Upload
others
View
3
Download
0
Embed Size (px)
Citation preview
1 | P a g e
CAVENDISH UNIVERSITY ZAMBIA
Faculty of Information and Communications
Technology (ICT) ASSESSMENT OF THE SECURITY METHODS USED
IN E-BANKING TRANSACTIONS IN ZAMBIA. - CASE
STUDY ZANACO BANK ZAMBIA PLC
“A Dissertation submitted in partial fulfillment of
the requirement for the Bachelor’s Degree in
Computer Science”
NGWALE NKOSA
STUDENT NUMBER 003-633
2019
2 | P a g e
DECLARATION I declare that this work is my original work achieved through personal reading and
scientific research. This work has never been submitted to Cavendish University Zambia
or any other College or University for the award of a bachelor of science in Computing or
for any other academic award. All sources of data used, and literature on related works
previously done by others, used in the production of this report have been dully
acknowledged. If any omission has been made, it is not by choice but by error. Furthermore, I
hereby give consent for my dissertation if accepted to be available for photocopying and for
inter-library loan and for the title and summary to be made outside organization.
NGWALE NKOSA 003-633 MR. H SINKALA
CANDIDATE: SUPERVISOR:
--------------------------- ---------------------------
Date: Date:
-------------------------------- -----------------------------
3 | P a g e
List of Acronyms ATM - Automated Teller Machine.
BAZ-Bankers Association of Zambia.
BCP - Business Continuity Plans.
CAZ - Communications Association of Zambia.
DRS - Disaster Recovery Sites.
ICT - Information and Communication Technology.
IT - Information Technology.
PIN - Personal Identification Number.
ZICTA - Zambia Information Communication Technology Authority.
4 | P a g e
Acknowledgements This dissertation could not have been successfully completed if not for the assistance and
support rendered to me by numerous dedicated friends and family as well as university
lecturers who gave me constant advice and guidance. It is for this reason that I would like to
thank everyone that put in tremendous effort to the completion of my thesis.
Special gratitude goes to Mr. Henry Sinkala who supervised my work and guided me in
producing this work without his devoted time and assistance I would not have managed to
successfully complete this work.
Lastly, I take full responsibility for any omissions and errors in the document.
5 | P a g e
Dedication To my family, friends and relatives for always being with me. It has been a long journey but
through thick and thin you have been with me each and every step of the way. For all you
have done, may God continue to richly bless you and may His grace and favour continue to
follow you all the rest of your days.
6 | P a g e
Abstract With the advent of electronic technologies, electronic banking has become a significant
element in almost every business. One of the most significant developments in this aspect is
the banking industry. Electronic banking has the capability to integrate and transform a
traditional business to a model of electronic commerce (e-commerce) in providing banking
alternatives and facilitating for the convenience to their banking transactions. In fact, most of
the banks around the world have adjusted their business strategy to attain competitive
benefits, reduce operational costs and enhance their performance by offering an electronic
banking system to their banking customers. Hence, banking customers have the option of
accessing their bank accounts and making transactions anytime and anywhere. Electronic
banking systems provide us with easy access to banking services. The interaction between
user and the bank has been substantially improved by deploying ATM’s, phone banking,
internet banking, and more recently mobile banking. The new information technology is
becoming important factor in the financial services industry.
However, the electronic banking systems have associated information security threats and
risks which need assessment if the bank clients are to be satisfied with banking services.
Electronic banking, security threats and risks that impact both the banks and the banking
customers. Privacy and security of electronic banking transactions and confidentiality of
personal information are among the biggest concerns for both the banking industry and the
Internet banking customers. Furthermore, there are some additional electronic banking
systems that provide us with easy access to banking services. The interaction between user
and the bank has been substantially improved by deploying ATM’s, phone banking, internet
banking, and more recently mobile banking.
7 | P a g e
Therefore this paper examines the use of electronic technologies in the banking sector with
special attention on Zambia National Commercial bank. The paper looks at the assessment of
electronic security methods used in electronic banking transactions with a case study of the
aforementioned bank in Zambia. The main findings are that ZANACO offers three main
electronic banking services which are internet banking, mobile banking and ATMs. The main
methods of security are encryption, pin codes, pass codes and passwords. Although the bank
argues that their services are secure, some customers feel that the banks should put in more
security measures. Mostly in banks causes of fraud and source of fraud are due to lack of
customers to keep the security codes privately as others share these details with third parties.
The main recommendation is that the bank needs to be doing a routine security assessment
check-ups and upgrades. It is also recommended that the security codes should have a
maximum life span to avoid insecurity. This paper is organised into four main sections
namely introduction, methodology, presentation of findings, conclusions and
recommendations.
8 | P a g e
Table of Contents DECLARATION ......................................................................................................................................... 4
List of Acronyms ...................................................................................................................................... 5
Acknowledgements ................................................................................................................................. 6
Dedication ............................................................................................................................................... 7
Abstract ................................................................................................................................................... 8
CHAPTER ONE: INTRODUCTION AND BACKGROUND ........................................................................... 10
1.0. Introduction ............................................................................................................................... 10
1.1. Background of Zambia National Bank ........................................................................................ 10
1.2. Background to Study .................................................................................................................. 11
1.3. Statement of Problem ................................................................................................................ 12
1.4.0. Aims and objectives ................................................................................................................ 13
1.4.1. Aim ...................................................................................................................................... 13
1.4.2. Specific objectives ............................................................................................................... 13
Research Questions .......................................................................................................................... 13
1.5.1. General research question .................................................................................................. 13
1.5.2. Specific research questions ................................................................................................. 13
1.6. Significance of the Study ............................................................................................................ 13
1.7. Delimitation and Scope of Study ................................................................................................ 14
1.8. Definitions of terms ................................................................................................................... 14
CHAPTER TWO: LITERATURE REVIEW ................................................................................................... 15
2.0. Introduction ............................................................................................................................... 15
2.1. Scope of Electronic Banking (E-Banking).................................................................................... 15
2.2.0. Electronic banking services offered by Banks ......................................................................... 18
2.2.1. Automated Teller Machines ................................................................................................ 18
2.2.2 .Point of Sales (POS .............................................................................................................. 18
2.2.3. Mobile Banking Services ..................................................................................................... 19
2.3.0. Security Methods Used in Electronic Banking Transactions ................................................... 20
2.3.1. Security Mechanisms .......................................................................................................... 22
2.3.2. Authentication Methods ..................................................................................................... 23
2.4.0. Causes and Sources of Fraud in Electronic Banking Transactions .......................................... 25
2.5.0. Fraud and Insecurity in Electronic Banking Transactions ....................................................... 25
2.6.0. Challenges Faced By Banks in Facilitating Insecurity and Electronic Banking Fraud .............. 27
2.7.0. Measures to Reduce Electronic Banking Insecurity ................................................................ 29
9 | P a g e
CHAPTER THREE: METHODOLOGY ........................................................................................................ 32
3.0. Introduction ............................................................................................................................... 32
3.1. Research design ......................................................................................................................... 32
3.2. Study Population and sample .................................................................................................... 32
3.3. Sampling design and procedure................................................................................................. 33
3.4. Data collection instrument ........................................................................................................ 33
3.5. Administration of data collection schedule ............................................................................... 33
3.6. Data Analysis/processing procedure ......................................................................................... 33
3.7. Limitations of the methodology ................................................................................................ 34
CHAPTER FOUR: PRESENTATION AND ANALYSIS OF DATA................................................................... 35
4.0. Introduction ............................................................................................................................... 35
4.1. Respondents’ characteristics and classifications ....................................................................... 35
4.2. Responses From Clients ............................................................................................................. 36
4.3. Responses From Bank Employees .............................................................................................. 43
CHAPTER FIVE: SUMMARY, CONCLUSIONS, RECOMMENDATIONS ...................................................... 50
5.1. SUMMARY OF FINDINGS ............................................................................................................ 52
5.2. Conclusion .................................................................................................................................. 52
5.3. Recommendations ..................................................................................................................... 53
REFERENCES .......................................................................................................................................... 55
Appendix I: Questionnaire for clients/customers. ................................................................................ 57
Appendix II: Questionnaire for bank employees ................................................................................. 60
10 | P a g e
CHAPTER ONE: INTRODUCTION AND BACKGROUND
1.0. Introduction
This chapter gives the background of the target bank, and introduction to the research study.
It gives an insight on how the research was conducted, background of the study, problem
statement, overall and specific objectives. The chapter further provides the significance,
delimitation of the study as well as definitions of key terms.
1.1. Background of Zambia National Bank Zambia National Commercial Bank public known as ZANACO is one of the first banks to be
established in Zambia. It was created by the merger of the National Commercial Bank and
Commercial Bank of Zambia in 1975. The Commercial Bank of Zambia was incorporated in
Zambia in 1965 to take over the business previously transacted by the Netherlands Bank of
South Africa Limited. The National Commercial Bank was incorporated in 1969 as the first
wholly owned bank (Bank of Zambia, 1984). Furthermore ZANACO was established by the
government of the republic of Zambia to foster national development and has over the years
been and continues to be instrumental to the country’s progress through various achievements
particularly in providing the banking and financial services of the Zambian people. The bank
boasts of being the leading bank in the country with branches and agents spread across the
country (www.zanaco.co.zm ).
