Establishing the Influences of Cardinal Virtues on Employees’ Cyber Security Ethical Behavior in the Banking Sector in Uganda

Authors

  • Nakato Ruth
  • Mayoka. G. Kituyi
  • Fred Kaggwa

DOI:

https://doi.org/10.47672/ejt.896
Abstract views: 203
PDF downloads: 184

Keywords:

Cardinal Virtue ethics, Ethical Behavior, Cyber Security

Abstract

Purpose: Cyber security threats emanating from employees’ incorrect behavior have escalated in the banking sector. Yet formal policies and technical solutions have failed to solve the problem. Virtue ethics may be a method that can handle this concern. This research aimed at enhancing Cyber security by confirming through statistical analysis the applicability of cardinal virtues related to cyber security ethical behavior.

Methodology: The quantitative survey method utilizing an online questionnaire was used. Confirmatory factor analysis determined causal patterns in the variables and assessed them for validity and reliability. Partial Least Squares Structural Equation Modeling was then used to test casual relations between the study’s constructs.  

Findings: The results reveal that there is a positive but an insignificant effect of prudence Beta 0.094. p = 0.277 on cyber security ethical behavioral Intentions; there is a positive and significant influence of Temperance; Beta 0.255, p = .000; a positive and significant influence of courage; Beta 0.247, p = .001; on cyber security ethical behavior, that there is a positive and significant influence of Justice; Beta 0.452, p = .000; on cyber security ethical behavioral Intentions.  The results further showed that a positive change in ethical behavior intentions leads to a positive change in cyber security ethical behavior.

Unique contribution to theory and practice: This research makes a theoretical contribution to Cyber security ethics by promoting virtue ethics as a framework for moral investigations into Cyber security. Results can be utilized to improve methods, instruments, and tools to assess the employees’ cyber security ethical behavior. Policy makers can develop virtue ethical based training programs with dedicated, continuous learning and teaching undertakings geared towards monitoring and enhancing the overall ethical behavior towards cyber security in the banks.  The results are a platform to the Government of Uganda through the Ministry of ICT in generating appropriate national policies related to Cyber security ethics as a strategy aimed at improving Cyber security in the banking sector.

Downloads

Download data is not yet available.

Author Biographies

Nakato Ruth

Mbarara University of science and Technology

Mayoka. G. Kituyi

Makerere University Business School

Fred Kaggwa

Mbarara University of science and Technology

References

Treviño, L.K; Den-Nieuwenboer N.A & Kish-Gephart J.J., (2014), (Un)ethical behavior in organizations. Annual Review of Psychology, 65(1), 635–660.

Anwar, M., He, W., Ash, I., Yuan, X., Li, L., & Xu, L. (2017). Gender difference and employees' cybersecurity behaviors. Computers in Human Behavior, 69, 437-443.

Aquinas.T.;(2005) The Cardinal Virtunes: Prudance, Justice, Fortitude, and Temperance; pp 159

Aşuroğlu Tunc and Cemal Gemci (2016) Role of Ethics in Information Security, 3rd International Conference on Advanced Technology & Science (ICAT) Selcuk University, Konya, Turkey

Ayodele, F. O., Haron. H. B. and Ismail, I. (2019); Ethical Leadership, Ethical Leadership Climate and Employee Moral Effectiveness: A Social Learning Perspective; FGIC 2nd Conference on Governance and Integrity Volume 2019

Beycioglu. K.(2009) a Cyberphilosophical issue in education: unethical computer using behavior – the case of prospective teachers. ELSEVIER; Computers and Education; 201-208.

Brenton M. Wiernik1, Deniz S. Ones (2018) Ethical employee behaviors in the consensus taxonomy of counter productive work behaviors

Brey, P. (2007), “Ethical Aspects of Information Security and Privacy”, in: Security, Privacy, and Trust in Modern Data Management, M. Petković and W. Jonker (Eds.), Springer Berlin Heidelberg, pp. 21-36.

Chang S. E., and Lin Chin-Shien 2007 Exploring organizational culture for information security management Industrial Management & Data Systems •

Dupont, B. (2019). The cyber-resilience of financial institutions significance and applicability Journal of Cyber security. Vol. 5, No. 1

Edgar, T. W. and Manz, D. O. (2017). Research Methods for Cyber Security. Publisher: Todd Green

Gana, N., Abdulhamid, S. M. and Ojeniyi J. A. (2019). Security Risk Analysis and Management in Banking Sector: A Case Study of a Selected Commercial Bank in Nigeria International Journal of Information Engineering and Electronic Business. 2, 35-43

Gray, J.M (2015). Virtue Ethics: Examining Influences on the Ethical Commitment of Information System Workers in Trusted Positions. Doctoral dissertation. Nova Southeastern University. Retrieved from NSUWorks, College of Engineering and Computing. (364)

Gray, J. M., and Tejay. G. (2014). Development of virtue ethics-based security constructs for information systems trusted workers. Proceedings of the 9th International Conference on Cyber Warfare and Security (ICCWS-2014), West Lafayette, IN, USA, 256-264.

