manage
Privacy Issues
NAME:
Course:
1
Introduction
Companies in the financial sector handle data that are priority
for hackers.
Organizations invest in vast technologies for protecting the
data from unauthorized access.
However, they do not adequately invest in behavioral measures
for safeguarding the data.
Companies in the financial sector face numerous attempts by the
cybercriminals who target stealing data stored in the systems.
The corporations handle confidential data that could be used for
committing crimes, such as impersonation and illegal transfer of
money (Noor & Hassan, 2019). It is a major concern whether
financial institutions have effective policies that ensure the data
are properly secured from both internal and external threats.
Financial companies, especially those that spread across the
country have always focused on investing in technologies that
promote the privacy of the data and the systems. They are
deploying technologies, such as cloud computing, which
promote the privacy of the data. Also, they use Bcrypt
technologies to encrypt data via algorithms that will take
hackers decades to decrypt a single password. Though they
invest in such technologies that cost millions of dollars, there
are questions whether they invest in behavioral measures to
protect the data systems (Noor & Hassan, 2019). Such measures
require the use of online policies that will ensure that internal
and the external users can adhere to best practices that make
them less vulnerable to attacks, especially the social
engineering attacks that target unsuspecting users.
2
Literature Review
Financial companies have implemented policies for promoting
desirable user behaviors.
They provide guidelines on how to use the networks.
They do not require the users to follow strict rules, which
indicates the inefficiency of the policies.
Financial companies have implemented policies on how
customers access their data remotely. Such policies outline the
standards that customers must follow such as the multi-factor
authentication, which aims at ensuring that no unauthorized
users access the data (Suchitra &Vandana, 2016). The policies
are communicated to the customers when they provide their
data. It is an effective approach that mainly ensures that
customer must follow certain guidelines that promote the
overall security of the data. However, Timothy Toohey (2014)
questions whether the policies apply to the side of the users who
are very likely to exhibit behaviors that expose data to threats.
For instance, the customers may use devices that have weak
antimalware tools. Such devices create an avenue that a hacker
can use and access the system.
3
Research Method
The researcher will employ a case-study design.
It means that the researcher will focus on individual cases and
analyze them.
Interviews and observation will be the primary tools of data.
The data will be analyzed while paying to attention to every
organization.
The study will employ a case study design. The goal of the
researcher is to find out the effectiveness of the user and online
policies that financial organizations put in place. It will
investigate whether the enforceability of the policies has a
direct impact on the security of the networks. The approach is a
multiple-case design that will utilize longitudinal examination
of the selected case studies, which are financial organizations
that have implemented online policies to safeguard data. The
analysis will tell whether the policies help lower the levels of
vulnerability. The researcher will access explanatory case
studies and examine the data closely at both deep and surface
levels. To gather the required data, interviews and observations
will be conducted. The interviews will involve IT experts and
professionals who have been in the industry in the last three to
five years. Structured interviews will be scheduled and will be
requested to provide data on the vulnerability of the systems in
relation to the online policies that have been put in place. To
avoid and suppress the presenting confounding variables, the
researcher will structure the interview questions in a manner
that will only provide information on the networks. The
questions will avoid any personal information as it might
introduce bias. Also, the interviews will centralize the data and
privacy position of the system and ask questions that closely
relate with it.
4
Results
The table outlines the various types of policies that are put in
place by the financial institutions with the aim of controlling
user behaviors. Only 78% of the current financial institutions
fully implemented most or all of the policies outlined above.
48% of the organizations implemented three or less, which
indicates that the organizations prefer the use of technical
controls more than the behavioral controls (Zachosova &
Babina, 2018).
5
Discussion
Efficiency is high if enforceability is also high.
Organizations are unable to enforce all the policies, hence the
varying levels of efficiency.
They should pay attention to policies they can enforce, such as
Acceptable Use Policies.
It is clear that the efficiency of the policies is high if there is a
high level of enforceability. It is likely for an organization to
realize better outcomes from the policies if they can enforce and
require all users, customers and workers to follow certain
guidelines. Most of the users are reluctant because they do not
consider themselves vulnerable to cyber-attacks. As such, they
exhibit behaviors, such as the use of devices without effective
and updated malware tools. To enforce the policy, the
organization should have recent technologies that can detect
such systems and block their access to the system. Such
technologies are expensive to purchase and maintain, hence not
a priority for most organizations. It is imperative to note that
enforceability is easier for the internal parties, such as workers
and the corporate personnel. Most financial institutions have IT
teams of professionals that are required to make follow-ups,
evaluate, and compile reports regarding the behaviors of the
workers. Also, they are required to offer training classes for all
the workers, hence are frequently able to identify undesirable
user behaviors, which are then addressed.
6
Conclusion
Financial companies should not only focus on the technical
controls but also the behavioral controls.
Policies with high levels of enforceability produce better
results.
Acceptable user policies, information security policies, and
access control policies have a higher level of enforceability,
hence should be emphasized.
The user policies are essential elements in the promotion of data
privacy and security for the financial organizations. The
institutions should not focus only on the data security
technologies, but should also invest in promotion of positive
user behaviors through formulating enforceable policies at both
the internal and external levels. The project has shown that the
enforceability of the user policies directly impact the
vulnerabilities in the system. The preliminary data indicates
that not all the policies put in place will have a positive impact
on the information security system. Acceptable user policies,
information security policies, and access control policies have a
higher level of enforceability, hence financial institutions
should mainly focus on them. They should be designed in a
manner that is not only simple and clear but also practical. It
will be easier for the needed follow-ups to be made and promote
the overall positive behaviors, especially from the external
parties that do not regard information security as essential.
7
References
Noor, M. M., & Hassan, W. H. (2019). Current research on
Internet of Things (IoT) security: A survey. Computer Networks
148(15), 283-294.
Suchitra, C., & Vandana , C. P. (2016). Internet of Things and
Security Issues. International Journal of Computer Science and
Mobile Computing 5(1), 133-139.
Toohey, T. J. (2014). Understanding Privacy and Data
Protection. New York, NY: Thomson Reuters.
Zachosova, N., & Babina, N. (2018). Identification Of Threats
To Financial Institutions’ Economic Security As An Element Of
The State Financial Security Regulation. Baltic Journal of
Economic Studies 4(3), 80-87.