Prior to 2007, the bank was 100% owned by the government. In that year, 49% of its shares
were sold to the Rabobank Group, a banking company from the Netherlands (Zambia
National Commercial Bank, 2010). Under this partnership, ZANACO has designed broad
based, affordable banking services for its retail customers and structured innovative financial
solutions for large corporations, agri-business and the public sector. In 2008, the shares of
ZANACO were listed on the Lusaka Stock Exchange. The bank remains majority owned by
Zambians and thus is considered “citizen owned”. The relationship with Rabobank enables
ZANACO to benefit from technical assistance and best practice in various areas of banking
(Zambia National Commercial Bank, 2010). According to the Bank of Zambia, ZANACO
was the most profitable commercial bank in Zambia during the first six (6) months of 2009
(Zambia National Commercial Bank, 2010). ZANACO has invested substantially in a
versatile banking information technology platform. The bank offers various self-service
banking technologies from ATMs, POS (Point of Sale) terminals, ZANACO Bill Master,
Internet banking and Xapit instant banking which, with the use of a mobile phone; bill
11 | P a g e
payments, transfers and the buying of airtime can be done (Zambia National Commercial
Bank, 2010). ZANACO is well placed to respond to the diversity of Zambian society with a
national presence of 56 branches and agencies nationwide and the development of new
exciting ecommerce products (Ministry of Commerce, Trade and Industry 2010).
1.2. Background to Study According to Allan (1998) the evolution of the Electronic banking started in the early 1980s
when banks begun to look at electronic banking as means to replace some of the traditional
branch functions, for two reasons. Firstly the branches were very expensive to set up and to
maintain due to the large overheads associated with them, secondly e-banking production
services like ATM’s and electronic funds transfer were a source of differentiation for banks
that utilized them being in a fiercely competitive industry. Further, Technology introduced
new ways of delivering banking to the customer, such as ATM’s, internet banking mobile
banking. Hence banks found themselves at the forefront of new technology adoption. Both in
the USA and the U.K, it really took off with the arrival of the world wide web (www), when
traditional banks offered their clients access online while some banks started operating on the
web only. Today almost half the Worlds’ banks are online. Online electronic banking was
preceded by home banking; hence electronic banking was put in effect in order to reduce
back office processing costs. According to “Banking and finance on the internet” edited by
Mary J. Coronin (1997), electronic banking was first introduced in the early 1980’s in New
York by four major banks: Citi bank, Chase Manhatan, Chemical Manufacturers and Hanova.
This allowed individuals and enterprises to maintain electronic checkbook registers, check
account balances, and transfer funds between different accounts.
However, with the advent of electronic banking, security concerns arose. The concept of
security has taken a different nature since the beginning of the modern computing era (Bobos,
2010). In order to understand electronic security, one must be able to clearly understand the
issue of confidentiality, confidentiality refers to the privacy of points of interest regarding an
information resource, and confidentiality could be applied via encryption for example. The
goal of confidentiality is to only allow access to resource to those that require access to it.
Zambia first became connected to the Internet in (1994) through a slow leased line from
South Africa with just about 250 users, many of whom were academicians and medical staff.
Over the years, the Internet has changed dramatically and has become an exceedingly
influential and indispensable tool to businesses and individuals alike. The number of Internet
users in Zambia was estimated at 50,000 in (December 2004) according to ZICTA. Business
12 | P a g e
houses and a growing number of individuals have adopted online identities that make it
possible for them to communicate worldwide in real-time and be part of the emerging
information society.
Since Banks are among the leaders in the business sector in Zambia, they too have moved
with the times and embraced the electronic age. The banking sector, however, has one of the
most liberal banking regimes in southern Africa. Recent developments have included the
drive to privatize many sub‐sectors of the financial sector; ZANACO being a good example
of this.
It should be further noted that what attracts customers to internet and or electronic banking is
the round the clock availability and ease of transactions. Studies estimate that internet
banking still has a long way to go. There are several banks that have customers who prefer
banking in the traditional ways. Some customers turn to internet banking facilities for
security reasons. This is mainly because of customers being assured of banks' ability to keep
transactions safe and secured. Most online transactions are made using the Internet Explorer
interface. The Internet Explorer has been around for more than ten years now. This study on
electronic Banking will provide detailed information on electronic banking which shall
include internet banking, mobile banking and ATMs. This shall be viewed in the light of
what is in practice at Zambia National Commercial Bank.
1.3. Statement of Problem There is a rapid increase in electronic banking transactions as well as a serious concern on
how secure the system is to avoid fraud in the banking system. Financial institutions that
provide electronic banking today have found customer security as a vital issue in their day to
day business transactions due to the fact that it involves the internet which is highly unsecure.
Moreover using the internet as a medium of electronic banking, it is prone to hacking and
third party access to private information like banking information.
Admittedly, the idea of electronic banking is a brilliant one, but attached to it are numerous
advantages and disadvantages. It must be noted that due to slow technological developments
in Zambia, the electronic banking in Zambia is not totally efficient and secure, as various
people have lost funds through their bank accounts inherent to various reasons, it must be
noted and also argued that the security methods used are not sufficient enough to ensure up to
standard security in the electronic banking transactions in the Zambian banking sector. This
has led to an increase in research and technology on how this must be avoided.
13 | P a g e
1.4.0. Aims and objectives
1.4.1. Aim
To assess the security methods used in electronic banking transactions in Zambia.
1.4.2. Specific objectives
To determine the levels of fraud and insecurity in electronic banking transactions.
To investigate the causes and sources of fraud in electronic banking transactions
To ascertain the challenges faced by banks in facilitating secure electronic banking
transactions.
Research Questions
1.5.1. General research question
What are the security methods used in electronic banking transactions in Zambia?
1.5.2. Specific research questions
What are the causes and sources of fraud in electronic banking transactions?
How prevalent are the levels of fraud and insecurity in electronic banking transactions?
What are the challenges faced by banks in facilitating insecurity and electronic banking
fraud?
What measures can be put in place to reduce electronic banking security?
1.6. Significance of the Study There has been an increasing concern from the general public in the use of electronic
transactions especially to a technology emerging nation like Zambia. Therefore the study
findings provide a compressive and overview electronic security methods used in banking
sector. Thus the findings of the study are a source of awareness to the users (customers) and
providers (banks) of electronic banking in ensuing that the electronic banking transactions are
secure from both parties. The findings are vital in a bid to bring awareness and provide
advice or workable solutions to prevent financial crime or fraud in the banking sector.
1.7. Delimitation and Scope of Study The study focused on assessing the security methods used in electronic banking in Zambia
through media such as mobile phones, internet and ATMs. The study focuses on Zambia
14 | P a g e
National Commercial Bank as a case study and all findings in this paper are based on
responses from ZANACO staff and customers. Additionally while there are numerous areas
in electronic banking, the study had overall goals of only assessing the security methods used
in security banking in Zambia. Zambia. Therefore there is a likelihood that the findings may
not be universal to the whole country especially that, there are a lot international banks
operating within the country which maybe using internationally acclaimed security methods
in electronic banking transactions.
1.8. Definitions of terms Electronic Commerce: Is the process of conducting business on the internet using
information technology to enhance communications and transactions with all of organizations
and stake holders.
Electronic Services: Is described as an infrastructure, content-cantered and internal based
customer service which is driven by the customer.
Electronic Banking: Is defined to include the provision of retail and small value banking
products and services through electronic channels as well as large electronic payments and
other wholesale banking services delivered electronically. It is considered to be a segment of
electronic business to the extent that banks are involved in the management of business
transactions via electronic media, other non-banking financial products are services such as
insurance.
Security: Is the protection of assets against danger of loss. Security is simple safety but with
emphasis to external threats, in other words security is the protection of data against
unauthorized access. “This is the major concern in this thesis.”
Information Security: Is the protection of information and information systems from
unauthorized access, use, disclosure, disruption, modification or destructions. There are three
concepts in relation to information security, which are confidentiality, Integrity, and
availability (CIA).
Internet: Is the network of computers through which anybody with a personal computer
which is properly connected to the existing telephone or cable system that can access several
millions of people around the world.
15 | P a g e
Information Technology: Is the study or the design, developmental implementation support
or management of computer based information systems particularly software applications and
computer hardware, IT deals with the electronic use of electronic computers and software
applications to convert, store, protect, process, transmit and retrieve information.
Electronic Payment System: Is the payment through which the electronic transfer of funds,
which is automatically transferred from the account of the payee to the account of the
receiver immediately after the transaction has been done electronically.
Automatic Teller Machine (ATM): Is a unit installed by a bank that gives customers access
to their accounts with the insertion of a magnetic card.
Card Reader: Can be described as a machine with a magnetic head that record information
and convert it into electronic signals.
Transaction: Is a business deal that is being negotiated or settled.
Pin: This is a multi-digit number used with a card to get money from a cash point machine or
to gain access to a computer or telephone system.
16 | P a g e
CHAPTER TWO: LITERATURE REVIEW
2.0. Introduction
This chapter allows for the review of published works and past research work that has been
done in relation to the study. This part also highlights some weaknesses and critically
analyses published body of knowledge by way of justification and comparison to prior
research studies. It thus comprises review of empirical data.
2.1. Scope of Electronic Banking (E-Banking) According to Ibrahim et al (2006), the changes occurring in the banking sector can be
attributed to increasing deregulation and globalization, the major stimulus for rationalization,
consolidation and increasing focus on costs. Further, the implementation of electronic
banking such as office banking software holds several advantages for the banks as the
outcome of revolutionary technology. Meanwhile the importance of the internet and other
electronic to users banking needs relates to the advantages that accrue to the users of the
technology in question. The literature on electronic banking is thus full of reference to the
convenience brought to the banking world with the advent of the internet. However, a number
of disadvantages still come into the fore with closer examination.
Electronic banking services are seen by banks as a better electronic banking system to
increase their market share (Beans, 1999). Electronic banking according to the Basel
committee report on the banking supervision (1988) refers to the provision of retail and small
value banking products and services through electronic channels. Regarding an overall
process of commercialization taken place in the payment market, electronic payments set to
be a huge growth market over the next few years, this is simply because advert of the internet
providers, electronic commerce opportunity with an instantaneous means of payments ( Liao
and Cheung, 2002).
Figure 2.1: Below is a diagram showing a simplified illustration of electronic banking:
17 | P a g e
Figure 2.1
Source: Saleh and Andrea (2000).
