An empirical investigation into the information management systems at a South African financial institution

  • Released On
    Wednesday, 12 October 2016
  • Author(s)
  • DOI
    http://dx.doi.org/10.21511/bbs.11(3).2016.06
  • Article Info
    Volume 11 2016, Issue #3, pp. 58-65
  • TO CITE
  • Cited by
    1 articles
  • 637 Views
  • 117 Downloads

The study has been triggered by the increase in information breaches in financial organizations worldwide. Such organizations may have policies and procedures, strategies and systems in place in order to mitigate the risk of information breaches, but data breaches are still on the rise. The objectives of this study are to explore the shortfalls of information security on a South African financial institution and further investigate whether business processes are responsive to organization’s needs. This study employed both quantitative and qualitative research methods. Questionnaires were sent to staff level employees, and semi-structured in-depth interviews were conducted with senior management at the organization. The study revealed that employees require training on information management and that there are major training deficiencies for training officers to conduct beneficial information management training at the organization. Information security program that include business risk analysis were not implemented, which results in inadequate information management planning and decisions. A standardized or uniform house rule policy was not consistently implemented across the organization, which resulted in certain areas not protecting information. The qualitative findings revealed that the external cleaning company could obtain access to customer information, if customer data are left lying around. Furthermore, there is major misalignment between policy setters and employees in this organization. The findings allow senior managers to construct projects and program with their teams to improve the state of information management in the organization which spans across the people aspect, technology systems and general information management processes. Furthermore, external companies should start signing Non-Disclosure Agreements - which is not being done currently as this opens the door for data fraud. The organization has information management and security policies in place, but the study concluded that employees do not understand these policies and should receive specialized training to ensure understanding and, ultimately, have employees following these information security policies.

Keywords: data breach, information management, business processes, information legislation.
JEL Classification: G2

view full abstract hide full abstract
  • References
    0
  • Tables
    0
  • Figures
    0