Risk Management in On-Line Banking
Ioannis V. Koskosas
DOI: 10.4236/iim.2011.34013   PDF   HTML     5,558 Downloads   10,975 Views   Citations


In the context of goal setting, the more difficult the goal, given feedback on performance, the more focused is individuals’ attention and persistence to accomplish the goal and in turn, their performance is also improved. Similarly, when the goal is multi-complex and performance time constraint, the deployment of specific strategies maybe the best approach developed. In effect of the above, this investigation takes a socio-psychological and organizational perspective in setting information systems (IS) security goals. In doing so, three important issues of goal setting are identified, these are: trust, culture and risk communication. Since system security breaches are still on the rise, the performance of managing such online risks is not the one expected. The framework suggested in this paper aims to contribute to socio-psychological and organizational values by enhancing the performance of the IS risk management process with a focus on security risks.

Share and Cite:

I. Koskosas, "Risk Management in On-Line Banking," Intelligent Information Management, Vol. 3 No. 4, 2011, pp. 112-118. doi: 10.4236/iim.2011.34013.

Conflicts of Interest

The authors declare no conflicts of interest.


[1] R. V. Solms, “Information Security Management: Why Infor-mation Security is So Important.” Information Management and Computer Security, Vol. 6, No. 4, 1998, pp. 174-177. doi:10.1145/162124.162127UUUUU
[2] R. Power, “CSI/FBI Com-puter Crime and Security Survey,” Computer Security: Issues and Trends, Vol. 11, No. 1, pp. 1-20.
[3] S. Jasanoff, “Learning from Disaster: Risk Management after Bhopal,” University of Pennsylvania Press, Philadelphia, 1994.
[4] R. Baskerville, “Information Systems Security Design Methods: Implications for Information Systems Development,” Associa-tion for Computing Machinery Comput- ing Surveys, Vol. 25, Vol. 4, 1993, pp. 375-414. doi:10.1145/162124.162127.
[5] G. Dhillon and J. Backhouse, “Current Directions in IS Security Research: Towards Socio-Organizational Perspectives,” Information Systems Journal, Vol. 11, No. 2, 2001, pp. 127-153. doi:10.1046/j.13652575.2001.00099.x
[6] W. E. Jacoby, “Strategic Information Systems Planning and Implementation in the U.S. Financial Services Industry,” University of London, London, 1995.
[7] D. Hirsch, “The Future of Cash in Europe,” ESTA Conference Proceedings, Tallin, 2007.
[8] P. Bansal, “Mobile Banking Steps up a Gear.” The Bank- er, Vol. 151, 2001, pp. 121-126.
[9] N. Huber, “XML Cracks TV Banking Service: Company Business and Marketing,” Computer Weekly, Reed Business Information, 2000, pp. 51-52.
[10] A. Bandura, “Self-efficacy: The Exercise of Con-trol,” Freeman Publishing, New York, 1977.
[11] E. A. Locke, L. M. Saari, K. N. Shaw and G. P. “Latham, Goal Setting and Task Performance: 1969-1980,” Psychological Bulletin, Vol. 90, No. 1, 1981, pp. 125-152. doi:10.1037/0033-2909.90.1.125
[12] E. A. Locke, “The Myths of Behaviour Mod in Organizations.” Academy of Man-agement Review, Vol. 2, 1977, pp. 543-553.
[13] T. R. Mitchell, M. Thompson and J. George-Falvy, “Industrial and Organizational Psychology,” Blackwell Publishers, Oxford, 2000.
[14] E. A. Locke and G. P. Latham, “A Theory of Goal Setting and Task Performance,” Englewood Cliffs, New Jersey: Prentice-Hall, 1990. pp. 413.
[15] R. H. Rasch and H. L. Tosi, “Factors Affecting Software Developers Performance: An In-tegrated Approach,” Ma- nagement Information Systems Quarterly, Vol. 16, No. 3, 1992, pp. 395-413. doi:10.2307/249535UUUUU
[16] J. E. Hunter and F. L. Schmidt, “Quantifying the Effects of Psychological Interventions on Employee Job Performance and Work Force Productivity,” American Psychologist, Vol. 38, 1983, pp. 473-478. doi:10.1037/0003-066X.38.4.473
[17] A. A. Chesney and E. A. Locke, “Relationships Among Goal Difficulty Business Strate-gies and Performance on a Complex Management Simulation Task,” Academy of Management Review, Vol. 34, No. 2, 1991, pp. 400-424. doi:10.2307/256448
[18] G. P. Latham and J. J. Baldes, “The ‘Practical Significance’ of Locke’s Theory of Goal Setting,” Journal of Applied Psychology, Vol. 60, No. 1, 1975, pp. 122-124. doi:10.1037/h0076354
