ProductsLogo
LogoStudy Documents
LogoAI Grader
LogoAI Answer
LogoAI Code Checker
LogoPlagiarism Checker
LogoAI Paraphraser
LogoAI Quiz
LogoAI Detector
PricingBlogAbout Us
logo

Customer's Perception of Information Systems Security in the Banking Sector

Verified

Added on  2023/01/19

|15
|3973
|64
AI Summary
This research proposal aims to understand the customer's perception of information systems security in the banking sector and its impact on individual perception. It explores the reasons behind the need for information systems in banking, the importance of securing customer information, and the perception of customers regarding information system security. The study also discusses the implications of the research and the limitations of the study.

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Running head: RESEARCH PROPOSAL
Research Proposal
Topic: Customer's perception about information systems security in the banking sector
Name of the Student
Name of the University
Author Note

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
1RESEARCH PROPOSAL
Abstract
In recent years, a smart phone has become a useful platform to easily access banking
services. However, compared to regular Internet banking using a personal computer, the
adoption of a smart phone for Internet banking might be more vulnerable with regard to
security. This study will help readers to identify several factors in which banks use the
information system. Moreover, the type of security used in information system by banks will
also be disclosed through this study. This study will help to identify security architecture
involved with information system and its impact on individual perception.
Document Page
2RESEARCH PROPOSAL
Table of Contents
Chapter 1: Introduction..............................................................................................................3
Background of the study........................................................................................................3
Aims of the study...................................................................................................................3
Objectives of the study...........................................................................................................4
Research Questions................................................................................................................4
Problem Statement.................................................................................................................4
Rationale of the study.............................................................................................................5
Research Hypothesis..............................................................................................................5
Structure of the study.............................................................................................................6
Chapter 2: Literature Review.....................................................................................................7
Introduction............................................................................................................................7
Findings of the Study.............................................................................................................7
Gap in the literature................................................................................................................8
Chapter 3: Discussion and implications of research..................................................................9
Introduction............................................................................................................................9
Discussions of the research....................................................................................................9
Implications of the research.................................................................................................10
Limitations of the study.......................................................................................................11
References................................................................................................................................12
Document Page
3RESEARCH PROPOSAL
Chapter 1: Introduction
Background of the study
The set of components forming an information set is based upon on the set of several
activities and the collection of the data and their storages into the system database. This is
another reason for which the storage of data is based upon the analysis for being chosen into
the business and the knowledge generated by the information is taken into consideration in all
organizations and at the same time baking organizations are also taking the inclusion of
Information Systems under consideration (Williams, Rana & Dwivedi, 2015). However, since
banking sectors are more about the implementation of the transactional and financial systems,
the customers within the organization do not understand the need of including the
information system and why would the banking sectors need to implement the security of the
information system regarding the transactional codes of the customers. They need to
understand the reason why the customers and the security of the information generated within
the organizations need to be regarded as the primary concerns.
Aims of the study
The aim of the study is to understand the reasons for which the customers in the
banking sectors have a specific understanding of the significance or the utility of the security
systems of the information in the banking sectors and also the rationale behind having an
information system generated or included in the banking sector (Ayo et al., 2016). It is
always found that the customers in the baking sectors are huge in number and this is why the
information system within the banking sectors are found to be incurring at a huge rate. The
customers in the banking sector do not understand how is it important to implement the
security of information within the banking organization. The banks usually suffer because of
this as the information that the companies are found to be dealing with depends on
transactional data and confidential and personal information systems.

