30,229 research outputs found

    Users’ Perceptions of Information Systems Implementation in Banking Institutions in a Developing Nation

    Get PDF
    Information systems projects are undertaken by institutions due to perceived need and benefits that such systems promise. The understanding of users’ perception of ICT implementation enables organizations benefit from such investments. Although research on IS investments in developed nations abound, there is scare research on developing nations especially those south of the Sahara. This paper examined the success of electronic banking systems implementation in a developing nation environment. We evaluated users’ perception on seven dimensions of IS success using one national and one international bank. Our results show that users of both the national and international bank had high perception of IS implementations success although the Natbank’s responders had higher perception than IntBank’s responders on all seven dimensions. Further, the differences in users’ perception of information quality, system quality, information quality and intend to use/Use were statistically significant while the difference in user satisfaction and net benefits were not. While this study is exploratory in nature, the results provide a guide for further studies on success of IS implementation in developing nations

    The Impact Of Technology Trust On The Acceptance Of Mobile Banking Technology Within Nigeria

    Get PDF
    With advancement in the use of information technology seen as a key factor in economic development, developed countries are increasingly reviewing traditional systems, in various sectors such as education, health, transport and finance, and identifying how they may be improved or replaced with automated systems. In this study, the authors examine the role of technology trust in the acceptance of mobile banking in Nigeria as the country attempts to transition into a cashless economy. For Nigeria, like many other countries, its economic growth is linked, at least in part, to its improvement in information technology infrastructure, as well as establishing secure, convenient and reliable payments systems. Utilising the Technology Acceptance Model, this study investigates causal relationships between technology trust and other factors influencing user’s intention to adopt technology; focusing on the impact of seven factors contributing to technology trust. Data from 1725 respondents was analysed using confirmatory factor analysis and the results showed that confidentiality, integrity, authentication, access control, best business practices and non-repudiation significantly influenced technology trust. Technology trust showed a direct significant influence on perceived ease of use and usefulness, a direct influence on intention to use as well as an indirect influence on intention to use through its impact on perceived usefulness and perceived ease of use. Furthermore, perceived ease of use and perceived usefulness showed significant influence on consumer’s intention to adopt the technology. With mobile banking being a key driver of Nigeria’s cashless economy goals, this study provides quantitative knowledge regarding technology trust and adoption behaviour in Nigeria as well as significant insight on areas where policy makers and mobile banking vendors can focus strategies engineered to improve trust in mobile banking and increase user adoption of their technology

    Troli tong gas

    Get PDF
    Tong gas adalah sebahagian daripada keperluan rumah yang sangat penting untuk kegunaan dapur. LPG (Liquefied Petroleum Gas), atau petroleum gas biasanya digunakan untuk aplikasi perumahan (tong gas masak) dan tujuan komersial. LPG terutamanya terdiri daripada campuran hidrokarbon seperti propana (C3H8), propene (C3H6), n-butana (C4H10), isobutena (metil-propana), dan pelbagai butanes lain (C4H8) (Mustapa, Gitano Briggs, 2008). LPG disimpan cair dalam tong pada tekanan tinggi, tekanan wap sekitar 6 hingga 7 bar (Petrolium Nasional Berhad, 2013). Oleh itu, tong gas perlu diperbuat daripada silinder keluli bertekanan tinggi. Tong gas digunakan hampir di semua perumahan, termasuk rumah pangsa, kondominium dan apartment. Kebiasaan penghuni perumahan bertingkat yang tidak mempunyai lift terpaksa mengangkat tong gas menggunakan tenaga empat kerat, kadang kala menggunakan troli biasa untuk menggangkut tong gas tersebut bagi memudahkan dan meringankan kerja. Troli adalah peranti yang digunakan untuk membawa beban atau memindahkan bahan dari satu tempat ke yang lain. Untuk aplikasi yang berbeza pelbagai jenis troli digunakan Kebanyakan pekerja domestik juga menggunakan tenaga tulang empat kerat untuk kerja-kerja pemindahan troli .