More Related Content

Similar to A Research Project PresentationOnline Policies for Enabling Fi.docx

CRITERIA DISTINGUISHED Analyze the origins and evolution of th.docx
CRITERIA DISTINGUISHED Analyze the origins and evolution of th.docxCRITERIA DISTINGUISHED Analyze the origins and evolution of th.docx
CRITERIA DISTINGUISHED Analyze the origins and evolution of th.docxwillcoxjanay
 
Assimilation Of Security-Related Policies In U.S. Firms An Empirical Study O...
Assimilation Of Security-Related Policies In U.S. Firms  An Empirical Study O...Assimilation Of Security-Related Policies In U.S. Firms  An Empirical Study O...
Assimilation Of Security-Related Policies In U.S. Firms An Empirical Study O...Angie Miller
 
The Fund Industry Goes Social Webinar
The Fund Industry Goes Social WebinarThe Fund Industry Goes Social Webinar
The Fund Industry Goes Social WebinarNICSA
 
Building Digital Trust : The role of data ethics in the digital age
Building Digital Trust: The role of data ethics in the digital ageBuilding Digital Trust: The role of data ethics in the digital age
Building Digital Trust : The role of data ethics in the digital ageAccenture Technology
 
Benefit Mediation Effect to Influence Perception of Benefits, Perception of ...
	Benefit Mediation Effect to Influence Perception of Benefits, Perception of ...	Benefit Mediation Effect to Influence Perception of Benefits, Perception of ...
Benefit Mediation Effect to Influence Perception of Benefits, Perception of ...inventionjournals
 
Protecting business interests with policies for it asset management it-tool...
Protecting business interests with policies for it asset management   it-tool...Protecting business interests with policies for it asset management   it-tool...
Protecting business interests with policies for it asset management it-tool...IT-Toolkits.org
 