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
4RESEARCH PROPOSAL
Objectives of the study
The objectives of the study can be listed in the following way:
To understand the reasons behind the need of the information systems in the
banking sectors.
To understand the need to take care of the information generated within a bank
and what would be the influence on their overall business organization.
To understand the need of the security of information of the customers in the
banking sectors.
To understand what is the perception of the customers for the information
system security in the banking sectors.
Research Questions
The research questions that the research proposal is presumably trying to solve
through this paper is as follows:
How important is the implementation of the security of an information system and
how would be the influence be taken into consideration of the information security to make
the customers within the banking sector understand the importance of the information
security system in the organization?
Problem Statement
The identification of the security system is absolutely necessary within the banking
sector as the number of customers in a bank is much more than the number of the customers
in any industry. The banking sector deals with the information of the customers, including the
confidential information about the customers and their account and transactional details. This
is why the organizations have been thinking about the inclusion of the security for the
information systems that have been generated within the organization to make sure that all
these confidential data have been kept under consideration. If the people within the
Document Page
5RESEARCH PROPOSAL
organization do not find it feasible to be implemented, they would not understand the reasons
for which the information of the customers within the banking sector would need to be taken
into consideration to be kept in the most safe and secure way possible. This is why, the
research would solve the problem of making the security of the information system be
understand about the customers to the customers within the banking sectors.
Rationale of the study
The banking sector is an industry that deals with a huge number of consumers but at
the same time it involves the utilization of the understanding of the people within the
organization to be informative about the utility of the security systems of the organization and
the information generated within the business every day (Belás et al., 2016). It has been
found in the previous times that the customers within the banking sectors are all dealing with
the issues of the security of their information and this has been because the banking sectors
have not realized the reasons why there should be the inclusion of the information system
within the organization. Even after the organization and the industry has understood the
utility of the inclusion of an information system, it is still not realised how would the
customers within the organization would find it feasible to implement (Alalwanet al., 2016).
The importance of protecting the information system within an organization is required to be
kept into consideration and this is why the people should understand importance of securing
the proper information of all the customers within the organization and maintain total
security.
Research Hypothesis
There can be two hypotheses generated for the research framework and these would
be justified as the null hypothesis and the alternative hypothesis. These can be justified as
below:
H0: Understanding the importance of security of information is not the reason that the
Document Page
6RESEARCH PROPOSAL
customers within the banking sectors are perceiving about the information systems.
H1: Understanding the importance of security of information is the reason that the
customers within the banking sectors are perceiving about the information systems.
Structure of the study
The brief structure of the study that would be required to be understood can be
described as below so that any reader going through this research proposal would understand
how the entire research is formulated for finding out the perception of the customers about
the security issues of the information system in the banking sectors:
Chapter 1: Introduction
This would be the first chapter in the research proposal that would actually set out the
formulation of the entire research stating the background for it and understanding the reasons
for which this had been set out. This chapter would analyse the utility of the research, why is
it being considered as a research and all the hypotheses generated at the beginning of the
research. The identified problems that this research would fix would also be described in this
chapter.
Chapter 2: Literature Review
This chapter would find out all the information that would be formulated with the
secondary data collection research. This would be found with the research that has already
been done by various authors, collection of the data from the study conducted off these
research papers, the reasons why the research of the previous author are taken into
consideration and what are the understanding found from the conducted literature review.
Chapter 3: Discussion and implications of the research
This chapter would be the final chapter of this research proposal that would find out
the information gathered from the review of the literature and the discussion that can be
generated form it. This chapter would also state the information about the implications in the