Electronic banking is concerned with the internet portal, providing the facility to its
customers and allowing them to use different kinds of on line services like payment of utility
bills, purchasing mobile recharge and making investments. It is essential for the banks to
have the official bank website providing the possibility to do transactions so that banks can
be qualified as providing the online banking services (Pikkarainen et al 2004). According to
(Gigolio 2002 and Robinson 2000) for delivering banking products the cheapest delivery
channel can be done only through electronic banking.
According to Karjalinto et al (2002), with the help of electronic banking services the
branching of networks of banks have reduced and also the staff for working in banks and
customers satisfied to use electronic banking services as it will serve a lot of time and effort
to go to branch of bank to perform these transactions. So the main reason behind accepting
the electronic banking is the time, cost saving and freedom from the place (Polatoglu, 2001).
There are a lot of reasons which hinder the popularity of Electronic banking services in spite
of the fact that bankers and customers can get benefits from the online banking services. The
majority of private banks are banking through the electronic banking channel.
18 | P a g e
According to Hagel and Hewlin (1997) the electronic banking became very attractive to
customers and lots of banks because the technology is accepted by them and they can now
understand and have information on complex product. Nowadays banks are facing a lot of
competition and need a high market share and provide better services to its customers so that
they can attract the new customers and old customers do not try to leave them.
While using the electronic or online banking there are a lot of advantages that customers are
getting, these advantages are that customers can access their bank accounts at anytime and
anywhere, twenty four hours seven days a week. The management of funds and availability
of various banking services can be carried out by customers very easily. Electronic banking
provides benefits to the users and also to the banks; users can use the services dependent on
convenience which is independent of time and constraints. Electronic banking helps banks to
reduce transaction costs and cost of operation in the form of reducing staff and physical
branches. There is an urgent need to create awareness amongst the business group of people
about the importance of electronic services and to prepare people to accept the challenge
which electronic services offer (Karjalinto et al 2002).
2.2.0. Electronic banking services offered by Banks With the increase in the use of technology particularly in the field of electronic banking. A
number of products have been developed in the banking sector. There are various services
offered in electronic banking services, which include: use of ATMs; internet or online
banking; SMS and telephone banking; electronic bill payment, and Point of Sale transactions.
These electronic banking services and products are briefly explained herein (Hagel and
Hewlin, 1997).
2.2.1. Automated Teller Machines
ATMs were the first known machines to provide electronic access to customers (Singh and
Komal, 2009). Khan, 2010: p333) says the “ ATM is an innovative service delivery mode that
offers diversified financial services like cash withdrawals, funds transfer, cash deposits,
payment of utility and credit card bills, cheque book requests and other financial enquiries”.
The ATM services that are offered by banks have evolved and have become better and more
advanced.
These machines perform the basic deposit and withdraw tasks of tellers and are more
dependable as most customers prefer ATMs to error prone human tellers. Automated banking
focuses on automated teller machine or ATM as many usually call it. The first ATM was
19 | P a g e
installed into a bank some 40 years ago by Barclays bank England, for the first time
customers could get hold of their money without having to queue in a bank. This saved bank
customers time, it also saved the bank huge money in that they could now only have few
staff. Modern ATM’s provide customers with their bank account balance. They can also issue
money print statements and even take cash deposits. Customers are able to use almost any
ATM in any bank, supermarket or garage, and in some countries this facility is usually free
(Jaffee, 1989). The ATM facility has a number of benefits; according to Brain (2000) the
benefits of that can be derived from ATM facility usage is so numerous. Flexible account
access allows clients to access their accounts at their convenience.
2.2.2 .Point of Sales (POS)
This is an electronic banking service that uses debit cards. The customers use the debit card
to make payments at any shop or place with a designated point of sale. The customers swipe
the debit card on the point of sale machine and enters pin code authentication and the bank
debits the client account and credits the seller or shops account. In the case of online buying
and selling the visa debit card number is used to authorise the bank to debit your account. Of
course there are security requirements depending on regulations. It is among the widely used
electronic banking in buying and selling in the world.
2.2.3. Mobile Banking Services
Mobile banking is the provision of banking services, notably a bank account, which can be
accessed via a mobile phone. It’s generally banking using a mobile phone. Laukkanen and
Pasanen (2005) define mobile banking as a channel whereby the customer interacts with a
bank via a mobile device, such as a mobile phone. There are several services that a bank can
offer through mobile banking. For instance, payment of bills can be done using mobile
banking as well as money deposited and transferred from one account to another. Mobile
banking is popularly known as Short Message Service (SMS) banking or M-banking; and has
been facilitated using restrictions of passwords for security reasons.
According to the United Nations Economic and Social Commission for Asia and the Pacific
and the International Trade Centre (2005) in countries with high ICT literacy rates and well-
developed telecommunications networks, customers can make financial arrangements
wherever they are and at any time. However a congested network may result in poor
reception. For mobile banking to be able to 11 take place and to be of benefit to the bank and
the customer, there needs to be a telecommunications network.
20 | P a g e
Commercial banks and telecommunication networks sign agreements on how the mobile
banking services will be provided to the client. The agreement outlines how much the client
is charged on each transaction and how much goes to the telecommunication network. The
user of a mobile banking service must be a client to both the bank and the telecommunication
network. Banking transactions over mobile phones are usually performed by sending an SMS
requesting a financial transaction, it travels to the SMS centre of the clients’ cellular service
provider and from there it goes to the bank’s system. Then the client receives the response
that is sent by the bank via the service provider, all within a few seconds. Therefore, for
mobile banking to be effective and a success, commercial banks have to establish agreements
with telecommunication companies (i.e. Airtel, MTN and Cell-Z) as these are the mobile
phone network providers in Zambia (United Nations Economic and Social Commission for
Asia and the Pacific and the International Trade Centre, 2005).
The most exciting service to which ZANACO has beaten all other competitors is the Xapit, a
kind of cell phone banking that allows customers to buy airtime, pay bills such as DSTV and
make money transfers to third parties using the ATM. ZANACO is the first bank to
implement such a service, which will operate 24 hours a day. “It will be made available to the
existing customers, but ultimately also to the (two) 2 million people who have a cell phone
but not a bank account,” said Wiessing. This facility, if well implemented, will allow most
Zambians who have no access to banking facilities to access financial services using their cell
phones. The Xapit account is the only instant ZANACO Bank account that can be opened
within minutes offering customers a Visa card and services such as purchasing of airtime,
electricity and paying for DSTV.
2.3.0. Security Methods Used in Electronic Banking Transactions According to Thomas et al, (2002), the security of electronic banking refers to any tool,
techniques or process used to protect a systems information asset, or is a risk management or
risk mitigation tool. Muella (2001) stated that security deals with how a website ensures that
hacker and others cannot access customer’s information or their credit card numbers. It is
further highlighted electronic security adds value to a naked network. It is composed of soft
and hard infrastructure, the soft infrastructure components consist of policies, processes,
protocols, and guidelines that protect the system and the data from compromise. The hard
infrastructures consist of hardware and software needed to protect the system and data from
threats to security from inside or outside the organization.
21 | P a g e
As the internet is broadcasting medium, the need for security is constant requirement of doing
business over the internet, any lapse of security in internet usage may likely to increase fear
and anguish among the consumers psychological state that may bar them to use the system as
they may be required to key in their valuable personal information. Thomas et al (2002)
stated that although technology opens up new dimensions of the scope of timing but it creates
the possibility for crimes to be committed very quickly. In the past to steal 50000 credit card
numbers would have taken months or even years for highly organized criminals. However
today criminal using tools available on the web can hack into a data base and steal scores of
identities in seconds.
According to Thomas et al (2003) these are few reasons why electronic security must be
taken very seriously now. However Raigaga 2000) pointed that security concerns have been
the most important issue facing the bankers among various banks which has drastically
delayed the expansion of technology among banks. Ratnasigum (2002) argued that the impact
of technology trust in web services implies the use of security services such as digital
signatures, encryption mechanisms and authorization mechanisms.
Raigaga (2000) explains the electronic banking transaction is only as secure as the people
who use it. If a consumer chooses a weak password, or does not keep their password
confidential, then an attacker can pose as that user. This is significant if the compromised
password belongs to an administrator of the system. In this case, there is likely physical
security involved because the administrator client may not be exposed outside the firewall.
Users need to use good judgment when giving out information, and be educated about
possible phishing schemes and other social engineering attacks.In internet banking electronic
transactions, one of the security methods is the personal firewalls.When connecting your
computer to a network, it becomes vulnerable to attack. A personal firewall helps protect
your computer by limiting the types of traffic initiated by and directed to your computer
(Ratnasigum (2002).
Additionally Secure Socket Layer (SSL) is a protocol that encrypts data between the
consumer’s computer and the site's server. Secure Socket Layer (SSL) encryption is a secure
communication protocol that encrypts client information during transmission over the
Internet. It is one of the strongest encryption technologies available today, providing server
authentication, and ensuring that all data transferred over the Internet is encrypted to protect
22 | P a g e
against it being disclosed to eavesdroppers. It also ensures that any attempt by hackers to
tamper with the information will be detected (Thomas et al, (2002).
When an SSL-protected page is requested, the browser identifies the server as a trusted entity
and initiates a handshake to pass encryption key information back and forth. Now, on
subsequent requests to the server, the information flowing back and forth is encrypted so that
a hacker sniffing the network cannot read the contents. The SSL certificate is issued to the
server by a certificate authority authorized by the government. When a request is made from
the consumer’s browser to the site's server using https://, the consumer’s browser checks if
this site has a certificate it can recognize.
A firewall is like the moat surrounding a castle online security methods. It ensures that
requests can only enter the system from specified ports, and in some cases, ensures that all
accesses are only from certain physical machines. A common technique is to setup a
demilitarized zone (DMZ) using two firewalls. The outer firewall has ports open that allow
ingoing and outgoing HTTP requests. This allows the client browser to communicate with the
server. A second firewall sits behind the e-Commerce servers. This firewall is heavily
fortified, and only requests from trusted servers on specific ports are allowed through. Both
firewalls use intrusion detection software to detect any unauthorized access attempts. Another
common technique used in conjunction with a DMZ is a honey pot server. A honey pot is a
resource (for example, a fake payment server) placed in the DMZ to fool the hacker into
thinking he has penetrated the inner wall. These servers are closely monitored, and any access
by an attacker is detected (Thomas et al, 2002).
