Tải bản đầy đủ (.pdf) (172 trang)

the acceptance and effectiveness of federal and state information security regulations in multi-branch community banks a phenomenological analysis conducted in central california

Bạn đang xem bản rút gọn của tài liệu. Xem và tải ngay bản đầy đủ của tài liệu tại đây (9.89 MB, 172 trang )






THE ACCEPTANCE AND EFFECTIVENESS OF FEDERAL AND STATE
INFORMATION SECURITY REGULATIONS IN MULTI-BRANCH COMMUNITY
BANKS: A PHENOMENOLOGICAL ANALYSIS CONDUCTED IN CENTRAL
CALIFORNIA

by

Charles I. McClain



JELENA VUCETIC, Ph.D, Faculty Member and Chair

STEVEN BROWN, Ph.D, Committee Member

TAPAN MUNROE, Ph.D, Committee Member



Kurt Linberg, Ph.D., Dean, School of Business and Technology



A Dissertation Presented in Partial Fulfillment
Of the Requirements for the Degree
Doctor of Philosophy



Capella University

June 2008

3307974

3307974

2008

























© Charles McClain, 2008



ABSTRACT

The effectiveness of technology and its implementation factors vis-à-vis
organizations arguably depends upon the degree to which these factors are accepted by said
organizations’ users. The most widely applied model for this behavior in information
technology theory is the Davis technology acceptance model (TAM). TAM postulated that
the acceptance of applied and environmental aspects of technology is primarily a function of
the facility (ease-of-use) and utility (usefulness) of the technology in question. This project
involved a three-phase, multi-method study of the effectiveness of the current scheme of
information security regulation in California community banks, assessing the acceptance of
such federal and state mandates by those banks and potential improvement of such regulation
to the end of enhanced information system security. The initial qualitative phase involved a
series of directed interviews which, through open coding, assessed the potential for bias of
both the researcher and participants, bank officers charged with responsibility for such
security, and found such bias effects to be minimal; the second phase, a quantitative survey
of factors which resulted from phase one by way of axial coding, was designed to test two
null hypotheses – the facility (ease-of-use) of the information security regulatory scheme is
acceptable and the utility (usefulness) of the information regulatory scheme is beneficial –
with statistical analyses of the data produced indicating that neither of these null hypotheses
could be rejected at 95% confidence levels; and, the third qualitative phase consisting of a set
of follow-up open interviews, the selectively coded results of which investigated the
participants’ views on changes which could contribute to enhanced information security

regulation, fostering better information security at their banking organizations. These
changes included greater examiner/auditor expertise; more specific remedial
recommendations by regulators and auditors; consolidation of diverse regulatory agencies;
and, greater professional input by the regulated community in the process of regulatory
procedure development. Summarily, implications of these findings and resultant
recommendations are discussed
.



DEDICATION

This dissertation is dedicated to (ISC)
2
, my professional information security
organization, whose generous research grant has enabled use of the best research tools to
conduct this study; County Bank, my employer, which has given me every
encouragement in pursuit of my doctoral program; and, finally, my loving wife, Gay
Parker, whose unstinting support and encouragement kept this work focused and on track.


ACKNOWLEDGEMENTS

With my heartfelt thanks, I acknowledge the gracious support of my mentor, Dr.
Jelena Vucetic, and my other committee members, Drs. Steven Brown and Tapan
Munroe. I’d also like to express my gratitude to Drs. Don Stengel, James Henson,
Ojoung Kwon, and Sasan Rhamatian, who provided invaluable assistance in validation
and correction of my research instrument. I also extend my complete appreciation to Mr.
Tom Hawker, Chief Executive Officer of Capital Corp. of the West, whose introduction
of this project to the banks invited to participate provided vital encouragement to the

involvement of those organizations which took part. Finally, to all the participants who
patiently and thoroughly responded to all phases of this project, my thanks for your
thoughtful contributions.