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
7RESEARCH PROPOSAL
research proposal and the way by which these would be conducted for the research.
Chapter 2: Literature Review
Introduction
This is the way by which the research has been conducted and the same way that was
permissible according to the allocated budget. This is another reason that the entire research
has been formulated to be for the further progression of the research as the budget allocated
could only allow the literature review to be conducted. This is the way by which the literature
has been done with the help of the collection of data from the literatures on the same topic
about the perceived security problems of the customers in the banking industry (Gumussoy,
2016). The problem that the organizations faced were finding of the information that were
required to be found out given the ways by which there has been several incidents of security
problems. Following would be the generated gathered information that has been collected
with the utility of the literature review process and that have been ideated with the
perceptions that the researchers gained from their findings.
Findings of the Study
There have been several problems found in the utility of the information systems that
the banking organizations have been found to be using for the service provision to the
customers. This is another issue that the banking organizations face since this is somewhat
not the idea that is established and formulated in a one-way manner. According to Yuan et
al., (2016), the understanding of the security issue has to be done with the utility of the two-
way processes that includes the ideation of both the customers and the banks. The banks
nowadays have started providing solutions to the customers with the help of the mobile
phones and other connecting devices like laptops, computers and tablet computers as well.
According to the ideation of Amin (2016), the stepping stone has found to be forming
an empirical model on the use of internet banking. This is another reason by which the
Document Page
8RESEARCH PROPOSAL
dimensions of the security system are set. The study identifies the utility of the concerns
regarding the investigations that is build up on the cases regarding the internet banking
through the smartphones. It is also understood how is it important that the customers must
have a clear idea about the provision of all the important details about the customer. Most of
these days, the customers are found to be having a system developed for the people within the
organization and also the ways by which they save needs to be find out. There are various
ways by which the people identify the customer information. In the real-life, there are often
reports found about the stealing of the connecting devices and the same reason it had been
found that the problems regarding the information security has become even more
problematic. The problems have already creeped up on the provision of these and the reasons
that the information of the customers in the banking sectors can easily be forged are thought
to be delivered form these cases (Kumar Adlakaha & Mukherjee, 2018). There are several
information that are required to be found through the utility of these and there is also the
requirement of finding out how the customers keep their personal information in the mobile
devices safe and secure in such a way that even though these would be having a problem with
the occurrences of stealing and losing, there would still be and assurance that their personal
information are safe from being hacked.
Not just these, but the customers still do not understand the information security and
its utility in the Automated teller machines and the information in the cards.
Gap in the literature
There have been several gaps found in the literatures that are discussed as above
according to the findings generated in the above section. This is a way by which the people
within the banks are feasibly finding out the ways that the customers of the banking sectors
are perceiving the utility of the security systems as per the services provided to them. The
same way that these are understood to be one of the reasons that the people in the banking
Document Page
9RESEARCH PROPOSAL
sectors have been facing problems with is the same problem regarding the preserving of the
integrity of the information of the customers. This is the same way that the people within the
organization have been having a lot of problems to keep up with the provision of the services
and the maintenance of the integrity about the information. However, the identified issues in
the perceived security has been entirely based upon the finding out of the severe problems in
the customers in banking sectors, but they do not acknowledge the need to have a proper
system or project developed to make sure that the customers are also required to understand
the problems regarding the security of the information systems in the organizations. This
should have been included in the literatures as identified above for the people to have both
the described problems and tis solution.
Chapter 3: Discussion and implications of research
Introduction
This chapter would establish the discussion of all the ideas and important point found
from the literature reviews that have been conducted as per findings generated by the
previous researchers. This chapter would discuss the collective information found from the
literature review and at the same time this would justify all the information found (Svilar &
Zupančič, 2016). This would also find out the implication of all the researches discussed and
at the same time would find out the limitations of the study that has been conducted. The
findings of the general forms of the research would be described to find out what would be
the solutions to the problem that has been found and what the research was trying to solve
regarding the identified problem.
Discussions of the research
There have been various determinants of the case that has been discovered with the
help of the literature review conducted for the research. This is another reason for which there
are various determinants of the security issues forming barriers for the customers to

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
10RESEARCH PROPOSAL
understand. The study has examined the fact that the focus has been provided to the
examination of the roles of the perception of the security systems that the customers have
about the security (Bultum, 2014). It has been discussed in the previous times that not
understanding the importance of the security issues have also resulted in the faulty provision
and use of the online services. Nowadays, banks have found to be presenting a lot of support
to the customers with the utility of the security systems, also forming the provision of the
services to the customer with the help of the utilization of the best quality mobile services.
The perceived security issues of the customers were the most important aspect that
was found to be influencing the service provision and the security of information about the
internet usage for the services provided to the customers online. This has been found to be
negatively influencing the people within the banking sectors when the perceived security has
been found to be influencing the provision of online services to the customers (Yoon &
Occeña, 2014). The customers do not have the clear idea how the information that they share
with the bank and how this information can cause a huge problem to their overall confidential
data credentials. The reason by which the people within the organization were found to be not
aware of the idea behind the information security of them that they share through the mobile
devices and this is why they have been no idea about the problems that they could face if any
kind of problem occurs with the theft of the mobile phone they use to transfer their
credentials, confidential data and financial transactions and at the same time the idea behind
the online hacking to breach and extract out the secured and confidential information.
Implications of the research
The implications that the research are the potentially problematic areas in the research
that could have been eliminated or modified in a different way to ensure that the research is
conducted in the most feasible way possible. These limitations remained in the formulation of
the research through the secondary data collection method and this is also identified to be one
Document Page
11RESEARCH PROPOSAL
of the issues occurred through the utility of the allocated budget. The study also finds out the
implications of the research as described in the study above that shows how would the future
of internet banking would be given the latest scenario (Bhatt & Bhatt, 2016). The empirical
results find out that the security concerns are a fact for the customers to understand the
security systems and also the usability of the security systems with the utility of the
smartphones and other connecting devices. There is also found to be the presence of the
relationship between the usability dimension and the security dimension. The casual
relationship depended amongst these would be developed by the further understanding of this
(Pathirana & Azam, 2016). The limitation of the budget made it simpler if the entire task was
conducted through the secondary data collection method and had no budget left for
conducting a primary data collection. Had the research made up on the secondary data
collection method, it would be much more influential and effective as a measure. This were
the identified implications of the research.
Limitations of the study
The entire research has been conducted in such a way that there were bound to be
some of the problems regarding the research and involving several problems that have been
found to be causing limitations of the research to be conducted. These limitations of the study
were taken into consideration during the conduction of the entire research and how much has
been the limitations affected the conduction of the research (Shaikh & Karjaluoto, 2015).
These limitations were mostly based on the fact that the entire research had been conducted
over the utility of the literature review. This is based upon the ideas that the previous
researchers have gone through and does not involve the influence of the primary data
collection methods. If the research was conducted over the collection of the data collection
done in the primary data then it would have been feasible in collecting the data of the several
ways by which the collection of data would not be dependent on any secondary source. This
Document Page
12RESEARCH PROPOSAL
is the reason for which the research had its limitations to the conduction in the most feasible
way possible.