2.3.1. Security Mechanisms
There are general security mechanisms for database systems. However, the increasing
accessibility of databases in the public internet and private intranets requires a reanalysis and
extension of the approaches there are various identified mechanisms that are employed by
many organisations such as the banks, financial institutions, and online shops among others
that use to secure the interests of both parties (Connolly and Berg. 1997)
Encryption: Secure Socket Layer (SSL) encryption is a secure communication protocol that
encrypts client information during transmission over the Internet. It is one of the strongest
encryption technologies available today, providing server authentication, and ensuring that all
data transferred over the Internet is encrypted to protect against it being disclosed to
eavesdroppers. It also ensures that any attempt by hackers to tamper with the information will
23 | P a g e
be detected. Another protocol for transmitting data securely over the web that the banks
employed is Secure HTTP (SHTTP). It is a modified version of the standard HTTP protocol.
By convention, web page that requires an SSL connection starts with https, instead of http.
The study in Nigeria discovered that two modes of encryption are in use among Nigerian
commercial banks, they are 128 bit and 256 bit SSL. This encryption technology ensures that
data passing between customer computer and the bank is secure and that customer accounts
cannot be accessed by anyone else online.
Digital Certificate: Connolly and Berg (1997) defines digital certificate as an attachment to
an electronic message used for security purposes, most commonly to verify that a user
sending a message is who he or she claims to be, and to provide the receiver with the means
to encode a reply. For compliance and security reasons all the banks applied and signs for
digital certificate to send encrypted messages. Digital certificate authentication is generally
considered one of the stronger authentication technologies, and mutual authentication
provides a defence against phishing and similar attacks. The use of shared secrets such as
digital images is another technique. An image recognition and selection is used to identify the
genuineness of the customer.
Firewall: When the Web server has to be connected to an internal network, for example to
access the company database, firewall technology can help to prevent unauthorised access,
provided it has been installed and maintained correctly. A firewall is a system designed to
prevent unauthorised access to or from a private network. Following this, it was gathered
from the study that all the banks install robust firewalls to protect their internal systems
(intranet) and customer’s information against intrusion from the interne (Mary Jane Cronin,
1997).
2.3.2. Authentication Methods
There are a variety of technologies and methods financial institutions can use to authenticate
customers. These methods include: Use of customer passwords, Personal identification
numbers (PINs), Digital certificates using a public key infrastructure (PKI), Physical devices
such as smart cards, One-time passwords (OTPs), Use of “tokens” such as USB plug-ins,
Transaction profile scripts, Biometric identification and others (Khan, 2010).
The authentication methods adopted by Nigerian banks are passwords, PINs, tokens and One-
Time passwords. The level of risk protection afforded by each of these techniques varies. The
selection and use of authentication technologies and methods should depend upon the results
24 | P a g e
of the financial institution’s risk assessment process. Existing authentication methodologies
involve three basic “factors”:
Something the user knows (e.g., password, PIN);
Something the user has (e.g., ATM card, smart card, token) and
Something the user is (e.g. Biometric characteristic, such as a fingerprint)
Authentication methods that depend on more than one factor are more difficult to
compromise than single-factor methods. Accordingly, properly designed and implemented
multifactor authentication methods are more reliable and stronger fraud deterrents. For
example, the use of a logon ID/password is single-factor authentication (i.e., something the
user knows); whereas, an ATM transaction requires multifactor authentication: something the
user possesses (i.e., the card) combined with something the user knows (i.e., PIN). A
multifactor authentication methodology may also include “out–of–band” controls for risk
mitigation (Santos, 2003).
Shared Secrets: Shared secrets (something a person knows) are information elements that are
known or shared by both the customer and the authenticating entity. Passwords and PINs are
the best known shared secret techniques but some new and different types are now being used
as well. The security of shared secret processes can be enhanced with the requirement for
periodic change. Shared secrets that never change are described as “static” and the risk of
compromise increases over time. The use of multiple shared secrets also provides increased
security because more than one secret must be known to authenticate (Cronin 1997),
Tokens can be also used, Tokens are physical devices (something the person has) and may be
part of a multifactor authentication scheme. The hardware consists of a key-fob with an LCD
screen on it. A code is displayed on the screen and changes frequently, usually every 60
seconds. The device is generating keys based on a 128-bit encryption seed. When this number
is fed to a server that has a copy of that seed, it is used as an additional verification to the
other login data. There are three general types of token: the USB token device, the smart
card, and the password-generating token. It was gathered from the study that only the
password generating token is in used by the banks (Singh and Komal 2009).
Password-Generating Token:A password-generating token produces a unique passcode, also
known as a one-time password each time it is used. The token ensures that the same OTP is
25 | P a g e
not used consecutively. The OTP is displayed on a small screen on the token. The customer
first enters his or her user name and regular password (first factor), followed by the OTP
generated by the token (second factor). The customer is authenticated if (1) the regular
password matches and (2) the OTP generated by the token matches the password on the
authentication server. A new OTP is typically generated every 60 seconds in some systems,
every 30 seconds. This very brief period is the life span of that password. OTP tokens
generally last 4 to 5 years before they need to be replaced. Password-generating tokens are
secure because of the time sensitive, synchronized nature of the authentication. The
randomness, unpredictability, and uniqueness of the OTPs substantially increase the difficulty
of a cyber thief capturing and using OTPs gained from keyboard logging. The two
aforementioned methods of 2-factor authentications (2FA) are ones basically in use by
commercial banks. There are others methods in use globally such as: USB Token devices,
Smart Cards, Biometrics, out of-Band Authentication and Mutual Authentication. (Ziqi.
Michael. 2003)
2.4.0. Causes and Sources of Fraud in Electronic Banking Transactions It should be noted that there exist fraud in relation to ATMs. According to Bankers
association of Zambia as at December 2010, Zambia recorded a total number of 489 ATM
machines and over a million card holders (1,082,417) to be exact. It is clear that as the ATM
card holders will continue to grow as a result of electronic awareness.
Majority of Zambian banks notably ZANACO, FINANCE, and STANBIC banks to mention
a few warned card users nationwide against disclosing their ATM card details to second party
as a result of fraud stars who are said to be on the prowl. Diebold (2002) stated some ATM
frauds in a paper titled “ATM fraud and Security”.
2.5.0. Fraud and Insecurity in Electronic Banking Transactions The most notable of the challenges of ATMs is Card theft. In an attempt to obtain actual
cards, criminals have used a variety of card trapping devices comprised of slim mechanical
devices often encased in plastic transparent films inserted into the card reader throat. Hooks
are attached to the probes preventing the card from being returned to the consumer at the end
of the transaction. When the ATM terminal user shows concern due to the captured card, the
criminal usually in close proximity of the ATM, will offer prompt support suggesting the user
enter the pin again, so that the criminal is able to view the entry and remember the pin. After
the consumer leaves the area, believing the card has been captured by the ATM, the criminal
26 | P a g e
will then probe ( fishing Device) to extract the card having viewed the pin the criminal may
easily withdraw money.
Another is the use of Skimming Devices. This is another method of accessing a consumer’s
account information is to skim the information off of a card. Skimming is the most frequently
used method of illegally obtaining card track data “skimmers” are devices used by criminals
to capture the data stored in the magnetic stripe of the card. Reading and deciphering the
information on a magnetic stripe of the card, which is accomplished through the application
of small card readers in close proximity to or on top of the actual card reader input slot, so it
is able to read and record the information stored on the magnetic track of the card. The device
is then removed allowing the downloading of the recorded data (Ziqi. 2003).
Shoulder surfing: Shoulder surfing is the act of direct observation, watching what number
that a person taps onto the keypad. The criminal usually positions himself in close proximity
to the ATM to watch as the ATM user enters their pin, sometimes miniature video cameras
that are easily obtained might be installed discretely on the fascia or somewhere close to the
pin pad, to record the pin entry information.
Utilizing a fake pin pad overlay: A fake pin pad is placed over the original keypad, this
overlay captures the pin data and stores the information into its memory, the fake pin pad is
then removed and recorded pins are downloaded, fake pin pads can almost be identical in
appearance and size to the original. An additional type of overlay that is more difficult to
detect is a thin overlay that is transparent to the consumer. This method used in conjunction
with card data theft provides the criminal with the information needed to access an
unsuspecting consumer’s account (Bambos, 2010).
Pin Interception: After pin is entered the information is captured in electronic format through
an electric data recorder. Capturing the pin can be done either inside the terminal or as the pin
is transmitted to the host computer for the online pin check. In order to capture the pin
internally the criminal would require access to the communication cable of the pin pad inside
the terminal which can more easily be done at off premise locations (Bernkopf, 1996)
27 | P a g e
2.6.0. Challenges Faced By Banks in Facilitating Insecurity and Electronic
Banking Fraud According to Fojt (1996), Electronic banking like any other thing in life has its own
drawbacks and challenges both to the bank and the customers. A customer needs access to the
internet being connected which signifies that the access to a customer’s account is solely
dependent in the case of electronic banking. Furthermore, Electronic banking is subject to
dependability of other computers and web server, which means that if it is faulty a customer
cannot access his or her account.