Corporate Policy Governance in Secure MD5 Data Changes and Multi Hand Adminis...
Corporate Policy Governance in Secure MD5 Data Changes and Multi Hand Adminis...Corporate Policy Governance in Secure MD5 Data Changes and Multi Hand Adminis...
Corporate Policy Governance in Secure MD5 Data Changes and Multi Hand Adminis...IOSR Journals
 
GT11_ATT_GuideBk_CyberSecurity_FINAL_V.PDF
GT11_ATT_GuideBk_CyberSecurity_FINAL_V.PDFGT11_ATT_GuideBk_CyberSecurity_FINAL_V.PDF
GT11_ATT_GuideBk_CyberSecurity_FINAL_V.PDFLaurie Mosca-Cocca
 
WIRELESS SECURITY MEASUREMENT USING DATA VALUE INDEX
WIRELESS SECURITY MEASUREMENT USING DATA VALUE INDEXWIRELESS SECURITY MEASUREMENT USING DATA VALUE INDEX
WIRELESS SECURITY MEASUREMENT USING DATA VALUE INDEXIJNSA Journal
 
2009 iapp-the corpprivacydeptmar13-2009
2009 iapp-the corpprivacydeptmar13-20092009 iapp-the corpprivacydeptmar13-2009
2009 iapp-the corpprivacydeptmar13-2009asundaram1
 
ETHICAL ISSUES WITH CUSTOMER DATA COLLECTION
ETHICAL ISSUES WITH CUSTOMER DATA COLLECTIONETHICAL ISSUES WITH CUSTOMER DATA COLLECTION
ETHICAL ISSUES WITH CUSTOMER DATA COLLECTIONPranav Godse
 
Lecture 13 oveview of etichs, fraud, and internal control- james a. hall boo...
Lecture 13  oveview of etichs, fraud, and internal control- james a. hall boo...Lecture 13  oveview of etichs, fraud, and internal control- james a. hall boo...
Lecture 13 oveview of etichs, fraud, and internal control- james a. hall boo...Habib Ullah Qamar
 
Article mis, hapzi ali, nur rizqiana, nanda suharti, nurul, anisa dwi, vin...
Article mis, hapzi ali, nur    rizqiana, nanda suharti, nurul, anisa dwi, vin...Article mis, hapzi ali, nur    rizqiana, nanda suharti, nurul, anisa dwi, vin...
Article mis, hapzi ali, nur rizqiana, nanda suharti, nurul, anisa dwi, vin...Heru Ramadhon
 
unit 3 security plans and policies.pptx
unit 3 security plans and policies.pptxunit 3 security plans and policies.pptx
unit 3 security plans and policies.pptxManushiKhatri
 
ISSC481_Term_Paper_John_Intindolo
ISSC481_Term_Paper_John_IntindoloISSC481_Term_Paper_John_Intindolo
ISSC481_Term_Paper_John_IntindoloJohn Intindolo
 
7 steps to developing a mobile device policy
7 steps to developing a mobile device policy7 steps to developing a mobile device policy
7 steps to developing a mobile device policyfudallst
 

Similar to A Research Project PresentationOnline Policies for Enabling Fi.docx (17)

CRITERIA DISTINGUISHED Analyze the origins and evolution of th.docx
CRITERIA DISTINGUISHED Analyze the origins and evolution of th.docxCRITERIA DISTINGUISHED Analyze the origins and evolution of th.docx
CRITERIA DISTINGUISHED Analyze the origins and evolution of th.docx
 
Assimilation Of Security-Related Policies In U.S. Firms An Empirical Study O...
Assimilation Of Security-Related Policies In U.S. Firms  An Empirical Study O...Assimilation Of Security-Related Policies In U.S. Firms  An Empirical Study O...
Assimilation Of Security-Related Policies In U.S. Firms An Empirical Study O...
 
The Fund Industry Goes Social Webinar
The Fund Industry Goes Social WebinarThe Fund Industry Goes Social Webinar
The Fund Industry Goes Social Webinar
 
Building Digital Trust : The role of data ethics in the digital age
Building Digital Trust: The role of data ethics in the digital ageBuilding Digital Trust: The role of data ethics in the digital age
Building Digital Trust : The role of data ethics in the digital age
 
Benefit Mediation Effect to Influence Perception of Benefits, Perception of ...
	Benefit Mediation Effect to Influence Perception of Benefits, Perception of ...	Benefit Mediation Effect to Influence Perception of Benefits, Perception of ...
Benefit Mediation Effect to Influence Perception of Benefits, Perception of ...
 
