First, they have an obligation to make certain that they can participate in the global economy to give their citizens the same chances for advancement as other nations. Secondly, they have a moral obligation to do everything possible to keep their citizens safe.
When one discusses the topic of security in Information and Communication Technology (ICT), much of the discussion focuses on the technology itself. Currently, the South African banking industry is attempting to establish standards that represent best practices in information security (Tshinu, Botha, and Herselman, 2008). These measures currently focus on the technological aspects of information security. However, the development of industry-wide best practices must take all sources of vulnerability into consideration, including the moral and ethical responsibility to keep information safe.
Therefore, the development of best practices cannot ignore the human factor in security and the division of responsibility between the banking institutions and the banking customers. This research will help it professionals in the banking industry to focus on all of the factors that affect information security, including human factor. The human factor cannot be ignored in the development of standards that pose a solution to the problems regarding information security in the South African banking system. One of the key issues is the shifting of responsibility in crime preventions. The citizens want to feel safe and as if they do not have to worry about their personal information. However, banks cannot do it without them. The citizens must take on a greater responsibility and help banks to fulfill their moral responsibility to keep their information safe. This research will argue that crime prevention is everyone's moral and ethical responsibility.
The scope of the problem is huge and affects all players in the banking industry. The size of the thefts that have occurred are overwhelming. In July of 2009, an SMS scandal involving Vodacom customers amounted in a multimillion-rand SMS authentication scam (the Star, 2009). This scam was one of the largest of its kind and demonstrates that even advanced SMS authentication processes are still vulnerable. They are a step above the username and password systems, but this crime demonstrates that even these systems are still vulnerable.
This scam was carried out using email and phishing to get the customer to divulge their username and password. The scammers masqueraded as a trustworthy source that fooled many customers. In this case, the customer was the one who took actions that caused the crime. If the banks are doing everything possible to prevent phishing sites, the question could be raised as to if they responsible when a customer voluntarily provides the phisher with information that leads to theft. The incidents of cyber crime that are occurring in South Africa are massive, both in the number of them that are occurring and in the amount of rands that are being compromised. This would be similar to a question of whether someone else is responsible if a person breaks into a house using a door that was left unlocked intentionally by the occupant. In these circumstances should the insurance pay. In many cases, they do not. So why should someone else pay for damage caused by information provided to a phisher? These are the moral and ethical questions that must be asked in order for South Africa to be ready for the leap into the global market. The scope of the problem makes it an important topic for study. The scope of the problem and the need to bring South Africa up to global standards is a key reason for the conduct of this study.
3. THEORETICAL FRAMEWORK
The theoretical framework is a group of unifying ideas that will govern the research process. The key guiding principle of the study will focus on the need to enhance the human factor in online banking security. It will focus on the need to balance the technological aspects of IS with the human factors. It will provide guidelines for the development of best practices that can be used by the South African banking industry to improve information security across the entire sector. It will address the questions of moral and ethical responsibility as outlined in the previous sections. The theoretical framework of the study is based on the guiding principle that increasing awareness regarding personal information, combined with the necessary technological advances will provide the best solution to improving information security in South Africa.
4. RESEARCH METHODOLOGY
Research into the field of information security...
Information Systems Have Changed the Way We Collaborate and Work in Significant Ways Introduction to Information System within an organization Computers are continuously being used in organizations since the appearance of first ever application of this technological equipment that could be helpful in supporting organizational work. It is unavoidable in modern and up-to-date organizations where there is diversity in the organizational work and all related activities. In the early years, Information System
Information Systems for Healthcare Management Of the many enterprises that rely on information systems to attain their objectives, healthcare management is the most challenging and costly. The combination of highly complex application, systems and platform trade-offs, along with the need for continual government compliance makes information systems in healthcare one of the most difficult areas to attain best practices in of any IT area (Le Rouge, De Leo, 2010). The intent
Information Systems Outsourcing Advantage and Risks There appears to be some confusion and trepidation about the use of outsourcing for Information Systems in today's organizations. While some advocate for the use of IS outsourcing still others state claims that it is not an effective or efficient organizational practice. The objective of the research contained in this study is to determine the effectiveness and efficiency of information systems outsourcing practices. The significance of the
Information Systems Define an Information System and Types of Information Systems An information system comprises the hardware and software components necessary to create, store, manage, share, and maintain data. The type of information system selected depends on the specific needs of the user or the organization. There are three basic types of information systems: transaction information systems, management information systems, and decision support systems ("Types of Information Systems," n.d.). Decision support systems are
Information System Briefing the Process of selecting & acquiring an Information System (IS) for Healthcare: Any medical organization planning to go for an IS must choose an efficient Electronic Patient Record -- EPR which is the starting point of any computerized system. Effectiveness of the following points must drive the process of selection and acquisition of an IS. These are (i) Patient care which is the documented record of every patient undergoing
The use of it systems and technologies is then secondary to the supporting of key business processes that unify an organization. A solid organizational framework can save a company literally millions of dollars in bad it and technical systems by making sure every information asset and initiatives aligns to strategic plans and initiatives. Big Data, Cloud Computing and Social Networks -- the Data Explosion The last five years have seen the
Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.
Get Started Now