Author:
Lessa Lemma,Gebrehawariat Daniel
Abstract
PurposeThis study is aimed at assessing the information security management practice with a focus on banking card security in selected financial institutions in Ethiopia, using an international information security standard as a benchmark. It is to identify the gaps and recommend best security practices to help financial institutions meet the required security compliance.Design/methodology/approachTwo financial sectors were purposively selected. A total of twenty-five respondents (IT executives and IT staff) were included in the study. Quantitative data was collected using the PCI-DSS (Payment Card Industry Data Security Standard) security standard questionnaire. In addition, observation and document analysis were made.FindingsThe result shows that most of the essential security management activities in the financial sectors do not comply with the international security standard. Similarly, the level of most of the indispensable security requirements that should be in place is found to be below the acceptable level. The study also revealed major security factors that prohibit the financial sectors from PCI-DSS security standard compliance.Originality/valueThis study assessed the information security management practice with a focus on banking card security and tried to figure out the limitations of security practices of the organizations surveyed based on the standard adopted. The topic has not been well explored especially in the Ethiopia context. Hence, the result can positively influence security policies, particularly in the banking sector.
Reference24 articles.
1. The effects of culture and contextual information on resource allocation decisions;Review of Accounting and Finance,2016
2. Management of information security: challenges and research directions;Communications of the Association for Information Systems,2014
3. E-banking security using cryptography, steganography and data mining;International Journal of Computer Applications,2017
Cited by
5 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. A Two-Factor Authenticated and Secure Credit Card System for E-Platforms;2024 2nd International Conference on Advancement in Computation & Computer Technologies (InCACCT);2024-05-02
2. Enhancing Zero Trust Models in the Financial Industry through Blockchain Integration: A Proposed Framework;Electronics;2024-02-23
3. Understanding the Limitations of Secure Shell (SSH) in Wireless Network Security;2023 3rd International Conference on Smart Generation Computing, Communication and Networking (SMART GENCON);2023-12-29
4. Evaluating the Role of Secure Shell (SSH) in Securing Wireless Networks;2023 3rd International Conference on Smart Generation Computing, Communication and Networking (SMART GENCON);2023-12-29
5. Investigating the Benefits of Adopting Secure Shell (SSH) in Wireless Network Security;2023 IEEE International Conference on Paradigm Shift in Information Technologies with Innovative Applications in Global Scenario (ICPSITIAGS);2023-12-28