[19] J. R. Terborg, “The Motivational Components of Goal Setting,” Journal of Applied Psychology, Vol. 61, No. 5, 1976, pp. 613-621. doi:10.1037/0021-9010.61.5.613
[20] P. C. Earley, C. Lee and L. A. Hanson, “Joint Moderating Effects of Job Experience and Task Component Complexity: Relations Among Goal Setting, Task Strategies and Performance,” Journal of Organizational Behaviour, Vol. 11, No. 1, 1990, pp. 3-15. doi:10.1002/job.4030110104
[21] P. C. Earley and B. C. Perry, “Work Plan Availability and Performance: An Assessment of Task Strategy Priming on Subsequent Task Completion,” Organizational Behaviour and Human Decision Processes, Vol. 39, No. 3, 1987, pp. 279-302. doi:10.1016/0749-5978(87)90025-2
[22] P. C. Earley, G. B. Northcraft, C. Lee and T. R. Lituchy, “Impact of Process and Outcome Feedback on the Relation of Goal Setting to Task Performance,” Academy of Management Journal, Vol. 33, No. 1, 1990, pp. 87-105. doi:10.2307/256353
[23] R. E. Wood and A. Bandura, “Social Cognitive Theory of Organizational Management,” Academy of Management Review, Vol. 14, No. 3, 1989, pp. 361-384.
[24] P. C. Earley, P. Wojnaroski and W. Prest, “Task Planning and Energy Expended: Exploration of How Goals Influence Performance,” Journal of Applied Psychology, Vol. 72, No. 1, 1987, pp. 107-114. doi:10.1037/0021-9010.72.1.107UUUUU
[25] E. A. Locke and K. N. Shaw, “Atkinson’s Inverse-Ucurv- e and the Missing Cognitive Variables,” Psychological Reports, Vol. 55, 1984, pp. 403-414.
[26] G. E. Rejda, “Principles of Risk Management and Insurance,” Addison-Wesley, New York, 1998.
[27] G. Hofstede, “Cultures and Organizations: Soft-ware of the Mind,” Harper-Collins, London, 1994.
[28] T. M. Singelis, H. C. Triandis, D. S. Bhawuk and M.Gelfand, “Hori-zontal and Vertical Dimensions of Individualism and Collec-tivism: A Theoretical and Measurement Refinement,” Cross-Cultural Research, Vol. 29, No. 3, 1995, pp. 240-275. doi:10.1177/106939719502900302UUUUU
[29] H. C. Triandis, “Boulder”, Westview Press, New York, 1995.
[30] N. W. Hui and H. C. Triandis, “Individualism-Collectivi- sm: A Study of Cross-cultural Researchers,” Journal of Cross-Cultural Psychology, Vol. 20, 1986, pp. 296-309.
[31] R. Lewicki and B. Burker, “Developing and Maintaining Trust in Work Relationships,” Thousand Oaks, CA: Sage, 1996.
[32] R. Porta, F. Lopez-de-Silanes, A. Shleifer and R. Vishny, “Trust in Large Organizations,” Interaction of Eco-nomic Institutions and Theory, Vol. 87, No. 2, 1997, pp. 333-338. doi:10.1177/0022022189203004
[33] B. Misztal, “Trust in Modern Societies,” Blackwell Publications, Malden, 1998.
[34] P. Ratnasingham, “Trust in Web Electronic Com-merce Security,” Information Management and Computer Security, Vol. 6, No. 4, 1998, pp. 162-166. doi:10.1108/09685229810227667
[35] J. Backhouse and G. Dhillon, “Structures of Responsibility and Security of Information Systems,” European Journal of Information Systems, Vol. 5, 1996, pp. 2-9. doi:10.1057/ejis.1996.7
[36] R. Bener, “Risk Perception, Trust, and Credibility: A Case in Internet Banking,” University Col-lege of London, London, 2000.
[37] J. Backhouse and G. Dhillon, “Electronic Thesauruses for Clinical Terms: A Meth-odological Approach,” Third European Conference in Information Systems, Athens, Greece, 1995.
[38] S. Krimsky and O. Plough, “Environmental Haz ards: Communicating Risks as a Social Process,” Auburn House, Maersk Alabama, 1988.
[39] G. P. Latham and E. A. Locke, “Self-regulation through goal setting,” Organizational Behaviour and Human Decision Processes, Vol. 50, No. 2, 1991, pp. 212-47.doi:10.1016/0749-5978(91)90021-K
[40] J. Ansell and F. Wharton, “Risk: Analysis, Assessment and Management,” John Wiley and Sons Ltd, West Sussex, 1992.
[41] P. Slovic, “Perception of Risk: Reflections on the Psychometric Paradigm in Social Theories of Risk,” GreenWood Publishing Group, 1992.
[42] A. Tversky and D. Kahneman, “Availability: A Heuristic for Judging Frequency and Probability,” Cognitive Psychology, Vol. 10, 1973, pp. 34-52.
[43] “IT safe?” CIO Magazine, Vol. 12, No. 19, 1999.
[44] D. W. Straub and R. J. Welke, “Coping with Systems Risks: Security Planning Models for Management Decision Making,” MIS Quarterly, Vol. 22, No. 4, 1998, pp. 441-469.doi:10.2307/249551

Copyright © 2020 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.