2022
DOI: 10.1371/journal.pone.0265674
|View full text |Cite
|
Sign up to set email alerts
|

Evaluating factors contributing to the failure of information system in the banking industry

Abstract: The increasing use of Information Technology (IT) has led to many security and other related failures in the banks and other financial institutions in Bangladesh. In this paper, we investigated the factors contributing to the failurein the IT system of the banking industry in Bangladesh. Based on the experts’ opinions and weight on the specified evaluating criteria, an empirical test was conducted using a rough set theory to produce a framework for the IT system failure factors. In this study, an extended appr… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
9

Relationship

0
9

Authors

Journals

citations
Cited by 18 publications
(4 citation statements)
references
References 55 publications
0
4
0
Order By: Relevance
“…Ali et al proposed the attribute-based CPK cryptosystem and gave the security model. Additionally, they also gave the construction method of using a key pair to realize the three cryptosystems of encryption, decryption, and signature by using the attribute-based CPK cryptosystem [19].…”
Section: Literature Reviewmentioning
confidence: 99%
“…Ali et al proposed the attribute-based CPK cryptosystem and gave the security model. Additionally, they also gave the construction method of using a key pair to realize the three cryptosystems of encryption, decryption, and signature by using the attribute-based CPK cryptosystem [19].…”
Section: Literature Reviewmentioning
confidence: 99%
“…The data analysis reveals that risk plans cover data encryption in Canada to prevent data loss and educate employees about cyber security. Concerning the same, Ali et al [37] are suggestive of the implementation of the Technique for Order of Preference by Similarity to Ideal Solution (TOPSIS) and Failure Mode and Effect Analysis (FMEA) to counter the problems of database hack risks, broadcast data errors, cyber-attack, network interruptions, server failures, and virus effects. In the UK, the risk plan covers secure transmission channels, security and awareness training, data encryption in transit, Transport Layer Security, prevention of data leaks, and tracking suspicious activity.…”
Section: Discussionmentioning
confidence: 99%
“…To support this assertion, the Report on Corporate Governance for Mauritius (2004) provides real confirmation to the effect that few minority shareholders typically attend general meetings, which serve as a platform for them to take binding and enforceable actions. However, several studies have emphasised on the importance of minority shareholder activism to bring positive outcome to a firm’s financial performance (Ali et al , 2022; El-Chaarani et al , 2022). More specifically, Sharma and Sachdeva (2022) are of the opinion that the low involvement level of minority shareholders to monitor the activities of a company is behind the main reasons for scams, financial fraud and governance issues.…”
Section: Introductionmentioning
confidence: 99%