Gray, J.M. and Tejay, G.P.S. (2020) ‘Introducing virtue ethics concepts into the decision

Hadlington, L. (2017). Human factors in cyber security; examining the link between Internet addiction, impulsivity, attitudes towards cyber security, and risky cyber security behaviours.

Hair, J. Black F. J. Babin, W. C. et al (2010). Multivariate Data Analysis: A global perspective. Upper Saddle River, NJ: Pearson Prentice-Hall.

Hatfield, J. M. (2019). Virtuous human hacking: The ethics of social engineering in penetration-testing. Computers & Security 83 354-366.

Hatfield, Michael (2018) "Cybersecurity and Tax Reform," Indiana Law Journal: Vol. 93 : Iss. 4 , Article 6.

Herath, T., Rao. H.R., 2009b. Protection Motivation and Deterrence: A Framework for Security Policy Compliance in Organisations. European Journal of information systems. 18(2), pp 106–125.

Igwe, K.N. and Ibegwam A. (2014). Imperative of Cyber Ethics Education to Cyber Crimes Prevention and Cyber Security in Nigeria; International Journal of ICT and Management Vol – II Issue - 2 : pp 102-113.

International Telecommunication Union (Itu) (2018) Guide To Developing A National Cybersecurity Strategy Strategic Engagement In Cybersecurity

Kazmi, J., Alghazo M., Latif G. (2017). Cyber Security Analysis of Internet Banking in Emerging Countries: User and Bank perspectives

Maalem . L Ait. R., et al. (2020), Review and insight on the behavioral aspects of cyber security. Cyber secur 3, 10.

Matovu, A. (2018). Electronic Fraud and performance of Retail Banking in Uganda: A Case Study of Centenary Bank limited Mapeera House. Masters level. Nkumba University

Miska. C., Stahl. G. K. & Fuchs. M. (2018), The Moderating Role of Context in Determining Unethical Managerial Behavior: A Case Survey, Journal of Business Ethics volume 153, pages793–812

Morris M.C, Morris Z.J. (2016). The Importance of virtue ethics in the IRB. Journal of Research ethics

Mugisa M. B. (2019), Towards a cyber-secure Uganda’s banking industry – a presentation to CEOs of financial institutions in Uganda, at an event organized by the Uganda Bankers Association.

Mulki, J.P.; Jaramillo, J.F.; Locander, W.B. Effect of ethical climate on turnover intention: Linking attitudinal and stress theory. Journal of Business Ethics. 2008, 78, 559–574.

Nguyen, B. Crossan, M. (2021), Character‑Infused Ethical Decision-Making. Journal of Business Ethics

Papouli, E. (2018). Aristotle’s virtue ethics as a conceptual framework for EN Zalta. for EN Zalta. http://plato.stanford.edu/archives/fall2013/processes of information systems trusted workers: a Delphi study’, Int. J. Information and Computer Security, Vol. 12, No. 1, pp.1–19.

Rao, S. (2019). “CYBER CRIME IN BANKING SECTOR.” International Journal of Research. - Granthaalayah, 7(1), 148-161.

Reddy, L., Bhargavi V. (2018). Cyber security attacks in banking sector: Emerging security challenges and threats. American International Journal of Research in Humanities, Arts and Social Sciences 21(1) pp. 65-71

Ringle, C. M., Wende, S., & Will, A. (2005). SmartPLS. Hamburg. Retrieved from http://www.smartpls.de.

Sommestad, T., Hallberg, J., Lundholm, K., & Bengtsson, J. (2014). Variables influencing information security policy compliance: A systematic review of quantitative studies. Information Management & Computer Security, 22(1), 42-75.

Tangen. K. I. (2015), The Need for Temperance on Organizational Leadership and Temperance SJLT 2.

Yang Lu (2018), Cybersecurity Research A Review of Current Research Topics; Journal of Industrial Integration and Management Vol. 03, No. 04.

Zahoor, Z., Ud-din, Moin., Sunami, K. (2016). Challenges in Privacy and Security in Banking Sector and Related Countermeasures. International Journal of Computer Applications (0975 – 8887) Volume 144 – No.3.

Downloads

Published

2022-01-07

How to Cite

Nakato , R., Kituyi, M. G., & Kaggwa, F. . (2022). Establishing the Influences of Cardinal Virtues on Employees’ Cyber Security Ethical Behavior in the Banking Sector in Uganda. European Journal of Technology, 6(1), 1 - 13. https://doi.org/10.47672/ejt.896

Issue

Section

Articles