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
13RESEARCH PROPOSAL
References
Alalwan, A. A., Dwivedi, Y. K., Rana, N. P., & Williams, M. D. (2016). Consumer adoption
of mobile banking in Jordan: examining the role of usefulness, ease of use, perceived
risk and self-efficacy. Journal of Enterprise Information Management, 29(1), 118-
139.
Amin, M. (2016). Internet banking service quality and its implication on e-customer
satisfaction and e-customer loyalty. International Journal of Bank Marketing, 34(3),
280-306.
Ayo, C. K., Oni, A. A., Adewoye, O. J., & Eweoya, I. O. (2016). E-banking users’ behaviour:
e-service quality, attitude, and customer satisfaction. International Journal of Bank
Marketing, 34(3), 347-367.
Belás, J., Korauš, M., Kombo, F., & Korauš, A. (2016). Electronic banking security and
customer satisfaction in commercial banks. Journal of security and sustainability
issues.
Bhatt, A., & Bhatt, S. (2016). Factors affecting customers adoption of mobile banking
services. The Journal of Internet Banking and Commerce, 21(1).
Bultum, A. G. (2014). Factors affecting adoption of electronic banking system in Ethiopian
banking industry. Journal of Management Information System and E-commerce, 1(1),
1-17.
Farah, M. F., Hasni, M. J. S., & Abbas, A. K. (2018). Mobile-banking adoption: empirical
evidence from the banking sector in Pakistan. International Journal of Bank
Marketing, 36(7), 1386-1413.
Gumussoy, C. A. (2016). Usability guideline for banking software design. Computers in
Human Behavior, 62, 277-285.
Kumar, A., Adlakaha, A., & Mukherjee, K. (2018). The effect of perceived security and
Document Page
14RESEARCH PROPOSAL
grievance redressal on continuance intention to use M-wallets in a developing
country. International Journal of Bank Marketing, 36(7), 1170-1189.
Pathirana, P., & Azam, F. (2016). Behavioral Intention to Use Social Media Among the
Banking Consumers in Sri Lanka. In About the 1st International Conference in
Technology Management (iNCOTeM) (pp. 52-60).
Shaikh, A. A., & Karjaluoto, H. (2015). Mobile banking adoption: A literature
review. Telematics and informatics, 32(1), 129-142.
Svilar, A., & Zupančič, J. (2016). User experience with security elements in internet and
mobile banking. Organizacija, 49(4), 251-260.
Williams, M. D., Rana, N. P., & Dwivedi, Y. K. (2015). The unified theory of acceptance and
use of technology (UTAUT): a literature review. Journal of Enterprise Information
Management, 28(3), 443-488.
Yoon, H. S., & Occeña, L. U. I. S. (2014). Impacts of customers' perceptions on internet
banking use with a smart phone. Journal of Computer Information Systems, 54(3), 1-
9.
Yuan, S., Liu, Y., Yao, R., & Liu, J. (2016). An investigation of users’ continuance intention
towards mobile banking in China. Information Development, 32(1), 20-34.
1 out of 15
[object Object]

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]