INFORMATION SECURITY CULTURE IN THE BANKING SECTOR IN ETHIOPIA



Similar documents
Cultivating and Assessing an Organizational Information Security Culture; an Empirical Study

Overview Classes Logistic regression (5) 19-3 Building and applying logistic regression (6) 26-3 Generalizations of logistic regression (7)

Federal Bureau of Investigation s Integrity and Compliance Program

Assessment of Factors Affecting Clinical Practice Competency of Undergraduate Health Science Students in Hawassa University, South, Ethiopia

Third Annual Study: Is Your Company Ready for a Big Data Breach?

Data Security and Privacy Principles for IBM SaaS How IBM Software as a Service is protected by IBM s security-driven culture

A secondary analysis of primary care survey data to explore differences in response by ethnicity.

Multiple logistic regression analysis of cigarette use among high school students

FSPCOMP3 Assess and mitigate the compliance risks relevant to your organisation

Complementary and alternative medicine use in Chinese women with breast cancer: A Taiwanese survey

Concealing the Medicine: Information Security Education through Game Play Thomas Monk, Johan van Niekerk and Rossouw von Solms

Security of Paper Records & Document Shredding. Sponsored by Cintas. Independently conducted by Ponemon Institute LLC Publication Date: January 2014

Linking Risk Management to Business Strategy, Processes, Operations and Reporting

An Example of SAS Application in Public Health Research --- Predicting Smoking Behavior in Changqiao District, Shanghai, China

Secure by design: taking a strategic approach to cybersecurity

Competency 1 Describe the role of epidemiology in public health

Credit Risk Analysis Using Logistic Regression Modeling

How to set the main menu of STATA to default factory settings standards

Generalized Linear Models

The importance of introducing a course on information and communication technologies for development into the information technology curriculum

ENTERPRISE RISK MANAGEMENT FRAMEWORK

Statistics 305: Introduction to Biostatistical Methods for Health Sciences

Certified Identity and Access Manager (CIAM) Overview & Curriculum

Who s next after TalkTalk?

Cybersecurity for Meaningful Use FRHA Annual Summit "Setting the Health Care Table: Politics, Economics, Health" November 20-22, 2013

MISSION VALUES. The guide has been printed by:

Risk Management Strategy and Policy. The policy provides the framework for the management and control of risk within the GOC

CYBER SECURITY. ADVISORY SERVICES Governance Risk & Compliance. Shemrick Rodney IT Specialist Consultant Antigua & St. Kitts

Free Trial - BIRT Analytics - IAAs

The Importance of Cyber Threat Intelligence to a Strong Security Posture

Data Analysis, Research Study Design and the IRB

Defining the Gap: The Cybersecurity Governance Study

Alcoholic Beverages Drinking among Female Students in a Tourist Province, Thailand

Business Plan 2012/13

Information Technology

Compliance Management, made easy

CHAPTER 5 CONCLUSION AND RECOMMENDATIONS. This descriptive study aimed to describe nurses perception of their moral

National Occupational Standards. Compliance

Example: Credit card default, we may be more interested in predicting the probabilty of a default than classifying individuals as default or not.

Binary Logistic Regression

HITRUST CSF Assurance Program

University of Michigan Dearborn Graduate Psychology Assessment Program

OMNI TECHNICAL SOLUTIONS. Business Ethics, Compliance, Anti-Corruption and Anti-Money Laundering Policy

WHITE PAPER. PCI Compliance: Are UK Businesses Ready?

Dodging Breaches from Dodgy Vendors: Tackling Vendor Risk Management in Healthcare

Is Your Company Ready for a Big Data Breach? Sponsored by Experian Data Breach Resolution

EDS Innovation Research Programme DISCUSSION PAPER SERIES. No.005 Media, Connectivity, Literacies and Ethics

An Information Security Training and Awareness Approach (ISTAAP) to Instil an Information Security- Positive Culture

Chapter Eight: Quantitative Methods

School Levels of Support. By Dr. Kristine Harms

11. Analysis of Case-control Studies Logistic Regression

Information Security Measurement Roles and Responsibilities

Tips for surviving the analysis of survival data. Philip Twumasi-Ankrah, PhD

ISO 27001: Information Security and the Road to Certification

I. Research Proposal. 1. Background

Western Australian Auditor General s Report. Information Systems Audit Report

Unit 12 Logistic Regression Supplementary Chapter 14 in IPS On CD (Chap 16, 5th ed.)

