Establishing the Influences of Cardinal Virtues on Employees' Cyber Security Ethical Behavior in the Banking Sector in Uganda
DOI:
https://doi.org/10.47672/ejt.896Keywords:
Cardinal Virtue ethics, Ethical Behavior, Cyber SecurityAbstract
Purpose: Cyber security threats emanating from employees' incorrect behavior have escalated in the banking sector. Yet formal policies and technical solutions have failed to solve the problem. Virtue ethics may be a method that can handle this concern. This research aimed at enhancing Cyber security by confirming through statistical analysis the applicability of cardinal virtues related to cyber security ethical behavior.
Methodology: The quantitative survey method utilizing an online questionnaire was used. Confirmatory factor analysis determined causal patterns in the variables and assessed them for validity and reliability. Partial Least Squares Structural Equation Modeling was then used to test casual relations between the study's constructs.
Findings: The results reveal that there is a positive but an insignificant effect of prudence Beta 0.094. p = 0.277 on cyber security ethical behavioral Intentions; there is a positive and significant influence of Temperance; Beta 0.255, p = .000; a positive and significant influence of courage; Beta 0.247, p = .001; on cyber security ethical behavior, that there is a positive and significant influence of Justice; Beta 0.452, p = .000; on cyber security ethical behavioral Intentions. The results further showed that a positive change in ethical behavior intentions leads to a positive change in cyber security ethical behavior.
Unique contribution to theory and practice: This research makes a theoretical contribution to Cyber security ethics by promoting virtue ethics as a framework for moral investigations into Cyber security. Results can be utilized to improve methods, instruments, and tools to assess the employees' cyber security ethical behavior. Policy makers can develop virtue ethical based training programs with dedicated, continuous learning and teaching undertakings geared towards monitoring and enhancing the overall ethical behavior towards cyber security in the banks. The results are a platform to the Government of Uganda through the Ministry of ICT in generating appropriate national policies related to Cyber security ethics as a strategy aimed at improving Cyber security in the banking sector.
Downloads
References
Treviño, L.K; Den-Nieuwenboer N.A & Kish-Gephart J.J., (2014), (Un)ethical behavior in organizations. Annual Review of Psychology, 65(1), 635-660.
Anwar, M., He, W., Ash, I., Yuan, X., Li, L., & Xu, L. (2017). Gender difference and employees' cybersecurity behaviors. Computers in Human Behavior, 69, 437-443.
Aquinas.T.;(2005) The Cardinal Virtunes: Prudance, Justice, Fortitude, and Temperance; pp 159
AÅŸuroÄŸlu Tunc and Cemal Gemci (2016) Role of Ethics in Information Security, 3rd International Conference on Advanced Technology & Science (ICAT) Selcuk University, Konya, Turkey
Ayodele, F. O., Haron. H. B. and Ismail, I. (2019); Ethical Leadership, Ethical Leadership Climate and Employee Moral Effectiveness: A Social Learning Perspective; FGIC 2nd Conference on Governance and Integrity Volume 2019
Beycioglu. K.(2009) a Cyberphilosophical issue in education: unethical computer using behavior - the case of prospective teachers. ELSEVIER; Computers and Education; 201-208.
Brenton M. Wiernik1, Deniz S. Ones (2018) Ethical employee behaviors in the consensus taxonomy of counter productive work behaviors
Brey, P. (2007), "Ethical Aspects of Information Security and Privacy", in: Security, Privacy, and Trust in Modern Data Management, M. PetkovicÌ and W. Jonker (Eds.), Springer Berlin Heidelberg, pp. 21-36.
Chang S. E., and Lin Chin-Shien 2007 Exploring organizational culture for information security management Industrial Management & Data Systems "¢
Dupont, B. (2019). The cyber-resilience of financial institutions significance and applicability Journal of Cyber security. Vol. 5, No. 1
Edgar, T. W. and Manz, D. O. (2017). Research Methods for Cyber Security. Publisher: Todd Green
Gana, N., Abdulhamid, S. M. and Ojeniyi J. A. (2019). Security Risk Analysis and Management in Banking Sector: A Case Study of a Selected Commercial Bank in Nigeria International Journal of Information Engineering and Electronic Business. 2, 35-43
Gray, J.M (2015). Virtue Ethics: Examining Influences on the Ethical Commitment of Information System Workers in Trusted Positions. Doctoral dissertation. Nova Southeastern University. Retrieved from NSUWorks, College of Engineering and Computing. (364)
Gray, J. M., and Tejay. G. (2014). Development of virtue ethics-based security constructs for information systems trusted workers. Proceedings of the 9th International Conference on Cyber Warfare and Security (ICCWS-2014), West Lafayette, IN, USA, 256-264.