Protecting business interests with policies for it asset management it-tool...
Protecting business interests with policies for it asset management   it-tool...Protecting business interests with policies for it asset management   it-tool...
Protecting business interests with policies for it asset management it-tool...
 
Corporate Policy Governance in Secure MD5 Data Changes and Multi Hand Adminis...
Corporate Policy Governance in Secure MD5 Data Changes and Multi Hand Adminis...Corporate Policy Governance in Secure MD5 Data Changes and Multi Hand Adminis...
Corporate Policy Governance in Secure MD5 Data Changes and Multi Hand Adminis...
 
D017141823
D017141823D017141823
D017141823
 
GT11_ATT_GuideBk_CyberSecurity_FINAL_V.PDF
GT11_ATT_GuideBk_CyberSecurity_FINAL_V.PDFGT11_ATT_GuideBk_CyberSecurity_FINAL_V.PDF
GT11_ATT_GuideBk_CyberSecurity_FINAL_V.PDF
 
WIRELESS SECURITY MEASUREMENT USING DATA VALUE INDEX
WIRELESS SECURITY MEASUREMENT USING DATA VALUE INDEXWIRELESS SECURITY MEASUREMENT USING DATA VALUE INDEX
WIRELESS SECURITY MEASUREMENT USING DATA VALUE INDEX
 
2009 iapp-the corpprivacydeptmar13-2009
2009 iapp-the corpprivacydeptmar13-20092009 iapp-the corpprivacydeptmar13-2009
2009 iapp-the corpprivacydeptmar13-2009
 
ETHICAL ISSUES WITH CUSTOMER DATA COLLECTION
ETHICAL ISSUES WITH CUSTOMER DATA COLLECTIONETHICAL ISSUES WITH CUSTOMER DATA COLLECTION
ETHICAL ISSUES WITH CUSTOMER DATA COLLECTION
 
Lecture 13 oveview of etichs, fraud, and internal control- james a. hall boo...
Lecture 13  oveview of etichs, fraud, and internal control- james a. hall boo...Lecture 13  oveview of etichs, fraud, and internal control- james a. hall boo...
Lecture 13 oveview of etichs, fraud, and internal control- james a. hall boo...
 
Article mis, hapzi ali, nur rizqiana, nanda suharti, nurul, anisa dwi, vin...
Article mis, hapzi ali, nur    rizqiana, nanda suharti, nurul, anisa dwi, vin...Article mis, hapzi ali, nur    rizqiana, nanda suharti, nurul, anisa dwi, vin...
Article mis, hapzi ali, nur rizqiana, nanda suharti, nurul, anisa dwi, vin...
 
unit 3 security plans and policies.pptx
unit 3 security plans and policies.pptxunit 3 security plans and policies.pptx
unit 3 security plans and policies.pptx
 
ISSC481_Term_Paper_John_Intindolo
ISSC481_Term_Paper_John_IntindoloISSC481_Term_Paper_John_Intindolo
ISSC481_Term_Paper_John_Intindolo
 
7 steps to developing a mobile device policy
7 steps to developing a mobile device policy7 steps to developing a mobile device policy
7 steps to developing a mobile device policy
 

More from makdul

According to Davenport (2014) social media and health care are c.docx
According to Davenport (2014) social media and health care are c.docxAccording to Davenport (2014) social media and health care are c.docx
According to Davenport (2014) social media and health care are c.docxmakdul
 
According to (Fatehi, Gordon & Florida, N.D.) theoretical orient.docx
According to (Fatehi, Gordon & Florida, N.D.) theoretical orient.docxAccording to (Fatehi, Gordon & Florida, N.D.) theoretical orient.docx
According to (Fatehi, Gordon & Florida, N.D.) theoretical orient.docxmakdul
 
According to Libertarianism, there is no right to any social service.docx
According to Libertarianism, there is no right to any social service.docxAccording to Libertarianism, there is no right to any social service.docx
According to Libertarianism, there is no right to any social service.docxmakdul
 
