Assignment - 1
Assignment - 1
• Constructive?
Y/N
• Linked to relevant assessment
criteria? Y/N
Give details:
Internal Verifier
Date
signature
Programme Leader
Date
signature (if required)
Higher Nationals - Summative Assignment Feedback Form
Student Name/ID
LO2 Conduct and analyse research relevant to a chosen computing research project
Resubmission Feedback:
Action Plan
Summative feedback
1. A Cover page or title page – You should always attach a title page to your assignment. Use previous page as
your cover sheet and be sure to fill the details correctly.
2. This entire brief should be attached in first before you start answering.
3. All the assignments should prepare using word processing software.
4. All the assignments should print in A4 sized paper, and make sure to only use one side printing.
5. Allow 1” margin on each side of the paper. But on the left side you will need to leave room for binging.
1. Use a font type that will make easy for your examiner to read. The font size should be 12 point, and should
be in the style of Time New Roman.
2. Use 1.5 line word-processing. Left justify all paragraphs.
3. Ensure that all headings are consistent in terms of size and font style.
4. Use footer function on the word processor to insert Your Name, Subject, Assignment No, and Page
Number on each page. This is useful if individual sheets become detached for any reason.
5. Use word processing application spell check and grammar check function to help edit your assignment.
Important Points:
1. Check carefully the hand in date and the instructions given with the assignment. Late submissions will not be
accepted.
2. Ensure that you give yourself enough time to complete the assignment by the due date.
3. Don’t leave things such as printing to the last minute – excuses of this nature will not be accepted for failure
to hand in the work on time.
4. You must take responsibility for managing your own time effectively.
5. If you are unable to hand in your assignment on time and have valid reasons such as illness, you may apply
(in writing) for an extension.
6. Failure to achieve at least a PASS grade will result in a REFERRAL grade being given.
7. Non-submission of work without valid reasons will lead to an automatic REFERRAL. You will then be asked to
complete an alternative assignment.
8. Take great care that if you use other people’s work or ideas in your assignment, you properly reference
them, using the HARVARD referencing system, in you text and any bibliography, otherwise you may be guilty
of plagiarism.
9. If you are caught plagiarising you could have your grade reduced to A REFERRAL or at worst you could be
excluded from the course.
Student Declaration
I hereby, declare that I know what plagiarism entails, namely to use another’s work and to present it as my own
without attributing the sources in the correct way. I further understand what it means to copy another’s work.
Unit Tutor
Issue Date
Submission Date
Submission Format:
The Learner requires to produce a detailed research project report covering following areas:
Conduct primary and secondary research using appropriate methods for a computing research project
that includes costs, access, and ethical issues.
Carry out your research and apply appropriate analytical tools/methods to analyse research findings and
data.
Draw conclusion based on the research findings gained from your primary and secondary research.
Communicate the outcomes of your research project to the appropriate identified audience.
Reflect on the success of your research project and your performance at the end of the project with the
inclusion of a project evaluation and recommendations (Consider alternative research methodologies and
lessons learnt in view of the outcomes).
Grading Rubric
Grading Criteria Achieved Feedback
By
<Name>
<Pearson ID>
<Date>
i
DECLARATION
Supervisor’s Name:
Designation:
ACKNOWLEDGMENT
iii
ABSTRACT
iv
CONTENTS
DECLARATION........................................................................................................................................i
ACKNOWLEDGMENT...........................................................................................................................ii
ABSTRACT..............................................................................................................................................iii
CONTENTS..............................................................................................................................................iv
LIST OF ABBREVIATIONS..................................................................................................................vi
A LIST OF TABLES...............................................................................................................................vii
LIST OF FIGURES................................................................................................................................viii
CHAPTER 1 – INTRODUCTION...........................................................................................................1
1.1. Introduction...............................................................................................................................1
1.2. Purpose of research...................................................................................................................1
1.3. Significance of the Research.....................................................................................................1
1.4. Research objectives....................................................................................................................1
1.5. Research Sub objectives............................................................................................................1
1.6. Research questions.....................................................................................................................1
1.7. Hypothesis..................................................................................................................................1
1.8. Thesis structure..........................................................................................................................1
CHAPTER 1 - Introduction.....................................................................................................1
CHAPTER 2 - Literature Review............................................................................................1
CHAPTER 3 - Methodology...................................................................................................1
CHAPTER 4 - Presentation of Results....................................................................................1
CHAPTER 5 - Conclusions and Recommendations................................................................1
CHAPTER 2 - LITERATURE REVIEW................................................................................................2
2.1. Literature Review......................................................................................................................2
2.2. Conceptual framework..............................................................................................................2
CHAPTER 3 - METHODOLOGY..........................................................................................................3