Gray, J.M. and Tejay, G.P.S. (2020) "˜Introducing virtue ethics concepts into the decision
Hadlington, L. (2017). Human factors in cyber security; examining the link between Internet addiction, impulsivity, attitudes towards cyber security, and risky cyber security behaviours.
Hair, J. Black F. J. Babin, W. C. et al (2010). Multivariate Data Analysis: A global perspective. Upper Saddle River, NJ: Pearson Prentice-Hall.
Hatfield, J. M. (2019). Virtuous human hacking: The ethics of social engineering in penetration-testing. Computers & Security 83 354-366.
Hatfield, Michael (2018) "Cybersecurity and Tax Reform," Indiana Law Journal: Vol. 93 : Iss. 4 , Article 6.
Herath, T., Rao. H.R., 2009b. Protection Motivation and Deterrence: A Framework for Security Policy Compliance in Organisations. European Journal of information systems. 18(2), pp 106-125.
Igwe, K.N. and Ibegwam A. (2014). Imperative of Cyber Ethics Education to Cyber Crimes Prevention and Cyber Security in Nigeria; International Journal of ICT and Management Vol - II Issue - 2 : pp 102-113.
International Telecommunication Union (Itu) (2018) Guide To Developing A National Cybersecurity Strategy Strategic Engagement In Cybersecurity
Kazmi, J., Alghazo M., Latif G. (2017). Cyber Security Analysis of Internet Banking in Emerging Countries: User and Bank perspectives
Maalem . L Ait. R., et al. (2020), Review and insight on the behavioral aspects of cyber security. Cyber secur 3, 10.
Matovu, A. (2018). Electronic Fraud and performance of Retail Banking in Uganda: A Case Study of Centenary Bank limited Mapeera House. Masters level. Nkumba University
Miska. C., Stahl. G. K. & Fuchs. M. (2018), The Moderating Role of Context in Determining Unethical Managerial Behavior: A Case Survey, Journal of Business Ethics volume 153, pages793-812
Morris M.C, Morris Z.J. (2016). The Importance of virtue ethics in the IRB. Journal of Research ethics
Mugisa M. B. (2019), Towards a cyber-secure Uganda's banking industry - a presentation to CEOs of financial institutions in Uganda, at an event organized by the Uganda Bankers Association.
Mulki, J.P.; Jaramillo, J.F.; Locander, W.B. Effect of ethical climate on turnover intention: Linking attitudinal and stress theory. Journal of Business Ethics. 2008, 78, 559-574.
Nguyen, B. Crossan, M. (2021), Character"‘Infused Ethical Decision-Making. Journal of Business Ethics
Papouli, E. (2018). Aristotle's virtue ethics as a conceptual framework for EN Zalta. for EN Zalta. http://plato.stanford.edu/archives/fall2013/processes of information systems trusted workers: a Delphi study', Int. J. Information and Computer Security, Vol. 12, No. 1, pp.1-19.
Rao, S. (2019). "CYBER CRIME IN BANKING SECTOR." International Journal of Research. - Granthaalayah, 7(1), 148-161.
Reddy, L., Bhargavi V. (2018). Cyber security attacks in banking sector: Emerging security challenges and threats. American International Journal of Research in Humanities, Arts and Social Sciences 21(1) pp. 65-71
Ringle, C. M., Wende, S., & Will, A. (2005). SmartPLS. Hamburg. Retrieved from http://www.smartpls.de.
Sommestad, T., Hallberg, J., Lundholm, K., & Bengtsson, J. (2014). Variables influencing information security policy compliance: A systematic review of quantitative studies. Information Management & Computer Security, 22(1), 42-75.
Tangen. K. I. (2015), The Need for Temperance on Organizational Leadership and Temperance SJLT 2.
Yang Lu (2018), Cybersecurity Research A Review of Current Research Topics; Journal of Industrial Integration and Management Vol. 03, No. 04.
Zahoor, Z., Ud-din, Moin., Sunami, K. (2016). Challenges in Privacy and Security in Banking Sector and Related Countermeasures. International Journal of Computer Applications (0975 - 8887) Volume 144 - No.3.
Downloads
Published
How to Cite
Issue
Section
License
Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution (CC-BY) 4.0 License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.