i


























(Page intentionally left blank)

ii

TABLE OF CONTENTS

ACKNOWLEDGEMENTS i
LIST OF FIGURES………………………………………… …………………………viii
LIST OF TABLES ix
LIST OF ABBREVIATIONS x
CHAPTER 1 - INTRODUCTION 1
Introduction to the Problem 1
Background of the Study 2
Statement of the Problem 2
Purpose of the Study 3
Rationale 3
Research Questions 4
Significance of the Study 5
Definition of Terms 5
Assumptions and Limitations 6
Theoretical and Conceptual Framework 7
Organization of the Remainder of the Study 10
CHAPTER 2 – LITERATURE REVIEW 11
CHAPTER 3 – METHODOLOGY 22
Research Design 22
Sample……………………………………………………………………………… 22
Instrumentation 23
Data collection 25

iii


Data management plan 25
Computer application strategy 26
Treatment (Coding System) 27
Open Coding 27
Axial Coding 28
Selective Coding 29
Data Analysis 30
Validity and Reliability 33
Generalizability 33
Bias and Validity 34
Ethical Considerations 34
CHAPTER 4 – RESULTS 36
Instrument Design 36
Instrument Validation 44
Phase I 57
Participant Solicitation Process 57
Results of Solicitation 59
PROF (0) 64
ENV (1) 65
ENV/EXP (1.1) 66
ENV/KNOW (1.2) 67
ENV/KNOW/GLB (1.2.1) 67
ENV/KNOW/SOX 67

iv

ENV/KNOW/FFIEC (1.2.3) 68
ENV/KNOW/PATRIOT 68
ENV/KNOW/FACT 69

ENV/KNOW/SB1386 (1.2.6) 70
OVER 71
OVER/RISK 71
OVER/SIZE 72
OVER/COMPLEX (2.3) 72
OVER/STAFF_EXP 73
OVER/EXAM_EXP 73
STRAT 74
STRAT/CAT 75
STRAT/REL 75
PROC 76
PROC/RISK_PROC 77
PROC/AUDIT 78
PROC/BCDRP 78
PROC/GLB_COMPL 79
Coding and Bias Analysis 80
Phase II 82
Questionnaire 89
Statistical Evaluation 92
Hypothesis Testing 100

v

Phase III 101
Bank 90 102
Bank 78 103
Bank 44 103
Bank 16 104
Bank 76 105
Bank 62 106

Evaluation and Analysis 107
CHAPTER 5 - DISCUSSION, IMPLICATIONS, RECOMMENDATIONS 114
Discussion 115
Implications 117
Recommendations 118
REFERENCES 120
APPENDIX A – INTRODUCTORY LETTER 134
APPENDIX B – PHASE I – GUIDED INTERVIEWS – CODED 136
APPENDIX C – TOPIC CROSS-TABULATED PARTICIPANT COMMENTS 137
APPENDIX D – SCORING MATRICES – WEIGHT CODING 138
Bank 90 139
Bank 78 140
Bank 44 141
Bank 16 142
Bank 76 143
Bank 62 144

vi

APPENDIX E – PHASE II SURVEY RESULTS 145
Bank 90 145
Bank 78 145
Bank 44 146
Bank 16 147
Bank 76 148
Bank 62 149
APPENDIX F – SPSS RELIABILITY COMPUTATION 150
APPENDIX G – SPSS CORRELATION COMPUTATION 151
APPENDIX H – PARTIAL LEAST SQUARES COMPUTATION 152



vii

LIST OF FIGURES

Figure 1. Conceptual Framework Flowchart……………………………….………… 9
Figure 2. Greimas signification model(1987)………………………………………….18


Figure 3. Corea-based application of Greimas’ model to Online Customer Service (CS)
(2006) .……………………………………………………………………………….…18
Figure 4 . TAM Axial Coding … …………………………………………………….29
Figure 5. Guided Interview Sample ……………………………………………………43
Figure 6. AtlasTI
®
Axial Coding Diagram …………………………….………………63
Figure 7. Scatter Plot …………………………………………………….…………….95
Figure 8. Kurtosis Chart … ………………………………………………………… 96
Figure 9. Pearson Correlation Coefficients Chart ………………………… ……… 98
Figure 10. Chin’s Partial Least Square – Correlation Coefficients and Multiple R2 100

viii

LIST OF TABLES

Table 1. Instrumentation……………………… ………………………………………23
Table 2. Data Analysis Strategy Table………………………………………………….32
Table 3. Participant Code and Characteristics …………………………………………60
Table 4. Guided Interview Coding Summary ……….……………………………… 81
Table 5. SUMI Validation

