Improving Security in Cashless Application
ย Objectives of the Study
To proffer an appraisal on improving security in cashless application
CHAPTERย TWO
LITERATURE REVIEW
Introductionย
This section discusses literature analysis on cashless application, cyber threats and cybercrime.ย The literature is reviewed from journals, reports, periodicals and books. Literature reviewย providesย basisย andย insightsย intoย relevantย previousย researchย andย developingย trends.ย (Saunders,ย Lewisย &ย Hill,ย 2000).ย Itย presentย theoreticalย viewsย andย ideasย ofย theย earlierย researchย thatย has been doneย in theย same field.
Theoreticalย Literatureย Review
This segment provides insights about theoretical foundation and models that support theย study.ย Thisย studyย willย useย gameย theory,ย diffusionย ofย innovationย andย technologyย acceptanceย theory as a basis of analysis. These theories and model will provide clear link connectingย dependentย variables and independent variableย asย earlier researched byย scholars.
Gameย Theory
Thisย theoryย wasย introducedย byย Neumannย andย Morgenstern,ย (1944).Theย theoryย furtherย statesย that in order to achieve fully dependable security system, there need to permit decisionย taken by a single component to consider the policies of all the other related mechanism inย theย network.ย Itย wasย laterย advancedย byย Osborneย andย Rubinstein,ย (1994)ย toย incorporateย multi-ย agent decision making. Most researchers have applied a stochastic means to prototypeย networkย securityย situationsย toย developย securityย frameworksย (Lyeย 2005),ย formationย ofย strongย networkย systems (Wu 2010), and intrusionย discoveryย schemesย (Alpcan, 2006).
Game theory comes in handy when model and analyze search large space which involveย numerous challenging scenarios. This theory has the ability to examinea thousands ofย possible circumstances before engaging in favorable action; henceforth, it can complicateย the decision making process of the network administrator to a huge scope. (Shiva andย Sankardas,ย 2010).
This theory is relevant to the study since it can be used to the analyze multi scenarios byย systems administrators, managers and network experts to formulate strategies and controlย measures protecting the systems and reducing system vulnerability. Game theory aloneย cannot be used to analyze the entire security issue since it majorly focuses on networkย systemย henceย theย needย toย focusย onย otherย theoriesย such asย Diffusionย ofย innovationย theory.
Diffusionย ofย Innovationย Theory
This theory was originated by Rodgers in 1962 after empirically analyzing more than 508ย studies on technology diffusion across various fields. In line with this theory, the decisionย toย takeย upย innovationsย isย determinedย byย fiveย issuesย regardingย theย featuresย ofย theย innovation.ย Theseย areย theย perceivedย usefulness,ย matchingย needs,ย intricacy,ย testabilityย andย visibilityย withย theย social systemย adoptingย the technologyย (Rogersย (2005, 2003).
According to Rogers (1962) the Diffusion of Innovations (DoI) Theory was as a result of contributions from the pioneering efforts in the implementation of innovations. The theory also holds that the adopters can be clustered into several categories namely innovators, early adopters, early majority, late majority and laggards. Importantly, the theory holds that customers in the innovation adoption phases differ dramatically in their features.
In the initial stages of diffusion, the invention typically taN an S shape. The phasesย alongside the innovation route are associated by the determinations of the innovator toย acclimate a technological development for conversion into an innovation product.(Easingย wood, 1988).According to Rogersโ adopters of any fresh idea could be classified asย innovators, primaryย adopters, earlyย mainstream majority, late majorityย andย laggards.
Inย theย proposedย studyย howย theย bankย managers,ย employeesย andย customersย perceiveย theย fiveย salientย featuresย identifiedย toย indicateย reliableย determinantsย ofย acceptanceย andย useย ofย electronic banking in local banks. Further, within the banks in Nigeria not all banks adoptย the e- banking technology and those that adopt do not adopt at the same time as per theย theory. In-line with this theory, the decision to take up innovations is determined by fiveย issuesย regardingย theย featuresย ofย theย innovation.ย Theseย areย theย perceivedย usefulness,ย matching needs, intricacy, testability and visibility with the social system adopting theย technology.
