An empirical investigation into the information management systems at a South African financial institution

The study has been triggered by the increase in information breaches in financial organizations worldwide. Such organizations may have policies and procedures, strategies and systems in place in order to mitigate the risk of information breaches, but data breaches are still on the rise. The objectiv...

Full description

Bibliographic Details
Main Authors: Ridoh Adonis, Bethuel Sibongiseni Ngcamu
Format: Article
Language:English
Published: LLC "CPC "Business Perspectives" 2016-10-01
Series:Banks and Bank Systems
Online Access:https://businessperspectives.org/images/pdf/applications/publishing/templates/article/assets/7848/BBS_en_2016_03_Adonis.pdf
_version_ 1818320453791383552
author Ridoh Adonis
Bethuel Sibongiseni Ngcamu
author_facet Ridoh Adonis
Bethuel Sibongiseni Ngcamu
author_sort Ridoh Adonis
collection DOAJ
description The study has been triggered by the increase in information breaches in financial organizations worldwide. Such organizations may have policies and procedures, strategies and systems in place in order to mitigate the risk of information breaches, but data breaches are still on the rise. The objectives of this study are to explore the shortfalls of information security on a South African financial institution and further investigate whether business processes are responsive to organization’s needs. This study employed both quantitative and qualitative research methods. Questionnaires were sent to staff level employees, and semi-structured in-depth interviews were conducted with senior management at the organization. The study revealed that employees require training on information management and that there are major training deficiencies for training officers to conduct beneficial information management training at the organization. Information security program that include business risk analysis were not implemented, which results in inadequate information management planning and decisions. A standardized or uniform house rule policy was not consistently implemented across the organization, which resulted in certain areas not protecting information. The qualitative findings revealed that the external cleaning company could obtain access to customer information, if customer data are left lying around. Furthermore, there is major misalignment between policy setters and employees in this organization. The findings allow senior managers to construct projects and program with their teams to improve the state of information management in the organization which spans across the people aspect, technology systems and general information management processes. Furthermore, external companies should start signing Non-Disclosure Agreements - which is not being done currently as this opens the door for data fraud. The organization has information management and security policies in place, but the study concluded that employees do not understand these policies and should receive specialized training to ensure understanding and, ultimately, have employees following these information security policies. Keywords: data breach, information management, business processes, information legislation. JEL Classification: G2
first_indexed 2024-12-13T10:25:15Z
format Article
id doaj.art-03e5e358699f417185485e8205053c65
institution Directory Open Access Journal
issn 1816-7403
1991-7074
language English
last_indexed 2024-12-13T10:25:15Z
publishDate 2016-10-01
publisher LLC "CPC "Business Perspectives"
record_format Article
series Banks and Bank Systems
spelling doaj.art-03e5e358699f417185485e8205053c652022-12-21T23:51:04ZengLLC "CPC "Business Perspectives"Banks and Bank Systems1816-74031991-70742016-10-01113586510.21511/bbs.11(3).2016.067848An empirical investigation into the information management systems at a South African financial institutionRidoh Adonis0Bethuel Sibongiseni NgcamuCape Peninsula University of Technology (South Africa)The study has been triggered by the increase in information breaches in financial organizations worldwide. Such organizations may have policies and procedures, strategies and systems in place in order to mitigate the risk of information breaches, but data breaches are still on the rise. The objectives of this study are to explore the shortfalls of information security on a South African financial institution and further investigate whether business processes are responsive to organization’s needs. This study employed both quantitative and qualitative research methods. Questionnaires were sent to staff level employees, and semi-structured in-depth interviews were conducted with senior management at the organization. The study revealed that employees require training on information management and that there are major training deficiencies for training officers to conduct beneficial information management training at the organization. Information security program that include business risk analysis were not implemented, which results in inadequate information management planning and decisions. A standardized or uniform house rule policy was not consistently implemented across the organization, which resulted in certain areas not protecting information. The qualitative findings revealed that the external cleaning company could obtain access to customer information, if customer data are left lying around. Furthermore, there is major misalignment between policy setters and employees in this organization. The findings allow senior managers to construct projects and program with their teams to improve the state of information management in the organization which spans across the people aspect, technology systems and general information management processes. Furthermore, external companies should start signing Non-Disclosure Agreements - which is not being done currently as this opens the door for data fraud. The organization has information management and security policies in place, but the study concluded that employees do not understand these policies and should receive specialized training to ensure understanding and, ultimately, have employees following these information security policies. Keywords: data breach, information management, business processes, information legislation. JEL Classification: G2https://businessperspectives.org/images/pdf/applications/publishing/templates/article/assets/7848/BBS_en_2016_03_Adonis.pdf
spellingShingle Ridoh Adonis
Bethuel Sibongiseni Ngcamu
An empirical investigation into the information management systems at a South African financial institution
Banks and Bank Systems
title An empirical investigation into the information management systems at a South African financial institution
title_full An empirical investigation into the information management systems at a South African financial institution
title_fullStr An empirical investigation into the information management systems at a South African financial institution
title_full_unstemmed An empirical investigation into the information management systems at a South African financial institution
title_short An empirical investigation into the information management systems at a South African financial institution
title_sort empirical investigation into the information management systems at a south african financial institution
url https://businessperspectives.org/images/pdf/applications/publishing/templates/article/assets/7848/BBS_en_2016_03_Adonis.pdf
work_keys_str_mv AT ridohadonis anempiricalinvestigationintotheinformationmanagementsystemsatasouthafricanfinancialinstitution
AT bethuelsibongiseningcamu anempiricalinvestigationintotheinformationmanagementsystemsatasouthafricanfinancialinstitution
AT ridohadonis empiricalinvestigationintotheinformationmanagementsystemsatasouthafricanfinancialinstitution
AT bethuelsibongiseningcamu empiricalinvestigationintotheinformationmanagementsystemsatasouthafricanfinancialinstitution