… 88
Table 6. Questionnaire Structure ……………………………………………………….89
Table 7. Questionnaire …………………………………………………………………91
Table 8. Data Compilation .…………………………………………………………… 93
Table 9. Descriptive Statistics ………………………………………………………….94
Table 10. Pearson Correlation Coefficients …………………………………………….97

ix

LIST OF ABBREVIATIONS

ASQ After Scenario Questionnaire
CAQDAS Computer Assisted Qualitative Data Analysis Software
CISA Certified Information Security Auditor
CISM Certified Information Security Manager
CISSP Certified Information Systems Security Professional
CIO Chief Information Officer
CUSI Computer User Satisfaction Inventory
FACT Fair and Accurate Credit Transactions Act
FFIEC Federal Financial Institution Examination Council
GLB/GLBA Gramm-Leach-Bliley Act
HFRG Human Factors Research Group
ISACA Information Systems Audit and Control Association
(ISC)
2
International Information Systems Security Certification
Consortium
ISSAP Information Systems Security Architecture Professional
ISO Information Security Officer
QUSI Questionnaire for User Interaction Satisfaction

USA PATRIOT Uniting and Strengthening America by Providing Appropriate
Tools Required to Intercept and Obstruct Terrorism Act
PLS Partial Least Squares
SANS SysAdmin, Audit, Network, Security Institute
SB1386 Senate Bill 1386 (California)
SOX Sarbanes-Oxley Act

x

SUMI Software Utility Maintenance Index
SUS System Usability Scale
TAM Technology Acceptance Model


xi

CHAPTER 1. INTRODUCTION
Introduction to the Problem

In the early spring of 2007, the Estonian government decided to move a World
War II commemorative statue of a Russian soldier from the central square in Tallinn, the
nation’s capital, to a Russian military cemetery on the outskirts of the city. This statue
was viewed by native Estonians as an obtrusive reminder of foreign domination of the
nation during the Soviet era. It’s removal was followed by vehement reaction from both
Russo-Estonian residents and the Russian government, leading to what the New York
Times (2007) referred to as the first “cyber-war” in history. Since re-gaining
independence with the withdrawal of Russian troops in 1994, Estonia has aggressively
pursued the Internet-based virtualization of ministerial and critical commercial services,
including central banking, to the extent that the country proudly describes its paperless
government as “E-stonia”. On April 27

th
, a series of coordinated distributed denial of
service computer attacks overloaded and took down critical government servers,
beginning with those of the President and Prime Minister, and quickly followed by
national press and television services, schools, public health ministries, and finally, the
national banking system. The attacks were continuous, spiking on May 8
th
and 9
th
,
coincidentally the days on which Europe celebrates the victory of the Allies over Nazi
Germany. Gradually, with the help of NATO security experts, critical systems were
restored through identification and inhibition of the attack sources, most of which
originated inside Russia. Servers which had normal traffic of 1,000 to 2,000 messages

1

per day, had been inundated with traffic upwards of 2,000 messages per second. While
the authoritative on-line computer security journal SearchSecurity.com reported the
attacks could not be traced to the Russian government (2007), Russian hackers were
evidently involved, associated with computers in the United States, Canada, Brazil, and
Vietnam, most of which had been surreptitiously co-opted to transmit the huge message
volume necessary for the attack.
Background of the Study
While this virtual assault discussed above has apparently been thwarted, its
broader implications are extremely troubling for global financial systems increasingly
dependent on the Internet and virtual electronic banking. In the United States, federal
government concern over this situation has led to increasing regulatory attention to the
issue of information security for the nation’s banking system. The effectiveness of such
efforts is the central theme of this study.

Statement of the Problem
The problem of information systems security regulatory compliance by federally
chartered banks is particularly critical. This characterization is justified by the extreme
importance of the financial stability of the banking industry in our capitalistic society.
The author of this study is an information security officer (ISO) for such a bank, and thus
has a unique perspective, as compliance with such regulation is his primary job
responsibility. This presents an opportunity for substantive research to be based on
professional expertise, as opposed to relatively uniformed opinion, reflected in an
extensive base of information security practice and experience reflected in the vocational
activities of the participants in this research study.