    Privacy Regulations in the Context of Finance: Comparison Between Developing and Developed Countries

    Get PDF
    Information security and privacy regulation are significant areas of legislation in the financial and micro-finance sectors in the world. There are significant disparities between the developed and developing countries concerning adoption and application of the data protection laws. The developed world has exemplified its laws in the General Data Protection Regulation (GDPR) clause of the European Union that comes into effect on May 18, 2018. In the US, the main law has been the Gramm-Leach-Bliley Act (GLBA) of the late 1990s. The developing countries, on the other hand, exhibit slow drafting of new finance and micro-finance privacy laws and still use policies of the 1990s. The purpose of the study is, therefore, to examine the effectiveness of privacy and data protection laws in finance and micro-finance sectors in the developed and developing parts of the world in the current technological era. The method of the study is a mixed qualitative and quantitative assessment of case studies of recent literature on the subject. Each case study will feature the variables of the presence of privacy laws and information security regulations, and the level of enforcement of those regulations that inform the statistics. The other variable will be the level of effectiveness of the application of privacy and information security laws in developed and developing nations based on case study outcomes. The results indicate that out of 10 examined cases, six show failures of the laws in developing nations while 1 shows failure in a developed nation (South Korea) and 1, in the US, presents mixed results. The recommendations include the adoption of international laws that govern data security in the financial sector, such as the current GDPR of the European of Union

    Assessing the Current Status of Information Security Policies Among Saccos in Kenya

    Get PDF
    In 2013, Communication Authority of Kenya (CAK) recorded cyber-attacks amounting to Sh5.4 million loses. In April 2016, Bandari Savings and Credit Cooperative Society lost Sh5 million through fraudulent ATM withdrawals (Nation Newspapers, April 8, 2016). These examples demonstrate weaknesses that may exist from security breaches and incidents caused by people, processes, and technology. Ministry of ICT and CAK are lacking specific Information Security Models tailored towards SACCOS in Kenya. The study therefore sought to assess the current status of information security policies among SACCOS in Kenya. The study adopted descriptive research design. The unit of observation was 135 SACCOS registered with SACCO Societies Regulatory Authority (SASRA) while the unit of analysis was 270 ICT personnel working in the 135 targeted SACCOS. The study targeted the SACCOS heads of IT department. The study used Nassiuma (2000) formula to get a sample of 85 respondents. Purposive sampling was further used in selecting study participants in every SACCOS who were considered to be knowledgeable of the variables under study. The study utilized questionnaire as the survey instrument to collect both quantitative and qualitative data. The study adopted descriptive statistics. Descriptive data was presented by use of frequency tables. The study established that in all the SACCOS studied, information security policy is used. However, there are still challenges on how information security breaches and incidents can be contained based on the results of the study and therefore calls for further research in academic research. The findings of the study indicate that SACCOS were able to validate that the enhanced information security model using an integrated approach worked as planned and reported to auditors, managers and executives that incident response programs are robust and reliable. If security controls didn’t work as planned, they will need to fix them. The actions and resources needed should be included in in the report to executives in the SACCOS sector in KenyaKeywords: SACCOS, Management controls, Information Security Policies, Risk assessmentDOI: 10.7176/EJBM/11-27-09 Publication date:September 30th 201

    Latin America 2060: consolidation or crisis?

    Full text link
    This repository item contains a single issue of the Pardee Center Task Force Reports, a publication series that began publishing in 2009 by the Boston University Frederick S. Pardee Center for the Study of the Longer-Range Future.Latin America has produced vigorous ideas throughout its history, expressed in narratives about its struggles and successes, or its weaknesses and failures. Together, these have shaped a multi-faceted vision of the region and its peoples. Some of its expositors, finding the story to be neither complete nor precise, work toward reformulations, some quite radical. Such generation of knowledge in different fields seems destined to yield a variety of distinct outcomes, at least in part because some of the emerging social and cultural movements are not yet very well structured. This Task Force Report project seeks to harness ideas about the region’s future into a coherent and policy useful discourse. A Workshop and a Task Force meeting was held at Boston University on November 18-19, 2010. A select group of invited experts – a mix of academic scholars and practitioners – were asked to turn their ideas into short ‘Think Pieces’ essays. Each Think Piece focuses on a specific topical issue for the region as a whole, instead of looking only at particular countries. These Think Piece essays are compiled and edited by the Task Force coordinator and published by the Pardee Center as a Task Force Report

    Information Security in the Caribbean Banks

    Get PDF
    Information security is a crucial issue for organizations, especially for banking and financial institutions. However, not many studies have considered the perspectives of end users in developing countries’ banking industry, for which the challenges of competing globally are greater due to a lack of technical, human and financial resources. Therefore, this study examines how end users of local, regional, and international banks in St. Kitts (a Caribbean country)perceive information security. The study will provide financial institutions in developing countries with more efficient security measures that would facilitate their success in the global community
    • 

    corecore