Journal Screenshot

International Journal of Academic Research in Business and Social Sciences

Open Access Journal

ISSN: 2222-6990

Can Internal Control, Rules and Regulations and Technology Adoption influence Bank’s Protection of Customers’ Data Security?

Muhammad Haziq Al Hafiz Mat Yusof, Kamaruzzaman Muhammad, Saiful Anuar Sabarudin, Erlane K Ghani

http://dx.doi.org/10.6007/IJARBSS/v11-i9/10855

Open access

The emergence of the internet led to issues concerning privacy and data protection of the customers in the banking industry. Of consequence, the banks have initiated several strategies to protect their customers. Among the strategies adopted by the banks include implementing good internal control and rules and regulations. The banks also have adopted technology in protecting their customers. However, there is yet limited study that has examined these factors from the contexts of customers’ data protection of the banks. This study aimed to examine the factors influencing employees’ understanding of customers’ data security. Specifically, this study examined the effect of internal control, rules and regulations, and technology adoption on Malaysian banks’ protection of customers’ data security. Utilising questionnaire as the research instrument, this study obtained responses from 220 bank employees. Based on the multiple regression analysis, this study showed that internal control and technology adoption have a significant positive effect on banks’ protection of customers’ data security. However, this study could not provide evidence on the significant effect of rules and regulations on customers’ data security protection. The findings of this study highlight the importance of protecting the customers’ data security to financial institutions. They also underscore the significant impact of data theft on individuals and organisations since customers’ information or data is a precious commodity in today’s world.

Abidin, M. A. Z., Nawawi, A., Salin, P. A. S. A. P. (2019), Customer data security and theft: A Malaysian organisation’s experience, Information and Computer Security, 27(2), 81-100
Ahlan A.R. (2015). Managing it innovation: a study of information technology implementations in Malaysia. PhD Thesis, Cardiff University, UK
Amirudin, N. R., Nawawi, A., Salin, P. A. S. A. (2017). Risk management practices in tourism industry – A case study of resort management. Management and Accounting Review, 16(1), 55-74.
Chalmers, K., Hay, D., Khlif, H. (2019). Internal control in accounting research: A review. Journal of Accounting Literature, 42(1), 80-103.
Chang, E. S., Lin, C. S. (2007). Exploring organisational culture for information security management. Industrial Management & Data Systems, 107(3), 438-458.
Chuah, H. (2018). Internal audit and robotic process automation. Retrieved from KPMG: https://assets.kpmg.com/content/dam/kpmg/nl/pdf/2018/advisory/internal-audit-and-robotic-process-automation.pdf
Earley, C. E. (2015). Data analytics in auditing: Opportunities. Business Horizons, 58(5), 493-500
Eilifsen, A., Glover, S. M., Prawitt, D. F., Abbas, M. S. Z., Nazri, S. M. S.N., Salleh, K., Johari, R. J. (2017). Principles of auditing and assurance services in Malaysia. McGraw Hill Education.
Geeta, D. V. (2011). Online identity theft - an Indian perspective. Journal of Financial Crime, 18(3), 235-246
Ghani, E. K., Said, J. (2010). Digital reporting practices among Malaysian local authorities. Electronic Journal of E-Government, 8(1), 33-44
Hassan, K. H. (2012). Personal data protection in employment: New legal challenges for Malaysia. Computer Law & Security Review, 28(6), 696-703
Higgins, H. N. (2012). Learning internal controls from a fraud case at Bank of China. Issues in Accounting Education, 27 (4), 1171–1192
Ilias, A., Ghani, E. K, Baidi, N., Abdul Rahman, R. (2020). XBRL adoption: An examination on the Malaysian business reporting system (MBRS). Humanities and Social Sciences Letters, 8(2), 202-214.
Janvrin, D., Bierstaker, D. J. (2008). An examination of audit information technology use and perceived importance. Accounting Horizons, 22(1), 1-21.
Jermsittiparsert, K., Ambarita, D. E., Mihardjo, L. W. W., & Ghani, E. K. (2019), Risk return through financial ratios as determinants of stock price: A study from Asean region, Journal of Security & Sustainability Issues, 9(1), 199-210
Ji, X. D., Lu, W., Qu, W. (2017). Voluntary disclosure of internal control weakness and earnings: Evidence from China. The International Journal of Accounting, 52(1), 27-44.
Karat, J., Karat, C. M., Brodiea, C., & Feng, J. (2005). Privacy in information technology: Designing to enable privacy policy management in organisations. International Journal and Human-Computer Studies. 63 (1–2), 153–174.
Kahyaoglu, S. B., Caliyurt, K. (2018). Cyber security assurance process from the internal audit perspective. Managerial Auditing Journal, 33(4), 360-376
Lessmann, S., Baesens, B., Seow, H. V., Thomas, L. C. (2015). Benchmarking state-of-the-art classification algorithms for credit scoring: An update of research. European Journal of Operational Research, 247(1), 124-136
Ali, M., Ayop, N. F., Ghani, E. K, Hasnan, S. (2020). The effect of employees’ perception on internal control mechanisms towards employee fraud prevention. Journal of Critical Reviews, 7(18), 972-986
Ozili, P. K. (2017). Impact of digital finance on financial inclusion and stability. Borsa Istanbul Review,18(4), 329-340
Prince, C. (2017). Do consumers want to control their personal data? Empirical evidence. International Journal of Human Computer Studies, 110(1), 21-32
Raab, C., Szekely, I. (2017). Data protection authorities and information technology. Computer Law & Security Review, 33(1), 421–433
Roscoe, J. T. (1975). Fundamental research statistics for the behavioural sciences (2nd ed.) New York: Holt Rinehart & Winston.
Shi, W., Wang, R. (2012). Dynamic internal control performance over financial reporting and external financing. Journal of Contemporary Accounting & Economics, 8(2), 92-109
Spatacean, I. (2012). Addressing fraud risk by testing the effectiveness of internal control over financial reporting case of Romanian financial investment companies. Procedia Economics and Finance, 3(1), 230 – 235
Yusof, N. A., Ahmad, N. A., Mohamed, Z. (2016). A study on collection of personal data by banking industry in Malaysia. Journal of Advanced Research in Business and Management Studies, 2(1), 39–49.

In-Text Citation: (Yusof et al., 2021)
To Cite this Article: Yusof, M. H. A. H. M., Muhammad, K., Sabarudin, S. A., & Ghani, E. K. (2021). Can Internal Control, Rules and Regulations and Technology Adoption influence Bank’s Protection of Customers’ Data Security? International Journal of Academic Research in Business and Social Sciences, 11(9), 1276–1290.