Security and privacy of electronic banking by



Yüklə 159,16 Kb.
Pdf görüntüsü
səhifə4/13
tarix16.12.2023
ölçüsü159,16 Kb.
#183670
1   2   3   4   5   6   7   8   9   ...   13
security

Businesses
Businesses also raise concerns about this new media of interaction. Since most large transfer of 
money are done by businesses, there businesses are concerned about the security of their money, 
while considering the potential savings in time and financial charges associated with this system. 
Another business concern is connected to the customer. Businesses ponder the thought that there 
are enough potential customers who would not make a purchase because the business did not 
offer a particular payment system e.g. electronic cash, electronic check, mobile money (M-pesa). 
This would result in a loss of sales. On the other side of the coin, if this system becomes wide 
spread, this would allow more buying power to the customer which puts pressure on businesses 
to allow consumers to use electronic transfer money.
However, in terms of information security behavior within organizations, security behavior can 
be seen as part of the organizational culture and may define how employees see the organization. 
Similarly, organizational culture is a system of learned behavior, which is reflected on the level 
of end-user awareness and can have an effect on the success or failure of the information security 
process. Albrechtsen (2007) observes that users considered a user-involving approach to be 
much more effective for influencing user awareness and behavior in information security. Leach 
(2003) studied influences that affect a user's security behavior and suggested that by 
strengthening security culture organizations may have significant security gains. Debar and 
Viinikka (2006) investigated security information management as an outsourced service and 
suggested augmenting security procedures as a solution. 
Banks 
IJCSI International Journal of Computer Science Issues, Vol. 9, Issue 4, No 3, July 2012 
ISSN (Online): 1694-0814 
www.IJCSI.org
436
Copyright (c) 2012 International Journal of Computer Science Issues. All Rights Reserved.


Banks are pressured from other financial institutions to provide a wide range of financial services 
to their customers. Banks also profit from handling financial transactions, both by charging fees 
to one or more participants in a transaction and by investing the funds they hold between the 
time of deposit and the time of withdrawal, also known as the “spread”. With more financial 
transactions being processed by their central computer systems, banks are also concerned about 
the security of the system, in particular with the unwarranted access to their accounts. In 
addition, individuals are also concerned with the secrecy of their personal information. A big 
percentage of Kenyans poled expressed concern over privacy of computerized data. As more 
people are exposed to the information superhighway, privacy of information and the security that 
goes hand and hand with this information is crucial to the growth of electronic transactions.
To add further convenience to the customers, many banking institutions are working together to 
form an integrated system such as Deposit Protection Fund Board (DPFB), Kenyan Bankers 
Association, and Kenya Credit Providers Association. In addition, the Association in 
collaboration with Central Bank of Kenya established the Kenya Credit Information Sharing 
Initiative (KCISI) in August 2009. This unit operates under the ambit of the Association to 
coordinate the efforts of members to share credit information through Credit Reference Bureaus 
licensed by the Central Bank. Formal exchange of credit data among banks commenced with 
effect from August 2010. Through this initiative, the Association hopes to ensure that lenders 
make use of vital information on their debtors to differentiate between low and high risk 
borrowers. This will enhance credit risk management and eventually lead to granting of more 
favorable terms to low risk customers.

Yüklə 159,16 Kb.

Dostları ilə paylaş:
1   2   3   4   5   6   7   8   9   ...   13




Verilənlər bazası müəlliflik hüququ ilə müdafiə olunur ©azkurs.org 2024
rəhbərliyinə müraciət

gir | qeydiyyatdan keç
    Ana səhifə


yükləyin