It also means that a customer has to know how to use a computer before he or she can carry
out any transaction. There are a set of people e.g. the older ones who do no not want to follow
the technological trend, probably being scared and doesn’t want to learn and prefer the
traditional banking way. The other issue concerns the governmental policies that guide
electronic banking operations across international borders not being efficient (Fojt, 1996)
Further, the services of a third party are usually required by bank to run the online services to
their clients ( Kannan, 2004)
In addition to the above, Ziqiand Michael (2003) argued that the electronic banking being
new technology faces a problem of acceptability. This means it has a battle with the
competition in the driving force behind the introduction of electronic banking. The banking
system being an oligopolistic market( a market condition in which sellers are so few that the
actions of any one of them will materially affect the price and have a measurable impact on
competitors) it is necessary for the electronic bank to compete in the first place through the
sub strategy of product service differentiation. Therefore in order to enhance the product
service the internet should be exploited as a channel to build, maintain, and develop long
term client relationships through the ready access to broad and increasing array of products,
services and low-cost financial shopping, rapid response to customer inquiries and
personalized product-service innovation.
Another challenge prone to electronic banking is transaction security, due to open nature of
the internet; this is likely to emerge as the biggest concern among the electronic banking.
Since transaction risks would create significant barrier to market acceptance, its management
and control are crucial for business reputation and promotion of consumer confidence as well
as operational efficiency. To safeguard this, it is imperative the electronic bank to implement
measure to protect client assets and information. The electronic banking is also likely to be
28 | P a g e
challenged by demographics; this can prevent some commercial banks future access to
profits. To exploit this challenge and increase market share, financial institutions must seek to
attract and capture computer literate internet users who are young and educated as early as
possible to supplying at low cost technology innovative and sophisticated products and
services such as globally mobile banking and electronic financial transactions over the
internet (Fojt, (1996).
Electronic banking has also brought new challenges for bank management, supervisory and
regulatory authorities. It should also be noted that operational Risk of electronic banking is
the central system of availability and security to the dependability of new technology which
provides services, security threats can be external or internal to the system due to this,
banking regulators and supervisors must check that banks have the right measures in place to
secure data integrity and confidentiality. These security practices should be listed on a regular
basis by technical skilled persons to analyze network vulnerabilities and recovery
preparedness. The integral part of the overall management of the heightened operational risks
in their safety and soundness evaluations (Government of the Republic of Zambia, 1994).
As noted by Ziqi and Michael (2003) another drawback to electronic banking is that it carries
heightened legal risks for banks. Banks have grown geographically faster in terms of services
which they render through Electronic banking compared to traditional .banking methods. In
some cases, however, the banks rendering these services might not fully acquired with laws
and regulations abiding in that area before offering such services either with permission
(License) or not. When this permission is not there, a virtual bank not having adequate
contact with its supervisor from the host country may find problems adapting to regulatory
changes. As a result, virtual banks being unaware unknowingly could go against the
protection laws of a customer, including data collection and privacy. After which they subject
themselves to losses through lawsuits or crimes that are not prosecuted because of
jurisdictional disputes. Money laundering has been on for some time now which is being
facilitated by electronic banking due to anonymity it affords. Many countries have issued
proper rules for the identification of customers when an account is being opened.
Another is what is called Reputational Risk- banks reputation can be damaged due to
violation of security and disruption to availability of the system, reputational risk is more
dependent on the reliance on electronic delivery channels which in turn increases its
potentials, for instance, bank that offers electronic services experienced any problems that
29 | P a g e
might lead to the lost confidence customers have for electronic delivery channels in general.
These problems can potentially affect other providers of electronic services. Reputational
risks also stem from customer misuse of security precautions. Security risks can be amplified
and may result in the loss of confidence in electronic delivery channels (John, 1997).
Banks have made, and should continue to make, efforts to educate their customers. Because
customer awareness is a key defence against fraud and identity theft, financial
institutions should evaluate their consumer education efforts to determine if additional steps
are necessary. Management should implement a customer awareness program and
periodically evaluate its effectiveness. Methods to evaluate a program’s effectiveness include
tracking the number of customers who report fraudulent attempts to obtain their
authentication credentials (e.g., ID/password), the number of clicks on information security
links on Web sites, the number of statement stuffers or other direct mail communications, the
amount of losses relating to identity theft, etc. while disclosing the ID/passwords is a
common source of insecurity, a study on whether banks are making efforts to educate its
clients, The study found out that all banks are making efforts to educate their customers on
how to handle any suspicious attempt on their financial details; to ignore any mail requesting
for their PIN and or card details as the bank would not for any reason request for them, to not
enter the bank’s website from links from their email boxes, to access the internet banking
portal from a designated web address (BOZ, 2013)
2.7.0. Measures to Reduce Electronic Banking Insecurity According to the Bank of Zambia guidance banks should introduce logical access controls
over ICT infrastructure deployed. Controls instituted by banks should be tested through
periodic Penetration Testing, which should include but should not be limited to;
Password guessing and cracking
Search for back door traps in programs.
Attempts to overload the system using Ddos (Distributed Denial of Service &DoS
(Denial of Service) attacks.
Check if commonly known vulnerabilities in the software still exist.
e. Banks may for the purpose of such Penetration Testing employ external experts
30 | P a g e
Continuous and regular customer awareness program to educate customers. A further
study to evaluate the reliability and effectiveness of each of the two most used 2-
factor authentication methods, that is, the hardware token and the PIN.
Financial institutions offering electronic products and services should have reliable and
secure methods to authenticate their customers. The level of authentication used by the
financial institution should be appropriate to the risks associated with those products and
services. Furthermore financial institutions should conduct a risk assessment to identify the
types and levels of risk associated with their Internet banking applications. Where risk
assessments indicate that the use of single-factor authentication is inadequate, financial
institutions should implement multifactor authentication, layered security, or other controls
reasonably calculated to mitigate those risks. The Central Bank of Nigeria (CBN) consider
single-factor authentication, as the only security control mechanism, to be inadequate in the
case of high-risk transactions involving access to customer information or the movement of
funds to other parties ( Mc Gill, 2004).
John (1997argues that the success of a particular authentication method depends on more
than the technology. It also depends on appropriate policies, procedures, and controls. An
effective authentication method should have customer acceptance, reliable performance,
scalability to accommodate growth, and interoperability with existing systems and future
plans. In securing customer data through access control, it is assumed that all bank customers
fall in the same user group. They all can perform similar operations after gaining access to
the bank’s domain through the internet. Customers on electronic banking platform can do
balance enquiry, check transaction details, make payments and transfer fund within the same
bank.
Legislative and Regulatory Issues is best measure at various levels to ensure that e-banking
transactions are secure by following the laid down procedures. For the implementation of
electronic banking, national, regional and international law, rules and regulations are
required. Legal support is necessary for protecting the interests of banks and customers in
various areas relating to electronic banking transactions. Some of the important issues like
liability loss whenever fraud occur, to provide loss allocation in case of insolvency, to
preserve records, prevention of fraud etc. are to be cleared in the legislation.
In Zambia, Zambia information technology authority (ZICTA) formerly known as
Communication authority of Zambia (CAZ) is a statutory body established under the
31 | P a g e
information and communication (ACT number 15 of 2009) of the laws of Zambia. This Act
mandates the authority to provide the regulation of information and technology were the
Electronic banking technology falls. Its mandate is to facilitate access the information and
technology as well as to protect the rights of consumers and service providers (Henry, 1997)
Analysis of the security logs can detect patterns of suspicious behavior, allowing the
administrator to take action. In addition to security logs, use business auditing to monitor
activities such as payment processing. You can monitor and review these logs to detect
patterns of inappropriate interaction at the business process level. The infrastructure for
business auditing and security logging is complex, and most likely will come as part of any
middleware platform selected to host your site (Kannan, 2004)
Therefore the future of electronic banking will be a system where users are able to interact
with their banks “worry-free” and banks are operated under one common standard. Most
research studies have indicated that the common problem affecting information security and
privacy of customers is e-services provider’s lack of security control which allows damaging
privacy losses. Apart from that, another problem is the subsequent misuse of consumers’
confidential information, as in identity theft. These may affect customer’s confidence toward
online business transaction in a variety of privacy risk assessments by consumers. Current
technology allows for secure site design. It is up to the development team to be both
proactive and reactive in handling security threats, and up to the consumer to be vigilant
when doing business online (Blake, 2000).
32 | P a g e
CHAPTER THREE: METHODOLOGY
3.0. Introduction
This study was premised on the fact that there is an increasing use of electronic technologies
in the banking sector and at the same time there has been security concerns by both banks and
customers over the use of electronic and mobile transactions in the banking and financial
services sector ( Muhammad Bilal and GaneshSankar, 2011) The study was grass-root
oriented research with a view to bring about an understanding about the security methods
used in electronic banking transactions and bring about a more secure and sustainable
electronic banking services. Thus the study was centred on assessing security methods used
in electronic banking transactions, challenges faced in facilitating secure electronic banking,
levels and cases of frauds and as well as causes and sources of fraud in electronic banking
transactions.
Therefore this chapter of the research proposal provides the methodology that was employed
in the study. It presents target population, research instruments, sample size and sampling
procedures, data analysis and ethical considerations. Finally it presents a conclusion on
methodology.
3.1. Research design According to Kombo and Tromp (2013), a research design is the structure of the research. It
is refers to as the ‘glue’ that holds the entre research process together. The function of a
research design is to ensure that the evidence obtained enables us to answer the initial
question as unambiguously as possible. . In social sciences research, obtaining information
relevant to the research problem generally entails specifying the type of evidence needed to
test a theory, to evaluate a program, or to accurately describe and assess meaning related to
an observable phenomenon. ( Trochim, William M.K,2001). It is arrangement of conditions
for collection and analysis of data in a manner that aims to combine relevance to research
purpose.
3.2. Study Population The research targeted a population of 500 customers and 500 members of staff, drawn from
ZANACO. It was from this population that a sample size of ten percent was drawn. It should
be noted that the population was restricted to those in Lusaka. Therefore, a total of one
hundred people were chosen as the sample population, which consisted fifty customers and
fifty members of staff. Interviews were conducted and questionnaires were distributed and
administered respectively. These were used to gather information on how secure electronic
banking transactions are. In order to ensure an accurate representation an equal number of
33 | P a g e
respondents were chosen from the customers and employees. Because security issues in
banking sectors affect both the customers and employees.