According to Kirk (2016), most of your time will be spent working wi.docx
According to Kirk (2016), most of your time will be spent working wi.docxAccording to Kirk (2016), most of your time will be spent working wi.docx
According to Kirk (2016), most of your time will be spent working wi.docxmakdul
 
According to cultural deviance theorists like Cohen, deviant sub.docx
According to cultural deviance theorists like Cohen, deviant sub.docxAccording to cultural deviance theorists like Cohen, deviant sub.docx
According to cultural deviance theorists like Cohen, deviant sub.docxmakdul
 
According to Gray et al, (2017) critical appraisal is the proce.docx
According to Gray et al, (2017) critical appraisal is the proce.docxAccording to Gray et al, (2017) critical appraisal is the proce.docx
According to Gray et al, (2017) critical appraisal is the proce.docxmakdul
 
According to article Insecure Policing Under Racial Capitalism by.docx
According to article Insecure Policing Under Racial Capitalism by.docxAccording to article Insecure Policing Under Racial Capitalism by.docx
According to article Insecure Policing Under Racial Capitalism by.docxmakdul
 
Abstract In this experiment, examining the equivalence poi.docx
Abstract  In this experiment, examining the equivalence poi.docxAbstract  In this experiment, examining the equivalence poi.docx
Abstract In this experiment, examining the equivalence poi.docxmakdul
 
ACC 403- ASSIGNMENT 2 RUBRIC!!!Points 280Assignment 2 Audi.docx
ACC 403- ASSIGNMENT 2 RUBRIC!!!Points 280Assignment 2 Audi.docxACC 403- ASSIGNMENT 2 RUBRIC!!!Points 280Assignment 2 Audi.docx
ACC 403- ASSIGNMENT 2 RUBRIC!!!Points 280Assignment 2 Audi.docxmakdul
 
ACC 601 Managerial Accounting Group Case 3 (160 points) .docx
ACC 601 Managerial Accounting Group Case 3 (160 points) .docxACC 601 Managerial Accounting Group Case 3 (160 points) .docx
ACC 601 Managerial Accounting Group Case 3 (160 points) .docxmakdul
 
Academic Integrity A Letter to My Students[1] Bill T.docx
Academic Integrity A Letter to My Students[1]  Bill T.docxAcademic Integrity A Letter to My Students[1]  Bill T.docx
Academic Integrity A Letter to My Students[1] Bill T.docxmakdul
 
Access the Center for Disease Control and Prevention’s (CDC’s) Nu.docx
Access the Center for Disease Control and Prevention’s (CDC’s) Nu.docxAccess the Center for Disease Control and Prevention’s (CDC’s) Nu.docx
Access the Center for Disease Control and Prevention’s (CDC’s) Nu.docxmakdul
 
According to DSM 5 This patient had very many symptoms that sugg.docx
According to DSM 5 This patient had very many symptoms that sugg.docxAccording to DSM 5 This patient had very many symptoms that sugg.docx
According to DSM 5 This patient had very many symptoms that sugg.docxmakdul
 
Acceptable concerts include professional orchestras, soloists, jazz,.docx
Acceptable concerts include professional orchestras, soloists, jazz,.docxAcceptable concerts include professional orchestras, soloists, jazz,.docx
Acceptable concerts include professional orchestras, soloists, jazz,.docxmakdul
 
ACA was passed in 2010, under the presidency of Barack Obama. Pr.docx
ACA was passed in 2010, under the presidency of Barack Obama. Pr.docxACA was passed in 2010, under the presidency of Barack Obama. Pr.docx
ACA was passed in 2010, under the presidency of Barack Obama. Pr.docxmakdul
 
Access the FASB website. Once you login, click the FASB Accounting S.docx
Access the FASB website. Once you login, click the FASB Accounting S.docxAccess the FASB website. Once you login, click the FASB Accounting S.docx
Access the FASB website. Once you login, click the FASB Accounting S.docxmakdul
 
Academic Paper  Overview  This performance task was intended to asse.docx
Academic Paper  Overview  This performance task was intended to asse.docxAcademic Paper  Overview  This performance task was intended to asse.docx
Academic Paper  Overview  This performance task was intended to asse.docxmakdul
 
