Developing a Conceptual Model for Applying the Principles of Crisis Management for Risk Reduction on Electronic Banking
American Journal of Computer Science and Technology
Volume 1, Issue 1, March 2018, Pages: 31-38
Received: Oct. 30, 2017; Accepted: Nov. 20, 2017; Published: Jan. 2, 2018
Views 991      Downloads 78
Authors
Maedeh Babaei Chafjiri, Department of Information Technology and E-commerce, MehrAstan University, Guilan, Iran
Abbas Mahmoudabadi, Department of Industrial Engineering, MehrAstan University, Guilan, Iran
Article Tools
Follow on us
Abstract
Despite many benefits of e-banking for customers, operators and bank managers, e-banking activities are associated with some kinds (types) of risks. Therefore, it is essential to manage E-banking risks utilizing the concepts of risk reduction techniques such as crisis management. The main aim of the present research work is to utilize the principles of crisis management for risk reduction in e-banking. Major risks associated to e-banking including security, provisional, operational, reputational, legal and strategic activities have been identified at the first stage followed by developing a conceptual model for the application of crisis management countermeasures to reduce the risks of electronic banking activities at the second stage. The proposed conceptual model has been validated by analyzing the filled out questionnaires designed for this purpose. In addition to conceptual model approval, results revealed that the principles of crisis management could be applied to reduce the risks which are associated with e-banking activities for both customer relations and internal transactions.
Keywords
Electronic Banking, Electronic Banking (E-Banking) Risks, Crisis Management, Conceptual Modeling
To cite this article
Maedeh Babaei Chafjiri, Abbas Mahmoudabadi, Developing a Conceptual Model for Applying the Principles of Crisis Management for Risk Reduction on Electronic Banking, American Journal of Computer Science and Technology. Vol. 1, No. 1, 2018, pp. 31-38. doi: 10.11648/j.ajcst.20180101.15
Copyright
Copyright © 2018 Authors retain the copyright of this article.
This article is an open access article distributed under the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0/) which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
References
[1]
Abdou, H., English, J. & Adewunmi, P. (2014), ‘An investigation of risk management practices in electronic banking: the case of the UK banks’, Banks and Bank Systems, 9 (3). pp. 19-31. ISSN 1816-7403.
[2]
Abbasi Aabkhare, A., Mahmoud Alilo, B., & Abedini, E., (2013), Advantages and Disadvantages of E-Banking and Commerce, Life Science Journal, 10 (4s), pp. 458-462.
[3]
Safarpour, M., (2016), Identification and ranking the barriers to adoption and development of electronic banking in Iran. 1st International Conference on Applied Economics and Business, Procedia Economics and Finance, vol. 36, 374-380.
[4]
Cobb, S. (1996), “Security Issues in Internet Commerce”, Proc. IEEE.
[5]
Torrubia, A., Mora, F. J., Marti, L. (2001), “Cryptography Regulations for E-commerce and Digital Rights Management”, Computers & Security Vol. 20, No. 8, 730-731.
[6]
Liao, R., Kishore, R. (2017), “Trust and Risk in E-Commerce: A Re-examination and Theoretical Integration”, SIGMIS-CPR'17 Proceedings of the 2017 ACM SIGMIS Conference on Computers and People Research, Pages 61-62, Bangalore, India.
[7]
Zarei, Sh. (2011),“Risk Management of Internet Banking”, International Conference on Artificial Intelligence, Knowledge Engineering and Data Bases. Cambridge, UK -February 20 - 22, 2011, pp. 134-139.
[8]
Manzano, A., Joaquı´n and Lassala-Navarre´. Carlos and Ruiz-Mafe´. Carla and Sanz-Blas. Silvia, (2009), “The role of consumer innovativeness and perceived risk in online banking usage,” International Journal of Bank Marketing, Vol. 27 No. 1, pp. 53-75.
[9]
Yousafzai, S. Y., Pallister, J. G., &Foxall, G. R., (2003). A proposed model of e-trust for electronic banking. TECH Technovation, 23 (11), 847-860.
[10]
Hoffman, D. L., Novak, T. P. & Peralta, M. A., (1999) Building consumer trust online. Communications of the ACM, 42 (4), 80–85.
[11]
Al-Smadi M., Al-wabel S. A. (2010). E-Banking on of Jordanian Banks; Journal of Internet Banking and Commerce, Vol. 14, No. 1, pp. 1-10.
[12]
Tattam, D. (2017)."Reputation Risk: Risk Event or Risk Consequence?"Protect Risk Management Insights. Retrieved 2017-05-01.
[13]
Khezri, R. &Tavallaei, R. (2014). Risk Management Strategies of Electronic Services in the Iran’s Banking System. International Journal of Innovation, Management and Technology, Vol. 5, No. 5, pp. 351-357.
[14]
Perry, R. W., Quarantelli, E. L., (2004), what is a Disaster? More Perspectives. Philadelphia, Xlibris.
[15]
Alexander, D. (2002). From civil defense to civil protection-and back again. Disaster Prevention and Management, vol. 11, no. 3, 209-213.
[16]
Campion, M. A., Medsker, G. J and. Higgs, A. C. (1993). Relations between work group characteristics and effectiveness: Implications for designing effective work groups. Personnel psychology, vol. 46, no. 4, 823-847.
[17]
Pagell, M and LePine, J, A. (2002). Multiple case studies of team effectiveness in manufacturing organizations. Journal of Operations Management, vol 20, no. 5, 619-639.
[18]
Clark, j. Oorschot, p. (2013). SoK: SSL and HTTPS: Revisiting past challenges and evaluating certificate trust model enhancements. IEEE Symposium on Security and Privacy. 511-523.
[19]
Amtul, Fatima. (2011). E-Banking Security Issues – Is There A Solution in Biometrics?. Journal of Internet Banking and Commerce, August 2011, vol. 16, no. 2. pp. 1-9.
[20]
Shekokar, N. M., Shah, Ch., Mahajan, M. & Rachh, Sh. (2015), An Ideal Approach for Detection and Prevention of Phishing Attacks. Computer Science 49, 82-91.
[21]
Elkamchouchi, H., Abu Elkhair, E., Abouelseoud, Y. (2013). AN IMPROVEMENT TO THE SET ROTOCOL BASED ON SIGNCRYPTION. International Journal on Cryptography and Information Security (IJCIS), Vol. 3, No. 2, 1-13.
[22]
Anithakumari, S., Chandrasekaran, K., (2015), “Monitoring and Management of Service Level Agreements in Cloud Computing’, International Conference on Cloud and Autonomic Computing. IEEE 2015, pp. 204-207.
[23]
Cronbach LJ. (1970). Essentials of Psychological Testing. Harper &Row, 3rd ed., New York, Harper and Row Publishers.
ADDRESS
Science Publishing Group
1 Rockefeller Plaza,
10th and 11th Floors,
New York, NY 10020
U.S.A.
Tel: (001)347-983-5186