A Case Study on E-Banking Security â When Security BecomesToo Sophisticated for the User to Access Their Information

While eBanking security continues to increase in sophistication to protect against threats, the usability of the eBanking decreases resulting in poor security behaviors by the users. The current research evaluates security risks and measures taken for eBanking solutions. A case study is presented describing how increased complexity decreases vulnerabilities online but increases vulnerabilities from internal threats and eBanking users.

[1]  Mikko T. Siponen,et al.  Five dimensions of information security awareness , 2001, CSOC.

[2]  Mark B. Desman The Ten Commandments of Information Security Awareness Training , 2003, Inf. Secur. J. A Glob. Perspect..

[3]  John Leach,et al.  Improving user security behaviour , 2003, Comput. Secur..

[4]  Gurpreet Dhillon,et al.  Technical opinion: Information system security management in the new millennium , 2000, CACM.

[5]  Kamini Singh Innovated Technology in Banking Services , 2011 .

[6]  M. Angela Sasse,et al.  Users are not the enemy , 1999, CACM.

[7]  Mikko T. Siponen,et al.  Ontology of organizational IT security awareness-from theoretical foundations to practical framework , 1998, Proceedings Seventh IEEE International Workshop on Enabling Technologies: Infrastucture for Collaborative Enterprises (WET ICE '98) (Cat. No.98TB100253).

[8]  Michael E. Whitman Enemy at the gate: threats to information security , 2003, CACM.

[9]  Lawrence A. Gordon,et al.  The economics of information security investment , 2002, TSEC.

[10]  Carl E. Landwehr,et al.  Computer security , 2001, International Journal of Information Security.

[11]  Garry Dinnie The Second Annual Global Information Security Survey , 1999, Inf. Manag. Comput. Secur..

[12]  L. R. Chao,et al.  An empirical study of information security policy on information security elevation in Taiwan , 2006, Inf. Manag. Comput. Secur..

[13]  Anne Powell,et al.  Information Systems Management , 1997 .

[14]  Dawn Song,et al.  Hash Visualization: a New Technique to improve Real-World Security , 1999 .

[15]  Houston H. Carr,et al.  Threats to Information Systems: Today's Reality, Yesterday's Understanding , 1992, MIS Q..

[16]  K. Mccrohan Facing the threats to electronic commerce , 2003 .

[17]  Dennis F. Galletta,et al.  User Awareness of Security Countermeasures and Its Impact on Information Systems Misuse: A Deterrence Approach , 2009, Inf. Syst. Res..

[18]  Tzvi Raz,et al.  Analysis of active intrusion prevention data for predicting hostile activity in computer networks , 2007, CACM.

[19]  Jean-Marc Robert,et al.  Security and usability: the case of the user authentication methods , 2006, IHM '06.

[20]  Morris Sloman,et al.  Policy driven management for distributed systems , 1994, Journal of Network and Systems Management.

[21]  Atreyi Kankanhalli,et al.  Impact of Security Measures on the Usefulness of Knowledge Management Systems , 2005, PACIS.

[22]  Anat Hovav,et al.  Deterring internal information systems misuse , 2007, CACM.

[23]  Rolf Oppliger IT security: in search of the Holy Grail , 2007, CACM.