2

Purpose of the Study
The purpose of this research is to evaluate the a representative segment of the
banking industry’s perceptions regarding effectiveness of the current information security
regulatory scheme and to focus on either marginal bases for improvement of the present
approach or exploration of possible alternatives to the current scheme if a significant
threshold of dissatisfaction is revealed in the findings.
Rationale
Structurally, this study will be conducted with the intent of revealing and
investigating factors which may lead to improved bank information security, based on
affected organizational acceptance reflected in critical user perception. Beginning with
this objective, the research methodology is construed to the express purpose of limiting
bias, both of the researcher and the study’s participants, in focusing on the current
banking information security regulatory approach, defined by the Federal Financial
Institution Examination Council (FFIEC) guidelines (2006), which are predominantly
dominated by the legislative mandates of Gramm-Leach-Bliley, Sarbanes-Oxley, and
other pertinent laws and regulations, including the USA Patriot Act (2001), the FACT
Act (2003), and various State legislation, such as California’s Security Breach

Information Act (2003), commonly known as SB (Senate Bill) 1386. As discussed in the
research review, the theoretical basis of this study rests on the technology acceptance
model (TAM), originally developed by Davis (1986) and continuously validated,
augmented (TAM2) and critiqued over the past twenty years (1989; 1989; 1993; 2003;
1989; 1995; 1996; 2000; 2005; 2007a; 2007b), arguably constituting the principle
explanatory model in the field of information technology for the organizational “buy-in”

3

to the employment and environment of such technology. While TAM’s instant theoretical
premise, that the acceptance of technological initiatives and their respective
environmental aspects by their users is primarily predicated on two factors, the perceived
ease-of-use, or facility, of such technology and its environment, and its perceived
usefulness, or utility, is deceptively simple, its extensive application history provides a
rich empirical foundation for this research project, where the aforementioned theoretical
explanation of the acceptance/effectiveness of bank information security regulation,
defined as a mandatory aspect of the particular technological environment, will be
inferred from analogous measurement of the perceptions of the professional participants
of this research relative to median thresholds of utility (usefulness) and facility
(organizational ease-of-use, convenience) at which reasonable organizational “buy-in”
will be implicitly confirmed or rejected. If this threshold is met, further enquiry will
solicit informed suggestions for marginal improvements to the existing schema; or, if
rejected, rational alternatives to the present ministerial regime will be explored. In either
case, the follow-on investigation will be conducive to the intent of enhanced bank
information security. This process is reflected in the following five research questions.
Research Questions

In applying TAM and its antecedents to the general acceptance, ergo
effectiveness, of contemporary bank information security regulation, this research project
will pose the following questions:

1) What is the professionally perceived facility to contemporary bank information
security regulation?

4

2) What is the professionally perceived utility of contemporary bank information
security regulation?
3) Do the perceived facility and utility of bank information security regulation lead to an
acceptable level of security of critical banking information?
4) In what ways might the existing regulatory scheme be improved?
5) What alternatives might provide more effective bank information security?
Significance of the Study

If banking customers and the securities markets where ownership equities in
banking corporations are traded were to lack confidence in the essential integrity of
confidential banking information, the results could be catastrophic (Author note: See
extensive discussion and theoretical justification for this statement in Monks and Sykes
(2002)), as my be noted with the recent experiences of Bear Stearns and UBS Warburg.
Thus, from a historical perspective and ongoing necessity, banking is arguably, and
perhaps justifiably, the most thoroughly regulated industry in the United States. As such,
compliance with pertinent federal and state information security regulation (e.g., Section
501c of Gramm-Leach-Bliley (1999) and Section 404b of Sarbanes-Oxley (2002), and
several others) consumes very substantial human and capital resources.

Definition of Terms

Such special terms as are used in this dissertation are defined in both context
throughout the document and in the List of Abbreviations when an acronym is are
commonly used in place of the terminology.


