International Journal of Technology Enhancements and Emerging Engineering Research (ISSN 2347-4289)

IJTEEE >> Volume 4 - Issue 7, July 2016 Edition

International Journal of Technology Enhancements and Emerging Engineering Research  
International Journal of Technology Enhancements and Emerging Engineering Research

Website: http://www.ijteee.org

ISSN 2347-4289

Data Security Preparedness Levels And Online Banking Services: A Case Study Of Information Technology Department Of Access Bank, Kigali, Rwanda

[Full Text]



Dieudonné Muhire, Raymond Wafula Ongus



Information security, Information Communication Technology, data security, online banking services



Data security has been the main approach to deal with loss of data. The motivation of this study was inspired by the continuing concern of ineffective data/information security in companies leading to considerable monetary losses. The aim of this study was to examine the main causes of data insecurity and to establish how data security preparedness levels at Access Bank, Kigali, Rwanda affect online banking services. This study used questionnaires and interviews for data collection. All fifty nine IT employees and their managers at Access Bank represented the total number of population. Therefore the total population of fifty nine (59) was the sample size. As this was a small population size, a purposive sampling technique was used as a sampling method. After collecting data, the interpretation and the summary of quantitative data was done using statistics such as graphs, frequency tables, weighted means, standard deviations, and percentages to enable describe the relationships established. This was achieved by the use of Statistical Package for the Social Sciences Version 17.0 (SPSS V.17.0) software as the tool of analysis. Findings revealed that internal based attacks are the first major cause of data insecurity in the company as indicated by 50.90% of respondents. The multiple regression found that r the coefficient of correlation was 0.793. This meant that there was strong positive multiple correlation between data security preparedness levels and online banking services at Access Bank, Kigali Rwanda. Moreover the coefficient of determination r2 =0.628 indicated that 62.8% of the total variation in online banking services depended on stochastic model developed whereas the remaining 37.2% was attributed to factors beyond the control of the study. Since the correlation was strong, this relationship was found to be significant. Recommendations were to give regular assistance to customers to avoid identity theft, to provide training to every employee of the Bank and to introduce additional security measures stated in this study to deal with internal incidents.



[1] McLean, J. (1995). The Specification and Modeling of ComputerSecurity. Washington, D.C.: Naval Research Laboratory.

[2] Kitchenham, B. & Pfleeger, S. L. (2003).Principles of Survey Research Part 6: Data Analysis. Class lecture for Software Engineering Course. Keele University, UK.

[3] Kritzinger, E. (2012).A Framework for Cyber Security in Africa. Journal of Information Assurance & Cyber security, 12 (2), 32-51.

[4] Salahuddin, M. A. (2011). Information security management: A case study of an information security culture. Unpublished doctoral dissertation, Queensland University of Technology, Brisbane, Australia.

[5] Stallings, W. (2011). Network security essentials: applications and standards. (4th ed.). New Jersey: Pearson Education.

[6] Stewart, A. (2005). Information security technologies as a commodity input. Information Management & Computer Security, 13 (1), 5-15.

[7] Williams, R. (2007). Introduction to: Basic Security Concepts. A Guide for Administrators and Home Users on the design and implementation of security for your network, 9(14), 50-65.

[8] Younus, A., Qureshi, M. & Arlsan,A. K. (2009). Philosophical Survey of Passwords.International Journal of Computer Science and Information Security, 12(1), 8-12.

[9] Tarushi,S. (2014). Email security using clustering algorithms. International Journal of Computer Science and Information Security, 12(1), 49-54.