Academic Research Team Project PaperCOVID-19 Open Research Datas.docx
Academic Research Team Project PaperCOVID-19 Open Research Datas.docxAcademic Research Team Project PaperCOVID-19 Open Research Datas.docx
Academic Research Team Project PaperCOVID-19 Open Research Datas.docxmakdul
 
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docxAbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docxmakdul
 
Abstract                                 Structure of Abstra.docx
Abstract                                 Structure of Abstra.docxAbstract                                 Structure of Abstra.docx
Abstract                                 Structure of Abstra.docxmakdul
 

More from makdul (20)

According to Davenport (2014) social media and health care are c.docx
According to Davenport (2014) social media and health care are c.docxAccording to Davenport (2014) social media and health care are c.docx
According to Davenport (2014) social media and health care are c.docx
 
According to (Fatehi, Gordon & Florida, N.D.) theoretical orient.docx
According to (Fatehi, Gordon & Florida, N.D.) theoretical orient.docxAccording to (Fatehi, Gordon & Florida, N.D.) theoretical orient.docx
According to (Fatehi, Gordon & Florida, N.D.) theoretical orient.docx
 
According to Libertarianism, there is no right to any social service.docx
According to Libertarianism, there is no right to any social service.docxAccording to Libertarianism, there is no right to any social service.docx
According to Libertarianism, there is no right to any social service.docx
 
According to Kirk (2016), most of your time will be spent working wi.docx
According to Kirk (2016), most of your time will be spent working wi.docxAccording to Kirk (2016), most of your time will be spent working wi.docx
According to Kirk (2016), most of your time will be spent working wi.docx
 
According to cultural deviance theorists like Cohen, deviant sub.docx
According to cultural deviance theorists like Cohen, deviant sub.docxAccording to cultural deviance theorists like Cohen, deviant sub.docx
According to cultural deviance theorists like Cohen, deviant sub.docx
 
According to Gray et al, (2017) critical appraisal is the proce.docx
According to Gray et al, (2017) critical appraisal is the proce.docxAccording to Gray et al, (2017) critical appraisal is the proce.docx
According to Gray et al, (2017) critical appraisal is the proce.docx
 
According to article Insecure Policing Under Racial Capitalism by.docx
According to article Insecure Policing Under Racial Capitalism by.docxAccording to article Insecure Policing Under Racial Capitalism by.docx
According to article Insecure Policing Under Racial Capitalism by.docx
 
Abstract In this experiment, examining the equivalence poi.docx
Abstract  In this experiment, examining the equivalence poi.docxAbstract  In this experiment, examining the equivalence poi.docx
Abstract In this experiment, examining the equivalence poi.docx
 
ACC 403- ASSIGNMENT 2 RUBRIC!!!Points 280Assignment 2 Audi.docx
ACC 403- ASSIGNMENT 2 RUBRIC!!!Points 280Assignment 2 Audi.docxACC 403- ASSIGNMENT 2 RUBRIC!!!Points 280Assignment 2 Audi.docx
ACC 403- ASSIGNMENT 2 RUBRIC!!!Points 280Assignment 2 Audi.docx
 
ACC 601 Managerial Accounting Group Case 3 (160 points) .docx
ACC 601 Managerial Accounting Group Case 3 (160 points) .docxACC 601 Managerial Accounting Group Case 3 (160 points) .docx
ACC 601 Managerial Accounting Group Case 3 (160 points) .docx
 
Academic Integrity A Letter to My Students[1] Bill T.docx
Academic Integrity A Letter to My Students[1]  Bill T.docxAcademic Integrity A Letter to My Students[1]  Bill T.docx
Academic Integrity A Letter to My Students[1] Bill T.docx
 
Access the Center for Disease Control and Prevention’s (CDC’s) Nu.docx
Access the Center for Disease Control and Prevention’s (CDC’s) Nu.docxAccess the Center for Disease Control and Prevention’s (CDC’s) Nu.docx
Access the Center for Disease Control and Prevention’s (CDC’s) Nu.docx
 