Technologyย Acceptanceย Modelย (TAM)
TAMย wasย originatedย byย Davisย (1989). Theย theoreticalย perspectiveย proposesย thatย theย connection between usersโ acceptance of any innovative and the usersโ supposed ease ofย use and convenience of such innovation. The TAM perspective suggests that for any newย technology,ย severalย issuesย determineย theย decisionย aboutย howย andย whenย theย technologyย willย beย used.ย Theseย issuesย includeย theย perceivedย usefulnessย andย howย easyย toย useย isย itย perceived.ย (Davisย 1989).ย TAM wasย developedย after severalย testsย byย Venkatesh and Davisย (2000).
Advertisements
Legris, Ingham & Collerette (2003) did prove that TAM is a theoretical model that canย help explain and predict user behavior of information technology. Sabi (2014) also foundย out that the TAM theoretical perspective is a reliable and was the most applied theory asย evidenced by thirty one articles or sixteen percent out of the one hundred and eighty eightย articlesย reviewed.ย Inย theย contextย ofย theย study,ย theย theoryย isย relevantย becauseย itโsย aย factorย byย which the adoption of e-banking by local banks can be rationalized. User behavior onย newlyย introducedย informationย systemsย isย aย keyย factorย inย itsย adoption.ย Inย thisย studyย weย shallย conduct a research to find out the percentages of customers enrolled for cashless application inย Nigeria this will determine the association between the expediency of information systemsย andย the usersโย perceptions.
CHAPTERย THREE
RESEARCHย METHODOLOGY
Introduction
This chapter contained the methods that were used to collect and analyze research data. Itย furtherย containsย sub-sections;ย researchย design,ย studyย population,ย theย crossย sectionย procedure, and procedures for data collections and data analysis methods. This chapterย providedย studyย framework onย the keyย areas underย focus.
Researchย Design
A research design is defined as method of careful selection of methods used to answer theย research questions and solve the research problem. According to Creswell et al (2007),ย research designs are the procedures for collecting, analyzing, interpreting and reportingย dataย inย researchย studies.ย Thisย studyย willย adoptย aย cross-sectionalย surveyย acrossย theย commercial banks in Nigeria and the data obtained will be used analyzed in line with theย objectives of the study. A cross-sectional survey as a research design will be used toย observe a defined population at a given time (Malhotra, 1996). In the study the researcherย will obtained data from 41 commercial banks. A questionnaire will be administered to theย ICTย heads and cashless applicationย managers.
CHAPTERย FOUR
DATAย ANALYSIS,ย RESULTSย ANDย DISCUSSIONS
Demographicย Information
Theย soughtย toย findย theย demographicsย informationย ofย thoseย whoย participatedย inย theย interviewย so as to rationalize the validity of data collected from 31 respondents for substantiationย purposes. It contained respondentsโ facts as captured on the questionnaires regarding riskย managements, staff competencies and ICT infrastructure strategies with regards to cyberย security measures. In order to show the effectiveness of cyber securities strategies versesย cashless applicationsย inย Nigeria,ย demographicsย informationย wasย consideredย important.
CHAPTERย FIVE
SUMMARY,ย CONCLUSIONย ANDย RECOMMENDATIONS
Introduction
This chapter looks at the outcome and the findings from the study presented in chapterย four. This entails the rationale of the study, research objectives and methodology appliedย discussed in details. Later in this chapter research summary has been given with theย researchย questionย givenย linkingย keyย variableย discussedย inย anย attemptย toย answerย theย questionย about the effects of cyber securities strategies that affects cashless applicationsย withinย theย commercialย banksย inย Nigeria.ย Briefย discussionย conclusionย andย recommendationsย forย further developmentย areย then presented.
Summary
The main objective of the study was to find out the effects of cyber security strategies onย cashless applications in Nigeria precisely on Commercial Banks. The studyย addressedย theย objective.