5

Assumptions and Limitations
From an ontological perspective, this researcher is a Rawlsian, most strongly
influenced by the philosophical propositions of John Rawls (1971; 1999; 2001), who
argued that as our fundamental cultural, social, and economic predispositions are largely
the result of the accident of our births, we thus must view human behavior in terms of the
direct and indirect effect of our actions upon one another. Thus, he is primarily
motivated by a desire to analyze human nature in light of what is actually occurring at the
time of the incidents in question. In his view one of the major potential pitfalls of
qualitative research is the imposition of personal preference or bias, often in unconscious
fashion, on explanation of the causative aspects of human activities. In terms of this
analyst’s personal, or epistemological, assumptions regarding human nature, his
preferences for research orientation are thus pragmatic in nature. In the work of Creswell
(2003), we read that pragmatism reflects a view that knowledge arises out of actions,
situations, and consequences of actions, rather than their antecedents. This view has
strong roots in American thought, stemming from the work of such intellectual leaders as
Ambrose Pierce, Henry James, George Mead, and John Dewey and has been synopsized
in many works, such as that of Cherryholmes (1992). Other scholars, such as Patton
(1990) and Tashakori, and Teddlie (1998), have argued that pragmatism is the underlying
intellectual driver for mixed methods research, which will be employed in this
dissertation project, and is built on the following suppositions:
1) Pragmatism exists independently of individual views of reality or philosophy,
thus it allows mixed methods research to use the most situationally appropriate
qualitative and quantitative tools;
2) This view gives researchers great freedom of action;

6

3) Pragmatism does not have a unified world-view;

4) Truth is what works;
5) The focus of pragmatic research is consequential;
6) Pragmatic research recognizes the effects cultural, social, and economic factors
surrounding the issues of research; and,
7) Questions should focus on what’s happening rather than reinterpreting the laws of
reality and nature.
Limitations of this research include a variety of economic, geographical, and job-
related factors. First, the study is specific to a narrow range of financial institutions,
federally chartered banks, publicly traded corporations traded on national exchanges,
regulated by the FRB, as opposed to alternative federal agencies (Federal Deposit
Insurance Corporation, Comptroller of the Currency, National Credit Union Association,
etc), and of moderate economic scale (approximately $1-10 billion in deposit size). The
banks are also primarily located in the Western United States, mostly in Central
California. The study participants will all be information security professionals, whose
perceptions may markedly differ from other officers in their organizations. In
aggregation, these factors focus on specific industrial, regional, and focused perceptions
of information systems security regulation. Lessons learned are thus confined to this
unique slice of the organizational universe.
Theoretical and Conceptual Framework
The structure of this proposed research may be viewed as an integrated continuum
from research topic to research question, evaluated by a bias-limiting, mixed research
method which employs the Davis Technology Acceptance Model (1986; 1989; 1989;

7


8
2000) as a theoretical research basis to address the questions posed, as depicted in the
following flowchart:




9

Research Topic Research Question
Research Method
Objective

Improved bank InfoSec
Null Hypotheses
(H
n
)
H
n1
: Current banking InfoSec
regulation compliance is
acceptably facile.
H
n2
: Current banking InfoSec
regulation is acceptably useful in
securing IT systems.
Evaluation of
current
bank
InfoSec schema
Alternative or improved
banking information security
regulation

More Effective
Bank Information
Security
Current federal and state
banking information security
regulation
Research Model
Research Hypotheses
(H
r
)
H
r1
: (In the event of acceptance of the null
hypotheses)
What aspects of the current banking information security
regulation do you find most productive? How might the
be improved?
H
r2
: (In the event of rejection of the null hypotheses)
What alternatives to current banking information
security regulation, e.g. investment tax credits and
penalties, might be easier to comply with and more cost-
effective? Why?
Davis Technology Acceptance
Model (TAM)
Independent Variables

• Facility of current bank InfoSec

regulation
• Utility of current bank InfoSec
regulation
Dependent Variable

Success of current federal and state
regulatory scheme
Research Instrument
Kirakowski’s Software Utility
Measurement Index (SUMI)
+
(1)
Qualitative

Case studies (phenomenology) -
bank information security officers
(ISOs)
(2)
Quantitative

Develop and administer SUMI
Survey of TAM to to accept/reject
null hypothesis
Mixed Method
Accept H
nn

Reject H
nn


or
(3)
Qualitative

If null hypotheses accepted, use Delphi
method triangulation to drive 2nd
phenomenological interview of ISOs to
address research hypothesis – What’s
good about current regulation? How is
it improvable?
If null hypotheses rejected, use Delphi
method triangulation to drive 2
nd

phenomenological interview of ISOs to
address research hypotheses – potential
alternative federal and/or regulation.
Figure 1. Conceptual framework flowchart

×