According to DSM 5 This patient had very many symptoms that sugg.docx
According to DSM 5 This patient had very many symptoms that sugg.docxAccording to DSM 5 This patient had very many symptoms that sugg.docx
According to DSM 5 This patient had very many symptoms that sugg.docx
 
Acceptable concerts include professional orchestras, soloists, jazz,.docx
Acceptable concerts include professional orchestras, soloists, jazz,.docxAcceptable concerts include professional orchestras, soloists, jazz,.docx
Acceptable concerts include professional orchestras, soloists, jazz,.docx
 
ACA was passed in 2010, under the presidency of Barack Obama. Pr.docx
ACA was passed in 2010, under the presidency of Barack Obama. Pr.docxACA was passed in 2010, under the presidency of Barack Obama. Pr.docx
ACA was passed in 2010, under the presidency of Barack Obama. Pr.docx
 
Access the FASB website. Once you login, click the FASB Accounting S.docx
Access the FASB website. Once you login, click the FASB Accounting S.docxAccess the FASB website. Once you login, click the FASB Accounting S.docx
Access the FASB website. Once you login, click the FASB Accounting S.docx
 
Academic Paper  Overview  This performance task was intended to asse.docx
Academic Paper  Overview  This performance task was intended to asse.docxAcademic Paper  Overview  This performance task was intended to asse.docx
Academic Paper  Overview  This performance task was intended to asse.docx
 
Academic Research Team Project PaperCOVID-19 Open Research Datas.docx
Academic Research Team Project PaperCOVID-19 Open Research Datas.docxAcademic Research Team Project PaperCOVID-19 Open Research Datas.docx
Academic Research Team Project PaperCOVID-19 Open Research Datas.docx
 
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docxAbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
 
Abstract                                 Structure of Abstra.docx
Abstract                                 Structure of Abstra.docxAbstract                                 Structure of Abstra.docx
Abstract                                 Structure of Abstra.docx
 

Recently uploaded

Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...M56BOOKSTORE PRODUCT/SERVICE
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxAvyJaneVismanos
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentInMediaRes1
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerunnathinaik
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...jaredbarbolino94
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementmkooblal
 

Recently uploaded (20)

Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptx
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media Component
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developer
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of management
 

