Customer data security and theft: a Malaysian organization's experience

被引:10
|
作者
Abidin, Mohd Aizuddin Zainal [1 ]
Nawawi, Anuar [1 ]
Salin, Ahmad Saiful Azlin Puteh [2 ]
机构
[1] Univ Teknol MARA, Fac Accountancy, Shah Alam, Selangor, Malaysia
[2] Univ Teknol MARA, Fac Accountancy, Perak, Malaysia
关键词
Malaysia; Internal control; Customer information; ISLAMIC WORK ETHICS; IDENTITY THEFT; FRAUD; OWNERSHIP; EMPLOYEES; INTERNET; RISK;
D O I
10.1108/ICS-04-2018-0043
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Purpose This study aims to identify weaknesses in current internal control systems in protecting customer data and the drivers that motivate employees to steal customer data and the impact of customer data theft on the organization. Design/methodology/approach A case study approach was taken to investigate and analyze internal control system weaknesses. One organization that involved investor and treasury services was selected as a case study in this research. A mixed method of data collection, specifically survey questionnaires and observations, was used. Findings This study revealed that employees are aware of the policy to protect customer data in their organization. Ironically, customer data theft still occurred despite the company having an internal control system. The main concern was the attitude of the employees to adhere to the policies in place, which becomes the major cause of internal control violation. Employees tend to ignore policies and standard operating procedures, providing opportunities for data theft and fraud to occur, although they realize this will result in a severe impact on the reputation of a company. Research limitations/implications - The results provide further confirmation of the fraud triangle theory, i. e. opportunity on the possible causes of the data theft and fraud, supporting prior empirical research and surveys conducted by researchers and global professional firms on fraud. This study, however, was conducted on only one organization with limited participation from employees because of the sensitivity of the nature of the topic. Practical implications - This study provided recommendations that can be a reference for companies and regulatory bodies in preventing customer data theft cases, such as regular training and awareness campaigns to the staff, stringent recruitment policies, close monitoring on the accessibility of customer data and continuous use of advanced technology to prevent a data breach. Originality/value - This study is original, as it focuses on an organization that operates in the financial services industry, which is one of the most attacked sectors for data theft and cybercrime activity globally. Furthermore, this kind of research is rare in fraud literature, particularly in developing markets such as Malaysia. The findings of this study are inferred from the direct observation of the organizational and employee work environments, activities and behaviors, which are private and confidential and difficult to access by researchers for publication in academic journals.
引用
收藏
页码:81 / 100
页数:20
相关论文
共 50 条
  • [31] Customer's access to cadastral data
    Muggenhuber, G
    Krieglsteiner, R
    GEOGRAPHICAL INFORMATION '97: FROM RESEARCH TO APPLICATION THROUGH COOPERATION, VOLS 1 AND 2, 1997, : 1036 - 1045
  • [32] Conceptualizing and Measuring Customer Experience for a Mobile Telecoms Operator : The Customer's perspective
    Belabbes, Ikrame
    Oubrich, Mourad
    2018 IEEE INTERNATIONAL CONFERENCE ON TECHNOLOGY MANAGEMENT, OPERATIONS AND DECISIONS (ICTMOD), 2018, : 37 - 42
  • [33] Analysis of Security Data from a Large Computing Organization
    Sharma, A.
    Kalbarczyk, Z.
    Barlow, J.
    Iyer, R.
    2011 IEEE/IFIP 41ST INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS (DSN), 2011, : 506 - 517
  • [34] Malaysian Government's Unified Approach to Address National Food Security
    Tan, Mohd Zulhelmi Syafuddin
    Bakar, Ahmad Naqiyuddin
    Ahmad, Yarina
    ENVIRONMENT-BEHAVIOUR PROCEEDINGS JOURNAL, 2024, 9 : 383 - 388
  • [36] Implementing data privacy and security (the Slovenian experience)
    Markota, M
    Raic, G
    MEDICAL INFORMATICS EUROPE '97: PARTS A & B, 1997, 43 : 879 - 883
  • [37] Customer Experience and Satisfaction of Disneyland Hotel through Big Data Analysis of Online Customer Reviews
    Zhang, Xiaobin
    Kim, Hak-Seon
    SUSTAINABILITY, 2021, 13 (22)
  • [38] Customer Experience Management (CEM) for Automation, Data Collection and Methodology
    Safdar, Saria
    Khan, Shoab Ahmed
    Shaukat, Arslan
    2019 10TH INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY CONVERGENCE (ICTC): ICT CONVERGENCE LEADING THE AUTONOMOUS FUTURE, 2019, : 1354 - 1358
  • [39] Using Big Data to Improve Customer Experience and Business Performance
    Spiess, Jeffrey
    T'Joens, Yves
    Dragnea, Raluca
    Spencer, Peter
    Philippart, Laurent
    BELL LABS TECHNICAL JOURNAL, 2014, 18 (04) : 3 - 17
  • [40] Comparative studies of various missing data treatment methods - Malaysian experience
    Tang, W. Y.
    Kassim, A. H. M.
    Abubakar, S. H.
    Atmospheric Research, 42 (1-4):