Toย findย outย theย effects ofย cyberย securityย strategies onย cashless applicationsย withinย Commercial Banks in Nigeria
The research design used was descriptive in nature. Data was therefore collected from 42 responses from ICT staffs and staff managing cashless application. To select the respondents for this study, it was agreed that head of ICT department within each commercial bank was interviewed and where he/she was unavailable, a representative was interviewed. Data gathered from primary sources were edited, assigned codes, analyzed using Microsoft Excel and SPSS software, and finally interpreted into meaning forms. This was then presented in the form of pie charts, percentages, figures, tables and bar graphs.
Conclusions
Toย Determineย theย Levelย ofย preparednessย inย termsย ofย Cyberย Securityย onย Commercialย Banks inย Nigeria.
The study exposedย thatย policiesย indeedย playsย a criticalย role asย far asย cybercrime isย concerned. Most to the respondent fully agreed that the availability of those properlyย formulated and documented policies that helped their bank overcome cases of cyber-ย attacks, the statistics clearly show that commercial banks have a clear understanding theย concepts cybercrime and its impacts in the banking industry, and the need to safeguardย themselvesย through theirย behaviors.
REFERENCES
- Acharya, R.N., &Kagan, A. (2004).Commercial B2B Web Site Attributes within theย Perishableย Sector.Journal of Internetย Commerce,ย 3(4)ย 79-91.
- Amaroso, E. (2011).2 Cyber Attacks: Protecting National Infrastructure.ย Burlington:ย Elsevier.
- Amboko, L.F., &Wagoki, J. (2012).Determinants of Adoption and Usage of Bankingย Innovationsย byย Consumersย forย Competitiveย Advantage:ย Aย Caseย ofย Banksย inย Nakuruย County.ย Internationalย Journal ofย Scienceย andย Researchย (IJSR)ย 3(10)ย 1597-1601.
- Atanassov, J., Nanda, V., &Seru, A. (2007). Finance and innovation: The case of publiclyย tradedย firms. Workingย Paper. Universityย of Oregon,ย Arizonaย State,ย and Chicago.
- Babbie,ย E.ย R.ย (2004). Theย Basicsย of Socialย Research.ย Wadsworth.
- Belicove, M.ย E.ย (2012,ย 10ย 26). The 10 Dos andย Don’tsย ofย Conductingย Employeeย Backgroundย Checks. Retrieved fromย Forbes:ย http://www.forbes.com/sites/mikalbelicove/2012/10/26/the-10-dos-and-donts-o-ย conducting-employee-background-checks/
- Bulgurcu, B., Cavusoglu, H., &Benbasat, I. (2010). Information Security Policyย Compliance:ย Anย Empiricalย Studyย ofย Rationality-Basedย Beliefsย andย Informationย Securityย Awareness,MISย Quarterly34(3), 523-548.
- Bhasin,ย D.ย M.ย (2007).Mitigatingย Cyberย threatsย toย Bankingย Industry.ย Theย Charteredย Accountant,ย 1618-1624.
- Cadregari, C.ย (2011). Every Silver Cloud Has a Dark Lining : A Primer on Cloudย Computing, Regulatory and Data Security Risk. ISACA JOURNAL Volume 3,1-ย 5.Retrievedย fromย ISACA.org: Dark-Lining.aspxย http://www.isaca.org/Journal/archives/2011/Volume-3/Pages/Every-Silver-ย Cloud-Has-a-
- Central Bank of Nigeria. (2008; 2013) Bank Supervision Report. Abuja: Central Bank ofย Nigeria.
- Cooper, D. R., Schindler, P. S., & Sun, J. (2003). Business Research Methods.ย Frenchย Aron (2009).ย Cybercrime:ย Conceptual Issuesย forย Congress andย U.S.ย Law
- Enforcementย (CRSย Reportย R42547.ย Washington,ย DC:ย Congressionalย Researchย Service, Julyย 20, 2012. Unitedย State