Core Fittings C-Core and CD-Core Fittings

Name: Position held: Company Name: Is your organisation ISO27001 accredited:

Weight of Evidence Module

OUTSOURCING DUE DILIGENCE FORM

Achieving Security in Workplace File Sharing. Sponsored by Axway Independently conducted by Ponemon Institute LLC Publication Date: January 2014

Call topics. September SAF RA joint call on Human and organizational factors including the value of industrial safety

Uncheck Yourself. by Karen Scarfone. Build a Security-First Approach to Avoid Checkbox Compliance. Principal Consultant Scarfone Cybersecurity

Internal audit value optimization for insurance organizations

Are doctors created equal? An investigation of online ratings by patients

NSW Government Digital Information Security Policy

Procurement Policy Note Use of Cyber Essentials Scheme certification

Is Your Company Ready for a Big Data Breach?

Summary report for UIS Regional Workshop on education statistics for Anglophone Africa 5 7 November 2012 Addis Ababa, Ethiopia

North Carolina Maternal and Perinatal Substance Abuse Initiative Study: Social Support and DSS Investigation Risk for Child Abuse or Neglect

CFE 2. Enterprise Risk Management. Study Guide - Supplemental Background Material

ADRIAN DAVIS INFORMATION SECURITY FORUM

Addis Ababa University. College Of Business and Economics. Department Of Management MBA PROGRAM

Unisys Security Insights: Global Summary A Consumer Viewpoint

Polish Financial Supervision Authority. Guidelines

Leveraging Regulatory Compliance to Improve Cyber Security

Transcription:

INFORMATION SECURITY CULTURE IN THE BANKING SECTOR IN ETHIOPIA Abiy Woretaw Information Network Security Agency, Ethiopia abiyworetaw@yahoo.com Lemma Lessa School of Information Sciences, Addis Ababa University lemma.lessa@gmail.com June 08, 2012 5th ICT 2012 Ethiopia Conference Venue: UN ECA, Addis Ababa, Ethiopia

Outline 2 Introduction Background Literature Research Motivation Research Objective Method Data Analysis Findings Conclusions and recommendations

Introduction 3 The banking sector in Ethiopia is one of the rapidly growing sectors of the country s economy. Banking business competition has stirred the advancement of services enabled by IT which in turn increased the information security risk. Information security encompasses technology, processes and people (Von Solms, 2000; Tessem and Skaraas, 2005). Although technical aspect of information security needs due attention, a more serious and under-rated aspect of information security is the human element.

Introduction (Cont d) 4 Many losses are not caused by lack of technology or faulty technology rather by users of technology and faulty human behavior. Martins and Eloff (2006) underline that the behavior of employees and their interaction with computer systems have a significant impact on the security of information. The purpose of information security culture is to address the various human factors that can affect an organization s overall information security efforts (Van Niekerk & Von Solms, 2005).

Information security culture (ISC) 5 Martins and Eloff (2006) define information security culture as the assumption about acceptable information security behavior and it can be regarded as a set of information security characteristics such as confidentiality, integrity and availability of information. Information Security Culture is a subculture in regard to general corporate functions (Schlienger & Teufel, 2003).

Information security risks and threats 6 in the banking sector Ula et al (2011) argue that information system has become the heart of modern banking in our world today. Any mishandling of confidential information asset can cause huge financial loss, and the reputation of the bank will be severely damaged. The Federal Deposit Insurance Corporation (FDIC) found Cyber thieves have cost US companies and their banks more than $15bn in the past five years.

Information security risks (Cont d) 7 Even big banks that generally do better job of security are found to be victims of security breaches. The New York giant bank, Citigroup reported a total of 360,083 North America Citi-branded credit cards were affected in the security breach that occurred in June 2011. Simply complying with the payment card industry digital security standards (PCIDSS) does not ensure credit card security. US Government is forcing banks to embrace risk-based security approach that incorporates all elements of the banks information security.

8 Approaches and Requirements to promote organizational ISC Information security culture assessment approach consists of an audit process where the perceptions, attitudes, opinions and actions of employees regarding information security can be determined. Top management commitment, participation of employees, security awareness creation, allocation of budget, enhancing trust relationship and enforcement processes are among ways of promoting ISC.