3.3. Sampling design and procedure According to Strydom et al (2005), sampling simply means taking any portion of a
population or universe as representative of that population. The major reason for sampling is
feasibility. A complete coverage of the total population is seldom possible and all the
members of a population of interest cannot possibly be reached. Meanwhile sampling design
refers to that part of research plan that indicate how cases are to be selected for observation.
In this study, non-probability sampling design known as purposive sampling was used. This
was used because the sample needed to sample purposively. Thus customers can only been
sampled purposively because this sample is difficult to identify using other methods of
sampling. For ZANACO employees, this vital because the employees best to provide the
responses were those in departments such as bank operations, and risks/internal security
whom could not be selected using other sampling techniques.
3.4. Data collection instrument The data collection instrument in this study was questionnaires for bank employees and an
interview schedule for bank customers. The questionnaires contained both open ended and
closed ended questions. This instrument was used because the employees are literate and also
saves time, confidentiality and overcomes aspects of interview bias. Meanwhile the
interviews was suitable for customers because the respondent’s literate was unknown and
also due to the fact that they were selected on a walk in model when ever find making it hard
to use other form sampling design.
3.5. Administration of data collection schedule Therefore to attain the study objectives, a purposive sample of fifty (50) questionnaires were
administered to the ZANACO bank employees in the various branches in Lusaka. Notably
customers were purposively sampled at convenient points such as ZANACO ATM queues
and those waiting to be attended to at various branches within Lusaka. The target employees
were those in bank operations and or risk/internal security departments. These were chosen
because they are responsibly for dealing with issues security and receive complaints from
customers including those regarding security for customers. The questionnaires and
interviews were personally administered because personal administration of data collection
instruments (such as interviews and questionnaires) provided high response rate. The
questionnaire and interviews schedules both consisted of perpetual measures assessed by
34 | P a g e
statements evaluated on a scale: (strongly agree, agree, strongly disagree, disagree), some
questions involved a yes or no answer, were others involved the employees to give written
statements of certain questions.
3.6. Data Analysis/processing procedure According to Strydom, el al (2005), data analysis means the categorization, ordering,
manipulating and summarizing data to obtain answers to research questions. In this study, the
collected data was analysed qualitatively and quantitatively. The analysis was be based on
research questions. Thus the content analysis of the responses was done under various themes
which were later be presented using descriptive statistics. Themes salient across all cases
were kept as well as those that were extremely different. Thus descriptive analysis of data
was used in this study. The descriptive analysis used average and percentage. In analysing the
data the researcher did a lot of cross-referencing with magazines, journals, text books, and
other research works done by others available on the internet. The nature of this research did
not require extensive mathematical tools. Thus mathematical tools have been scarcely used.
According to Stake (2006), the researcher whose priority is to merge the findings across cases
would use this particular method. This method also allows the researcher to make
generalizations about the cases. Quantitative data on the other hand was analyzed by using
Microsoft excel
3.7. Limitations of the methodology Due to limited time and resources the study was done only with one bank otherwise having a
comparative analysis to at least two banks would have been more comprehensive.
Nevertheless caution was taken to ensure that data collection and analysis is away from bias.
The data collection process took longer than expected because some customers could cut the
interview in the middle of the interview as interviewing them was on a voluntary basis. This
meant that the incomplete interview was not counted. This took time to have fifty complete
interviews. There is also likelihood that those responding to the questionnaires, some
respondents may have their responses influenced by the preceding question owing to the fact
that ZANACO employees are normally busy especially during month. Nevertheless this was
overcomed by administering questionnaire at the mid of the month. The data may also have a
limitation of collecting both data sets just from Lusaka town alone.
35 | P a g e
CHAPTER FOUR: PRESENTATION AND ANALYSIS OF DATA
4.0. Introduction
This chapter presents the findings of the study. It analyses the data and information and
brings out the assessment if the security methods used in electronic banking transactions.
Thus the chapter presents the findings based on the research questions and objectives. The
objectives of the study were to ascertain the challenges faced by banks in facilitating secure
electronic banking transactions, find out the levels of fraud and insecurity in electronic
banking transactions as well as to investigate the causes and sources of fraud/insecurity of
electronic banking transactions.
4.1. Respondents’ characteristics and classifications The respondents for the study were categorised into two namely the customers and bank
employees. In the process of data collection from customers, an equal number of customers
were interview which consisted of twenty five males and twenty five females. Nevertheless
for the respondents from the bank employees, the composition was subject to the available
people to attend to the questionnaires. It should be noted that the responses from the bank
was meant for expert knowledge hence aspects of gender were of less significant hence of
gender on the bank employee respondents was left out.
36 | P a g e
4.2. Response from Clients.
4.2.1 Customer’s Education Level.
The information regarding the customers’ education levels was also covered and the table
below show the education of levels of respondents
Table 4.1: Customers’ Education Level
Education level Frequency Percentage
Primary 3 6%
Basic 10 20%
Secondary 17 34%
Tertiary/postsecondary 20 40%
Total 50 100%
Source: Author, 2016
Figure 4.1: Customers’ Education Level
37 | P a g e
Source Table 4.1
Figure 4.1 shows that 40% of customers were Tertiary/postsecondary, 34% secondary level,
20% basic and only 6% primary level.
4.2.2 Customers’ Responses on E-Banking
The clients were asked of the e-banking services offered by the bank. There was a good
response as shown in table 4.2 below. When asked whether they clients are regular users of
these e-banking services. The responses were as follows.
Table 4.2: Frequency of using electronic service
38 | P a g e
e-banking
Services
Very Regular Regular Rarely Very rarely
Mobile banking 30 17 2 1
ATM 47 2 1 0
Internet banking 1 2 17 30
Source: Author, 2016
Figure 4.2: Frequency of using electronic service
Source: Table 4.2
Figure 4.1 shows that 94% of clients very regularly used the ATM and 60% very rarely used
internet banking facilities.
4.2.3 Responses on Modes of Security Used By Clients
The data below shows responses from clients when asked on what kind of mode of security
they use, When asked on how their accounts are secured in an electronic banking, all the 50
were of the view that the main security securing methods used were passwords, passcodes,
pins and encryption in case of internet banking.
39 | P a g e
Table 4.3: Mode of security used
Mode of security used Response from clients
Password 19
Passcodes 15
PINs 13
Encryption 3
TOTAL 50
Source: Author, 2016
Figure 4.3: Mode of security used
Source: Table 4.3
Figure 4.3 shows that 38% of customers used passwords, 30% used pass codes, 26% used
PINs and 6% used encryption methods as modes of security
40 | P a g e
4.2.4 Client’s Security Feeling On E-Banking Services Offered By ZANACO.
This was asked with reference to the security methods the banks use to secure users privacy
and money. The majority of the clients asked felt were secure, others said were very insecure
and a few said were very insecure.
Table 4.4: Client’s Security Feeling On E-Banking Services at ZANACO
Customers feeling and security level Frequency
Very secure 12
Secure 28
Insecure 7
Very Insecure 3
Source: Author, 2016
Figure 4.4: Customers feeling and security level
Source: Table
4.4
Figure 4.4 shows that 24% of customers felt very secure, 56% felt secure, 14% felt insecure
and 6% felt very insecure about the security levels offered by ZANACO
4.2.5Challenges Faced By Customers in Electronic Banking Services
41 | P a g e
The clients were asked on what challenges they face in using these electronic banking
services. Most of the customers mentioned that sharing their security codes with third party
especially their spouses was the main challenges. Other also mentioned that in some times of
the month especially month end, there is a lot of congestion in accessing these services such
as ATMs. They also added that that sometimes some ATMs are off services. furthermore the
customers complained that ZANACO does not have tall free line where customers can report
immediate fraud and theft case as they call centre is a chargeable line is costly for a customer
Table 4.5: Challenges faced by customers in Electronic Banking
Challenges faced by customers Number of clients
Sharing security codes 26
Congestion when accessing ATMs 14
ATMs out of service 10
TOTAL 50
Source: Author, 2016
Figure 4.5 : Challenges faced by customers in Electronic Banking
Source: Table 4.5
42 | P a g e
Figure 4.5 shows that 52% of customers shared security codes, 28% experienced that ATMs
were congested and 20% experienced that ATMs were out of service.
4.2.6 Victims of Fraud, Hacking and Theft
When asked if the customers have been victims of fraud, hacking and theft in the process of
doing an electronic transaction, the responses were classified as very often, often, never as
shown below
.
Table 4.6: Victims of fraud, hacking and theft
Victims of Very often Often Never TOTAL
Fraud 1 6 5 12
Hacking 1 5 10 16
Theft 2 6 14 22
TOTAL 4 17 29 50
Source: Author, 2016
Figure 4.6: Victims fraud, hacking and theft
43 | P a g e
Source Table 4.6
Figure 4.6 shows that 58% of customers never experienced any form of fraud, hacking and
theft, 34% of customers often experienced some form of fraud, hacking and theft while 8% of
customers very often experienced some form of fraud, hacking and theft,
4.3.1 Bank Employees Responses on Fraud Detection Respondents were asked whether the bank offers fraud detection systems and whether they
have people who monitor it. The results depicted in figure 4.7 shows that 100% of the
respondents fully agreed that ZANACO bank does offer fraud detection systems and that
there are people who monitor this system.
Table 4.7: Bank detection system
Bank detection systems Responses percentage
Yes 50 100
No 0 0
Total 50 100
Source: Author, 2016
Figure 4.7: Bank detection system
44 | P a g e
Source: Table 4.7
4.3.2 How often does the bank incur fraud to the system?
The bank employees were asked on the frequency the bank receives Fraud and theft reports
relating to electronic banking. The results are shown below.
