A Web Based Employees' Cyber Security Ethical Behavior Assessment (ECEBA) Model for Ugandan Commercial Banks

Authors

  • Nakato Ruth Mbarara University of Science and Technology
  • Mayoka G. Kituyi Makerere University Business School
  • Fred Kaggwa Mbarara University of science and Technology

DOI:

https://doi.org/10.47672/ajce.1513

Keywords:

Cyber Security, Ethical Behavior, Web Based

Abstract

Purpose: Despite the existence of Cyber Security technical controls, checklists, and formal procedures in the banks; there exists no employees' assessment tool for Cyber Security ethical behavior. This research presents the creation of such a tool. This research aimed at enhancing Cyber Security by developing a Cyber-Security Ethical Behavior Assessment (ECEBA) model.

Methodology: ECEBA model was used as an experimentation instrument for the development of a web-based application (ETHICA) for assessing Cyber Security ethical behavior. Unified Modelling Language (UML) was used. The ECEBA model followed the reuse concept by customizing the 3-tier architecture of the web application development.  The front end interface was done using HTML5 to design the web interfaces of the ETHICA Application. To style the interfaces, CSS3 was used. Then JavaScript was used as a client side script to validate the data before submitting it to the server. AJAX a JavaScript library was used to allow submission and loading of data. Bootstrap was used to achieve responsiveness of the user interfaces. XAMPP a local MySQL server was used to host the database and the system files. Object Oriented PHP was used to act as a GUI to manage data communication between the server and interfaces. PHP Data Object driver class was used to achieve this. SQL was used to write the queries purposely to perform data processing on the server.

Findings: The ECEBA model was developed. Deployed to the internet via URL http://Cybersecurity.groxels.com. It guided the design of ETHICA Application.

Recommendation: Ethical behavior questions based on virtue ethical theory, Theory of Planned Behavior (TPB) and Ethical climate theory are fed into the ETHICA Application. This provides a platform for managers in assessing those individuals who may present Cyber security unethical behavior. Banks should give employees opportunity to assess themselves. Banks to use the model in conducting Employee pre-hire screening and periodic assessments of current employees. Banks should integrate the model with other cyber security controls for better ethical decision making & planning.

 

Downloads

Download data is not yet available.

Author Biographies

Nakato Ruth, Mbarara University of Science and Technology

 

 

 

Mayoka G. Kituyi, Makerere University Business School

 

 

 

Fred Kaggwa, Mbarara University of science and Technology

 

 

References

Ait Maalem . R. L., et al. (2020), Review and insight on the behavioral aspects of Cybersecurity

Carter, A. and Crumpler, W D. (2019). Financial Sector Cyber Security Requirements in the Asia-Pacific Region; A Report of the CSIS Technology Policy Program

Cybersecurity (2020) 3:10

Dupont, B. (2019). The Cyber-resilience of financial institutions significance and applicability Journal of Cyber security, 2019, Vol. 5, No. 1

Gray, J. .M (2015). Virtue Ethics: Examining Influences on the Ethical Commitment of Information System Workers in Trusted Positions. Doctoral dissertation. Nova Southeastern University. Retrieved from NSUWorks, College of Engineering and Computing. (364)

Kuepper, (2019) Bank Fraud effects on the banking industry, customers and the economy Cyberattacks and Bank Failures

Lule & Buregyeya, (2023) reporting for New vision newspaper of Tuesday February, 14, 2023 page 7.

Malik, S., Shazia, N., Awan, A. G. (2018), The Impact of Cybercrimes on the Efficiency of Banking Sector of Pakistan Global journal of management, social sciences and humanities Vol 4 (4), pp. 821-842.

Matovu, A. (2018). Electronic Fraud and performance of Retail Banking in Uganda: A Case Study of Centenary Bank limited Mapeera House. Masters level. Nkumba University

Serge Egelman and Eyal Peer. 2015. Scaling the Security Wall: Developing a Security Behavior Intentions Scale (SeBIS). In Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems (CHI '15). ACM, New York, NY, USA, 2873-2882.

THIRD NATIONAL DEVELOPMENT PLAN (NDPIII) 2020/21 - 2024/25; July 2020 NATIONAL PLANNING AUTHORITY

Tumuhimbise, W., Atwine, D., Kaggwa, F. et al. (2022). Enhancing Tuberculosis Care in Southwestern Uganda: Facilitators and Barriers to Utilizing Mobile Health Technologies. Glob Implement Res Appl https://doi.org/10.1007/s43477-022-00056-1.

Yatich, H. K., & Musebe, R. (2017). Assessment of ethical behaviour on organizational performance. African Journal of Business Management, 11(1), 12-16.

Zahoor, Z., Ud-din, Moin., Sunami, K. (2016). Challenges in Privacy and Security in Banking Sector and Related Countermeasures. International Journal of Computer Applications (0975 - 8887) Volume 144 - No.3.

Khan, N.F., Ikram, N., Saleem, S. et al. Cyber-security and risky behaviors in a developing country context: a Pakistani perspective. Secur J (2022). https://doi.org/10.1057/s41284-022-00343-4

Murithi, J., Yoo, J.E. Teachers' use of ICT in implementing the competency-based curriculum in Kenyan public primary schools. Innov Educ 3, 5 (2021). https://doi.org/10.1186/s42862-021-00012-0

C. Russu. (2022) The impact of low cyber security on the development of poor nations | Experts' Opinions

ADDRESS OF HON. JUSTICE ALFONSE CHIGAMOY OWINY - DOLLO CHIEF JUSTICE OF UGANDA; DELIVERED AT THE NEW LAW YEAR, 2023 AT HIGH COURT GROUNDS, KAMPALA ON 3rd FEBRUARY 2023

Zahoor, Z., Ud-din, Moin., Sunami, K. (2016). Challenges in Privacy and Security in Banking Sector and Related Countermeasures. International Journal of Computer Applications (0975 - 8887) Volume 144 - No.3.

MacIntyre, A. C. (1984). After virtue. A study in moral theory. Notre Dame, IN: University of Notre Dame Press.

Ajzen, I. (1991). The theory of planned behavior, Organizational Behavior and Human Decision Processes, vol. 50, no. 2, pp. 179-211.

Ifinedo, I. (2012). Effects of organization insiders' self-control and relevant knowledge on participation in information systems security deviant behavior.

Tommasetti, P. Singer, Orlando T. et al., (2018). Extended Theory of Planned Behavior (ETPB): Investigating Customers' Perception of Restaurants Sustainability by Testing a Structural Equation Model Sustainability, 10, 2580;

Uffen. J. and Breitner M.H (2013). Management of technical security measures: an empirical examination of personality traits and behavioral intentions. System Sciences (HICSS), 2013 46th Hawaii International Conference on. IEEE

Kuenzi, et al., (2019) Creating an ethical organizational environment: The relationship between ethical leadership, ethical organizational climate, and unethical behavior; Personnel Psychology. 1-29. Wiley Periodicals, Inc.

Downloads

Published

2023-06-24

How to Cite

Ruth, N. ., Kituyi, M. ., & Kaggwa, F. . (2023). A Web Based Employees’ Cyber Security Ethical Behavior Assessment (ECEBA) Model for Ugandan Commercial Banks. American Journal of Computing and Engineering, 6(1), 46–72. https://doi.org/10.47672/ajce.1513