Factors that influence information 9 security culture and practices Organizational culture Top management support Information security risk analysis Information security policy Information security management standardization Information security awareness and training programs Information security compliance

Research Motivation 10 A strong conviction in a research based approach to address information security challenges in Ethiopia. As financial institutions are more sensitive to security issues, priority is given to assess the level of information security culture in the banking sector in Ethiopia. In order to develop a successful information security culture within an organization, it is essential to understand the existing information security beliefs, practices and gaps.

Research Objective 11 Assess the practiced information security culture in the banking sector in Ethiopia. Identify key gaps that need management and policy intervention so that effective information security culture can be established. Bridge the gap in researching the information security culture in the banking sector in Ethiopia.

12 Method The research is based on a widely accepted information security culture model originally developed by (Martins, 2008).

Method (Cont d) 13 A survey research method is employed in order to assess the information security culture in the banking sector in Ethiopia. The level of information security culture in the banking sector in Ethiopia is evaluated by auditing process. A primary data is collected from headquarters of 11 different banks in Addis Ababa. A questionnaire to assess information security culture, developed by (Martins, 2008), is adopted.

Method (Cont d) 14 The ISC questionnaire has 41 statements designed to assess the knowledge, information security governance, communication, change management, performance management and trust level within an organization. Bank employees in the IT or Information Systems (IS) departments are the main participants of the survey. A non-probability convenience snowball sampling technique is used to collect data from all the banks. ISC data is collected from 4 governmental (37%) and 7 private (63%) banks.

Data Analysis 15 100 questionnaires were encoded into Statistical Package for the Social Sciences (SPSS) software for data analysis. The 41 ISC statements are categorized into the following six main ISC dimensions based on existing literature: Knowledge and/or Perception dimension Information security governance and/or management dimension Communication dimension Performance management dimension Change management dimension Trust dimension Binary Logistic Regression analysis is conducted to identify predictors of dependent variables.

Findings 16 Only 31(31%) of the respondents are found to have adequate[>=50/55] information security awareness. Only 32(32%) of the collected data indicate that there is a proper information security governance [>=40/50] implemented in the banking sector in Ethiopia. Effective Communication [>=11/15] dimension indicated a slightly better score of 37(37%).

Findings (Cont d) 17 Promising trust relationship between employees and managers [>=20/25] in the banking sector is 35(35%). The level of readiness among employees to embrace information security changes [>=16/20] shows a slightly promising 38(38 %). Generally, the dimensional frequency analysis shows holistic and strategic work is needed to promote information security culture in the banking sector in Ethiopia.

Findings (Cont d) 18 Effective communication more likely affects the information security awareness development in the banks [AOR (95% CI) = 4.486(1.823, 11.040)]. Effective communication is also observed to have created a positive trust environment[aor (95% CI) = 4.594 (1.904, 11.084)]. Positive trust relationship among employees and bank management seem to promote information security culture change[aor (95% CI) = 3.481 (1.470, 8.245)]. N.B. [Adjusted Odds Ratio (95% CI) = the odds ratio(lower limit of the confidence interval, upper limit of the confidence interval)].

19 Findings (Cont d) The prevalence of information security awareness to change management is also observed from the data analysis[aor (95% CI) = 5.152 (2.071, 12.812)]. Effective information security communication positively influences the readiness of employees to change their information security culture[aor (95% CI) = 6.462 (2.629, 15.878)]. The likelihood of proper information security governance establishment due to effective performance management is also observed [AOR (95% CI) = 6.821 (2.660, 17.486)]. N.B. [Adjusted Odds Ratio (95% CI) = the odds ratio(lower limit of the confidence interval, upper limit of the confidence interval)].

Conclusions 20 Information security awareness in the banking sector in Ethiopia is unsatisfactory. Consequently, the level of proper information security governance in the banking sector in Ethiopia is a critical area of improvement. There is also a significant space to enhance the trust environment between managers and employees that can promote change in information security culture. The findings advocate the need for effective information security awareness, trust environment and communication to promote sustainable change in information security culture which enables proper information security governance and implementation that complies with local and international standards.

Recommendations 21 Banks in Ethiopia should invest in effective information security communication methods like: training employees with information security measures information security awareness programs. International information security governance standards like ISO27002 and information security management standards like ISO27001 should be implemented at organizational level. More rigorous researches are needed to frame practical strategies to enhance the information security culture in the banking (and other) sectors in Ethiopia.

22 Thank You!