Table 4.8: Frequency of fraud cases at ZANACO
How often does the bank incur fraud Responses
45 | P a g e
Daily 0
Weekly 19
Monthly 21
Annually 0
Never 10
Other 0
Source: Author, 2016
Figure 4.8: Frequency of fraud cases at ZANACO.
Source: Table 4.8
The results in figure 4.8 above depicts that the system of the bank incur fraud mostly monthly
which depicts 42%. This shows that the bank has a challenge to ensure that there is safety in
the use of the e-banking services.
Figure 4.9: Fraud alerts services by ZANACO
46 | P a g e
Source: Author, 2016
The responses as depicted in figure 4.9 suggest that the system does give the customers alerts
in relation to fraudulent activities. 57.1% represent the highest number of people that suggest
the bank system does give alerts to its customers concerning electronic fraud.
4.3.3 Does the bank have firewall protection?
When asked if the bank offers firewall security, the responses were as shown below.
Table 4.10: Response on firewall protection
Response on firewall protection Responses Percentage
Yes 50 100
No 0 0
Total 50 100
Source: Author, 2016
47 | P a g e
Figure 4.10: Response on firewall protection
Source: Author, 2016
Respondents without prompting were required to indicate whether the bank has firewall
protection to its system, which prevents hackers from penetrating through the banks system.
As results show in figure 8 above 100% of the respondents without prompt agreed that the
bank does have firewall protection that prevents hackers from penetrating the banks system.
4.3.4 How often does the institution reinvest in the security system to strengthen and
tighten security
Figure 4.11: institution investment level
Source: Author, 2016
48 | P a g e
According to the results depicted in figure 4.11 above 85.7% of the respondents representing
the majority of the sample pointed out the bank reinvests in its security system once a year or
rather annually.
4.3.5 How secure are electronic banking transactions and services in the institution in
relation to fraud and crime
Figure 4.12: Security levels with regards to fraud and crime
Respondents were asked to perceive how secure electronic banking transactions are in this
institution, by rating their services excellent, very good, good or poor. As results show in
figure 10 the majority of the respondents representing 71.4% perceived that the electronic
services offered by this institution were very good in relation to how secure electronic
banking transactions are secure from fraud.
4.3.6 Does the institution offer training awareness programs for customers to use
electronic banking services.
Figure 4.13: Institutional client training and awareness
49 | P a g e
As shown in figure 4.13, the respondents were required to strongly agree, agree, be moderate,
strongly disagree or agree to the idea that the bank offers training awareness programs to its
customers. According to results depicted in the figure 4.13 above results show a good number
of the sample who represent 37.1% agree to the idea that the bank offers training services
while 22.8% strongly agreed that the bank does offer training awareness to customers to its
customers. These results represent or support the notion that the bank does offer training
awareness programs to educate the customers on the use of electronic banking services.
4.3.7 Do you think the infrastructure offered by the bank is able to provide efficient
utilization of electronic banking transactions?
Figure 4.14: views on infrastructure in enhancing security
Source: Author, 2016
Respondents were asked on their thought as to whether the institutions infrastructure is able
to provide efficient utilization of electronic banking services by its customers. 57% of the
50 | P a g e
respondents agreed that the infrastructure that the bank offers is able to provide efficient use
of the services, 25.7% of the respondents strongly agreed that the infrastructure offered by the
bank is capable to provide efficient utilization of the electronic banking services.
4.3.8 Do customers trust the electronic technology offered by your bank
Figure 4.15: Customers trust of electronic services
Source: author, 2016
The respondents were asked to depict whether the banks technology in form of electronic
banking transactions is trusted by the customers. With reference to the figure above it is clear
that 40% of the respondents were moderate about the idea that the bank offers technology
that is trusted by its customers, this means that 40% of the sample were not clear as to
whether customers trust the technology being used or not, hence forth 34.3% of the sample
agreed that the customers of the bank did trust the technology of the bank.
4.3.9 What are the measures the institution has put in place to ensure that security of
electronic banking transactions is increased?
From a sample of 50 respondents on average 100% of the respondents mentioned that
password control is one of the measure that the bank had put in place to increase security’
Other respondents also mentioned that security codes were also used as a measure to ensure
that the security of electronic banking transactions is put into effect.
51 | P a g e
4.3.10 What methods does the institution use in the security of electronic banking
transactions?
From the sample of 50 respondents it was clearly pointed out by all of them that the notion
that data encryption and the use of passwords as well as security codes were the major forms
that the bank is using to secure the electronic banking transactions.
4.3.11 What are the challenges being faced to ensure that electronic banking
transactions are kept secure
The sample of 50 respondents clearly pointed out that on average the major challenge the
bank faced in keeping electronic banking transactions safe was that most customers share
their passwords with a third party. Therefore, it becomes very difficult to stop fraud in that
once a fraudster is in possession of one’s password it is very easy for them to access that
specific persons account without any difficulty. Another important issue that was raised by
respondents is that customers tend not to follow instructions. When instructions are not
properly followed it could lead to one losing their funds in many ways. Not following
instructions thus has dire consequences for the customer.
52 | P a g e
CHAPTER FIVE: SUMMARY, CONCLUSIONS, RECOMMENDATIONS
5.1. SUMMARY OF FINDINGS
From the findings it can be shown that a good number of clients have been enjoying good
relations with the bank. This can be justified by the fact that there were a very few clients
among those interviewed who are subjected to fraud, theft and hacking. However it should be
noted that the electronic transactions such as internet banking which is more prone to
insecurity is not widely used in ZANACO. This could be attributed to the fact that the bank is
a traditional bank where most civil and public workers use it for salaries thus it may not have
a lot of clients involved in internet banking. Furthermore it has been established from
findings that in creating awareness of fraud and insecurity issues, the bank has put in place
measures such as awareness campaigns and other media such as sms alerts and call centre.
However, the making of the call centre a cost line has the capacity to jeopardise the reporting
system in times of emergencies.
The findings from the respondents from the bank show that there are others that have not
been fully convinced that the infrastructure is at par to the standards of proving secure
banking transactions. This can be proved or justified in figure 4.4 of chapter four where 24%
of the clients felt not secure of the E-Banking services offered by ZANACO. However, it has
been seen that the government has continued to put in measures to ensure that the structures
are update and able to provide comprehensive security to its clients. The coming of Rabo
banking has brought improved security into the ZANACO bank since 2007.
The customers interviewed from the study show that the level of trust for the security of their
accounts within the bank differs as per individual and the findings were corresponding with
responses from bank employees. They also added that that sometimes some ATMs are off
services. Furthermore the customers complained that ZANACO does not have toll free line
where customers can report immediate fraud and theft cases as the call centre is a chargeable,
this can be seen in table 4.6 of the data analysis which explains victims of fraud, hacking and
theft results. Moreover, the customer care line is costly for a customer especially in
emergency services. The findings according to figure 4.14 show that 17% of the respondents
were moderate about the idea that the bank offers technology that is trusted by its customers,
this means that 17% of the sample were not clear as to whether customers trust the
technology being used or not. The findings from the bank employees however show that the
bank does not fully have strict security systems to protect the welfare of its banking clients.
53 | P a g e
Nevertheless it has been established from the study findings that , in the process of ensuring
that the banking transactions of the clients are safe and secure, the findings show that the
bank faces a number of challenges was that the client share the security codes with the third
parties. Notably the finding show that use of passwords as well as security codes were the
major forms that the bank is using to secure the electronic banking transactions In African
societies like Zambia, it is believed that sharing secrets in relationships such as marriage is a
source trust hence spouse don’t bother sharing the passcodes such as ATM pins with
husbands and wife. In addition the sharing of security could be to high levels of ignorance
and illiteracy. For example withdrawing from inside the counter is expensive and any
personal accounts is entitled to the ATM whether they know or not hence such clients seek
help by sharing their security codes. Therefore the bank finds it hard to stop fraud in that once
a fraudster is in possession of one’s password it is very easy for them to access that specific
persons account without any difficulty. Another important issue that was raised by
respondents is that customers tend not to follow instructions. When instructions are not
properly followed it could lead to one losing their funds in many ways.
In a nutshell from the results presented above, a number of observations can be made. Firstly
although the bank under discussion has fraud detection system as indicated by the results,
there exists challenges in curbing fraud. As shown in figure 4.8, the bank has reports of fraud
to the system at least on a monthly basis. The bank therefore has a challenge in ensuring
safety for its electronic banking system.
The bank must do better than just reinvesting in security software annually. For a bank to be
secure it could better to strengthen security on a monthly basis. It can be noted that Zambian
Electronic banking industry is making numerous changes to the way it conducts its
transactions in relation to safety due to largely changing ICT developments as well as due to
hackers being more sophisticate in finding new innovations as to how they may capitalize on
the weaknesses of the electronic banking system through various banks in the country. With
regard to the preceding discussion the following conclusions could be drawn: there have been
little research conducted on the security of electronic banking transactions as it is known that
Zambia is a developing country and such facilities relating to electronic banking have only
come into the country recently. As a result of these facilities only coming into the country
recently customers are not well equipped with sufficient information that allows them to be
able to work hand in hand with the service providers in order to ensure that there is safety in
the use of electronic services. The exchange of personal passwords by customers makes it
54 | P a g e
difficult to ensure safety as this could lead to crooked people using that shared information to
hack into other people’s accounts, thus another conclusion seen is that the service providers
of these facilities do not efficiently give guidelines and free security software to their
customers to use on their personal computers as they access the banks facilities which could
maximize the service quality and security of these transactions.
5.2. Conclusion From the discussion thus far, it has been observed and established from the study that the
specific banks are lagging behind in terms of innovations relating to the services provided in
the electronic banking. Therefore if the bank is to gain competitive advantage through the
provision of electronic banking services they must be able to spot opportunities around the
world of international banking in order to increase the services and also to seek the
weaknesses in the system so as to be able to educate and use the services efficiently with
minimal fraud.