A Research Project PresentationOnline Policies for Enabling Fi.docx

  • 1. A Research Project Presentation Online Policies for Enabling Financial Companies to Manage Privacy Issues NAME: Course: 1 Introduction Companies in the financial sector handle data that are priority for hackers. Organizations invest in vast technologies for protecting the data from unauthorized access. However, they do not adequately invest in behavioral measures for safeguarding the data. Companies in the financial sector face numerous attempts by the cybercriminals who target stealing data stored in the systems. The corporations handle confidential data that could be used for committing crimes, such as impersonation and illegal transfer of money (Noor & Hassan, 2019). It is a major concern whether financial institutions have effective policies that ensure the data are properly secured from both internal and external threats. Financial companies, especially those that spread across the country have always focused on investing in technologies that promote the privacy of the data and the systems. They are
  • 2. deploying technologies, such as cloud computing, which promote the privacy of the data. Also, they use Bcrypt technologies to encrypt data via algorithms that will take hackers decades to decrypt a single password. Though they invest in such technologies that cost millions of dollars, there are questions whether they invest in behavioral measures to protect the data systems (Noor & Hassan, 2019). Such measures require the use of online policies that will ensure that internal and the external users can adhere to best practices that make them less vulnerable to attacks, especially the social engineering attacks that target unsuspecting users. 2 Literature Review Financial companies have implemented policies for promoting desirable user behaviors. They provide guidelines on how to use the networks. They do not require the users to follow strict rules, which indicates the inefficiency of the policies. Financial companies have implemented policies on how customers access their data remotely. Such policies outline the standards that customers must follow such as the multi-factor authentication, which aims at ensuring that no unauthorized users access the data (Suchitra &Vandana, 2016). The policies are communicated to the customers when they provide their data. It is an effective approach that mainly ensures that customer must follow certain guidelines that promote the overall security of the data. However, Timothy Toohey (2014) questions whether the policies apply to the side of the users who are very likely to exhibit behaviors that expose data to threats.
  • 3. For instance, the customers may use devices that have weak antimalware tools. Such devices create an avenue that a hacker can use and access the system. 3 Research Method The researcher will employ a case-study design. It means that the researcher will focus on individual cases and analyze them. Interviews and observation will be the primary tools of data. The data will be analyzed while paying to attention to every organization. The study will employ a case study design. The goal of the researcher is to find out the effectiveness of the user and online policies that financial organizations put in place. It will investigate whether the enforceability of the policies has a direct impact on the security of the networks. The approach is a multiple-case design that will utilize longitudinal examination of the selected case studies, which are financial organizations that have implemented online policies to safeguard data. The analysis will tell whether the policies help lower the levels of vulnerability. The researcher will access explanatory case studies and examine the data closely at both deep and surface levels. To gather the required data, interviews and observations will be conducted. The interviews will involve IT experts and professionals who have been in the industry in the last three to five years. Structured interviews will be scheduled and will be requested to provide data on the vulnerability of the systems in relation to the online policies that have been put in place. To avoid and suppress the presenting confounding variables, the researcher will structure the interview questions in a manner that will only provide information on the networks. The
  • 4. questions will avoid any personal information as it might introduce bias. Also, the interviews will centralize the data and privacy position of the system and ask questions that closely relate with it. 4 Results The table outlines the various types of policies that are put in place by the financial institutions with the aim of controlling user behaviors. Only 78% of the current financial institutions fully implemented most or all of the policies outlined above. 48% of the organizations implemented three or less, which indicates that the organizations prefer the use of technical controls more than the behavioral controls (Zachosova & Babina, 2018). 5 Discussion Efficiency is high if enforceability is also high. Organizations are unable to enforce all the policies, hence the varying levels of efficiency. They should pay attention to policies they can enforce, such as Acceptable Use Policies. It is clear that the efficiency of the policies is high if there is a high level of enforceability. It is likely for an organization to realize better outcomes from the policies if they can enforce and require all users, customers and workers to follow certain guidelines. Most of the users are reluctant because they do not
  • 5. consider themselves vulnerable to cyber-attacks. As such, they exhibit behaviors, such as the use of devices without effective and updated malware tools. To enforce the policy, the organization should have recent technologies that can detect such systems and block their access to the system. Such technologies are expensive to purchase and maintain, hence not a priority for most organizations. It is imperative to note that enforceability is easier for the internal parties, such as workers and the corporate personnel. Most financial institutions have IT teams of professionals that are required to make follow-ups, evaluate, and compile reports regarding the behaviors of the workers. Also, they are required to offer training classes for all the workers, hence are frequently able to identify undesirable user behaviors, which are then addressed. 6 Conclusion Financial companies should not only focus on the technical controls but also the behavioral controls. Policies with high levels of enforceability produce better results. Acceptable user policies, information security policies, and access control policies have a higher level of enforceability, hence should be emphasized. The user policies are essential elements in the promotion of data privacy and security for the financial organizations. The institutions should not focus only on the data security technologies, but should also invest in promotion of positive user behaviors through formulating enforceable policies at both the internal and external levels. The project has shown that the enforceability of the user policies directly impact the
  • 6. vulnerabilities in the system. The preliminary data indicates that not all the policies put in place will have a positive impact on the information security system. Acceptable user policies, information security policies, and access control policies have a higher level of enforceability, hence financial institutions should mainly focus on them. They should be designed in a manner that is not only simple and clear but also practical. It will be easier for the needed follow-ups to be made and promote the overall positive behaviors, especially from the external parties that do not regard information security as essential. 7 References Noor, M. M., & Hassan, W. H. (2019). Current research on Internet of Things (IoT) security: A survey. Computer Networks 148(15), 283-294. Suchitra, C., & Vandana , C. P. (2016). Internet of Things and Security Issues. International Journal of Computer Science and Mobile Computing 5(1), 133-139. Toohey, T. J. (2014). Understanding Privacy and Data Protection. New York, NY: Thomson Reuters. Zachosova, N., & Babina, N. (2018). Identification Of Threats To Financial Institutions’ Economic Security As An Element Of The State Financial Security Regulation. Baltic Journal of Economic Studies 4(3), 80-87.