5.3. Recommendations The following are the areas in which the bank needs to look at in order to increase its
customer retaining, as well as gaining competitive advantage in the market:
The bank must be able to educate its customers on how to efficiently use electronic
banking services as well as pointing out to them that their personal bank information
is confidential and must not be given to any other persons at what so ever extent.
Banks should also be able to outsource credible I.T specialists to be able to service the
banks security system.
Banks should also ensure that they procure efficient ICT security gadgets in order to
ensure that there is efficient and improved security to the system of the bank
Banks should also offer customers a toll free number to allow customers be able to
communicate with their banks effectively should any anonymous activity relating to
their bank account occur.
The use of outside consultants to identify information security risks and their
management
55 | P a g e
Financial institutions (banks) should use this guidance when evaluating and
implementing authentication systems and practices whether they are provided
internally or by a service provider.
recommend a minimum of two-factor authentication process for all user access to the
services provided which could be high-risk transactions involving access to customer
information or the movement of funds to other parties .
The authentication techniques employed by the financial institutions should be
appropriate to the risks associated with those products and services. Account fraud
and identity theft are frequently the result of single-factor (e.g., ID/password)
authentication exploitation.
Where risk assessments indicate that the use of single-factor authentication is
inadequate, financial institutions should implement multifactor authentication,
layered security, or other controls reasonably calculated to mitigate those risks
Mobile Telephony: Mobile phones are increasingly being used for financial services in
the world. Banks are enabling the customers to conduct some banking services such
as account inquiry and funds transfer. Therefore the Networks used for transmission
of financial data must be demonstrated to meet the security standards
Automated Teller Machines (ATM): In addition to guidelines on e-banking in
general, Networks used for transmission of ATM transactions must be
demonstrated to meet the guidelines specified for data confidentiality and
integrity.
56 | P a g e
REFERENCES Alder, E. (2002), “Smart Card Technology – Hong Kong, Legal Issues in Smart Card.
Alfred. J. Menezes, Paul. C. Van Oorschot and Scott. A. Vanstone (1996). Handbook of
applied cryptography. London: CRC press.
Allan, A., (1998) “Innovation management”. London: oxford press,
AMA Workshop Event (2006). Misc. materials distributed related to event(s).San Diego,
Bambos. N. (2010). “A Risk management view to information security”. Berlin gamesec
proceedings of the first international conference decision and game theory on security.
Basel committee report on supervision (1998), Basel Risk management for electronic
banking and electronic money activities. Bank of international settlements Basel.
Beans K.M (1999) “Internet banking is the future of community banks” Journal of Lending
and credit Risk Management vol. 81 no 11 pp. 47-49.
Bernkopf, (1996) Electronic cash and monetary policy. Hong Kong, Legal Issues in Smart
Blake J. (2000), ATM security measures. London: McGill Hill
Fojt.M. M. (1996) “Doing business on the information highways” internet research:
Electronic Networking applications and policy vol, 6.2/3 pp 79
Government of the Republic of Zambia (1994), the banking and financial services Act
(1994). The Laws of Zambia.
Henry C. Lucas, JR. (1997).Information Technology for Management. 6th Edition. London:
Pearson Education.
John Mc Gill (2004), ATM’s Technological change. London: McGill Hill
John W. (1997) Banking and Finance on the Internet. New Yolk. John Wiley and Sons.
Kannan R, (2004) Project on internet banking report of (RBI) Reserve Bank of India, working
group. www.geocities.com/kstability/student/internet-banking /
57 | P a g e
Khan, M.A (2010). An empirical study of Automated Teller Machines service quality and
customer satisfaction in Pakistani Banks. European Journal of Social Sciences, 13(3), 333-
344.
Mary Jane Cronin (1997), Banking and finance on interest (Interest management series Mary
J Cronin (August 29th 1997)
Pakistan" (2000), International Journal of Commerce & Management, Vol. 13 No.2, pp. 29-
53.
Santos, J. (2003), "E-service quality: a model of virtual service quality dimensions"
Managing Technology” Computer Law & Security Report, Vol. 18, No. 2, pp. 120-123.
Singh, S. and Komal, M. (2009). ‘Impact of ATM on customer satisfaction: a comparative
study of SBI, ICICI & HDFC bank’. Business Intelligence Journal, 2(2), 276- 287.
Zambia National Commercial Bank (2010). Annual Report. Lusaka: Zambia National
Commercial Bank
ZICTA (2009), Zambia information and communications statutory act # 15 of 2009. Lusaka:
ZICTA
Ziqi.L. L. Michael. T.C. (2003) ‘Challenges to internet, electronic banking’, Communications
of ACM archive. Mobile computing opportunities and challenges Vol. 46, issue 12, pp 248-
250
www.networkworld.com/article 2276425/lan-wan/Zesco-begins-leasing-fiber-
communication-backbone.html – accessed on October 9, 2018
58 | P a g e
Appendix I:
CAVENDISH UNIVERSITY ZAMBIA
Questionnaire for clients/customers
Faculty of Business Information and Technology
PROJECT TITLE: ASSESSMENT OF THE SECURITY METHODS USED IN E-
BANKING TRANSACTIONS IN ZAMBIA. - CASE STUDY ZANACO BANK
ZAMBIA PLC
Am a 4th year student the Cavendish university Zambia pursuing a Bachelor of science
degree in Computing, currently conducting a research themed the methods of security of
electronic banking transactions in Zambia.
The purpose of this interview is to seek your views concerning the security of electronic
banking transactions in the Zambian banking sector your responses will provide important
information in relation to how secure your services are to the consumers. The ultimate
objective of this questionnaire therefore is to evaluate and document the current position of
security in electronic banking transactions in Zambia.
All efforts will be made to maintain confidentiality of all responses as the answers are for
academic purposes only.
Indicate with circle where appropriate.
1) What is your education level?
a) Primary
b) Basic
c) Secondary
d) Tertiary/postsecondary
2) What e-banking services does ZANACO offer?
a) Mobile banking
b) ATM
c) Internet banking
3) How frequent do you use the named e-banking facilities in question 2?
59 | P a g e
a) Very regular
b) Regular
c) Rarely
d) Very rarely
4) Do you feel safe and secure when using these services
a) Very Secure
b) Secure
c) Insecure
d) Very Insure
5) What methods do you and your bank use to ensure security of your privacy and
money?
a) Password
b) Passcodes
c) PINs
d) Encryption
6) How reliable do you feel these security methods are (from question 5)?
a) Very reliable
b) Reliable
c) Unreliable
d) Very unreliable
7) What challenges do you face with regards to using these electronic banking services?
a) Sharing security codes
b) Congestion when accessing ATMs
c) ATMs out of service
8) i) How often if any have been a victim of fraud involving electronic banking
transaction?
60 | P a g e
a) Very often
b) Often
c) Never
ii) How often if any have been a victim of hacking involving electronic banking
transaction?
a) Very often
b) Often
c) Never
iii) How often if any have been a victim of theft involving electronic banking
transaction?
a) Very often
b) Often
c) Never
9) How are the levels of fraud and insecurity in electronic banking transactions?
a) Very high
b) High
c) Moderate
d) Low
e) Very low
10) What measures do you think ZANACO need to put in place to reduce electronic
banking insecurity?
a) Sensitive clients on frauds
b) Prompt clients to change passwords regularly
61 | P a g e
c) Send fraud alerts to clients
Appendix II- Questionnaire for bank employees.
Dear Respondent,
The researcher is a 4th year student in the school of business at the university of Lusaka
pursuing a bachelor of science degree in banking and finance, currently conducting a research
themed the methods of security of electronic banking transactions in Zambia.
The purpose of this questionnaire is to seek your views concerning the security of electronic
banking transactions in the Zambian banking sector your responses will provide important
information in relation to how secure your services are to the consumers. The ultimate
objective of this questionnaire therefore is to evaluate and document the current position of
security in electronic banking transactions in Zambia.
Please take a few minutes to fill in this questionnaire. All efforts will be made to maintain
confidentiality of all responses.
Ngwale Nkosa
Instructions
Please do not write your name.
Simply fill in the blank spaces and ticks where applicable.
Name of Institution………………………………………………….
1. Does your bank offer fraud detection systems and do you have people who monitor it?
a) Yes……
b) No…….
62 | P a g e
2. How often does your bank incur fraud to the system? (Tick were applicable)
a. Daily………
b. Weekly…….
c. Monthly……
d. Annually…….
e. Never………..
f. Other……….
3. Does your system give your customers any fraud alerts? (Tick were applicable)
a. Yes……..
b. No………
c. Sometimes……
d. Never………….
4. What kind of security methods do you offer your clients with regards to electronic
banking?............................
5. Do you offer free security software to your customers? Tick were applicable
a. Yes ……
b. No……
c. Sometimes…….
d. Never………….
6. Does your system have firewall protection?
Yes……
No……..
63 | P a g e
7. What measures has your institution put in place to increase security in electronic banking
transactions?.................................................................................................................................
......................................................................................................................................................
....
8. How many Electronic banking services does your institution offer? Please name them
……………………………….
9. What Challenges is your institution facing in facilitating electronic banking security?
…………………………………………………………………………………………………
10. How often does your institution reinvest in your security system to strengthen and tighten
security? Tick were applicable
a. Weekly
b. Monthly
c. Annually
d. Other
11. How secure are electronic banking transaction services in your institution in relation to
fraud and crime?
a. Excellent
b. Very good
c. Good
d. Poor
e. Other
12. Does your institution provide training awareness programs for customers to use electronic
banking services?
a. Strongly Disagree
b. Disagree
64 | P a g e
c. Moderate
d. Agree
e. Strongly Agree
13. Do you think the infrastructure in your institution is able to provide efficient utilization of
electronic banking transactions?
a. Yes
b. No
c. Somewhat yes
d. No really sure
14. To what extent do customers trust the electronic technology offered by your bank?
a. Strongly trust
b. Moderate tryst
c. Not sure
15. Any other comments relating to the topic or study.
Thank you for taking time to answer this questionnaire.