3.1. Research philosophy..................................................................................................................3
3.2. Research approach....................................................................................................................3
3.3. Research strategy.......................................................................................................................3
3.4. Research Choice.........................................................................................................................3
3.5. Time frame.................................................................................................................................3
3.6. Data collection procedures........................................................................................................3
3.6.1. Type of Data...............................................................................................................................3
3.6.2. Data Collection Method.............................................................................................................3
3.6.3. Data Collection and Analyze Tools...........................................................................................3
3.6.4. Questionnaire structure............................................................................................................3
v
LIST OF ABBREVIATIONS
vii
A LIST OF TABLES
viii
LIST OF FIGURES
1
Chapter 01 – Introduction
1.1 – Introduction to the company
The company that I have selected for the research purpose is Commercial Bank of Sri Lanka. In
Sri Lanka, the commercial bank is a public limited bank. It is a sector of finance. In 1920
the Commercial bank was established, marking a century and a half. K. G. D. D. Dheerasinghe
is the commercial bank's chairman. Commercial Bank's headquarters are located at No 21 Sir
Razik Fareed Mawatha, Colombo 1, and Sri Lanka. Anyone can evaluate all services and goods
at any commercial bank office. Commercial banks have 287 branches and 968 ATM locations
around the nation. Sri Lanka, Bangladesh, the Maldives, Myanmar, and Italy are among the
countries that commercial banks service. Commercial banks in Sri Lanka have created
inexorable trends, conventions, and an identity in the banking industry. While offering a range
of goods and services, they have managed to preserve our cultural character, giving us a status
as a 10 leader. With the help of cutting-edge technology and a staff of highly motivated,
dynamic, and professionals, they have risen to the top of the private banking field in Sri Lanka.
Commercial bank's 100-year track record has shown growth and success
Figure 01
2
(Commercial, 2022)
3
To treat our employees, customers, shareholders and our communities with an attitude of
service and appreciation. We will do this by:
Working as a team to help our fellow employees succeed and create a culture that thrives
on change, including remote working, managing workplace safety in a continuing
health/safety COVID-19 environment.
Enriching the communities we serve by maintaining a close relationship with our
residents and businesses; providing them with stability, banking services and a
commitment to their success including enhancing our remote access channels to
consistently provide the most up to date products and services for our customers
Growing our bank profitably to return dividends to our shareholders and stock
appreciation;
Volunteering in our communities as bank ambassadors to show that local really does
matter.
(Commercial bank)
There is currently no remote working available at Commercial Bank neither home-based work
update.
4
Any defect, errors, weaknesses or vulnerabilities present or suspected in any listing a product
that the affected supplier believes in good faith has caused, permitted or reasonably expected to
be accessed illegally information or data that must be protected under applicable law The
program's requirements are called a security hole.
Remote work has become very popular and a common practice around the world, especially
now that companies are laying off a significant portion of their workforce keep your distance
However, while this practice increases flexibility, it also improves it productivity and improve
work-life balance, there is a lack of remote control occupational safety risks?
Working remotely is convenient, but remote employees may unintentionally put your
company’s data and networks at risk. Unsecured Wi-Fi connections, unattended computers, and
data breaches are just some of the potential negative impacts a company may experience. Add
in a remote employee with low technical skills, and it’s a combination that can leave your
company vulnerable to cyber-attacks.
Remote working is convenient and has many benefits, but it also exposes both employees and
companies to a range of cyber security risks and vulnerabilities. In today’s online-first world,
its essential companies give serious consideration to remote cyber security for their remote
employees.
5
Employees can connect to their home wireless network or access their company accounts over
unsecured public Wi-Fi This way, nearby malicious actors can easily spy on your connection
and collect sensitive information For example, data sent in clear text in unencrypted form can
be intercepted and stolen by cybercriminals Because of this, employees cannot access unknown
Wi-Fi networks unless they use a VPN connection
Even if an organization uses VPNs, firewalls, and other cyber-security solutions in order to
keep safe your remote network, human error happens when employees attempt to protect their
accounts with weak passwords. Hackers use a variety of measures to crack passwords. For
instance, they will put together lists of frequently used passwords that can be used to easily
access poorly protected accounts.
While organizations may consider encrypting information stored on their network, they may
not consider encrypting data as it is sent from one location to another Company employees
share so much private information every day, from customer account information to files and
more. That the company cannot afford not to protect this information from being hijacked by a
cyber-criminal. If confidential business information is intercepted, it can lead to identity fraud,
ransom ware attacks, theft, and more
6
Phishing emails
Most malware and other hacks are delivered via phishing emails. Mail attacks and they work.
Phishing attacks often rely on true stories to exploit people's fears and emotions into opening
malicious attachments or clicking on links to fraudulent websites. Scammers are for trick
people into providing credentials or download malicious software that allows criminals to
access your computer. These emails have become so complex that it is increasingly difficult for
employees to detect them, especially if they pass through corporate email filters in your inbox.
(Soare, 2021)
7
Below are certain companies that faced security issues by work from home
Microsoft
Microsoft, a large multinational provider of information technology, provides perks like flexible
work schedules, paid time off (PTO), social groups, wellness reimbursement, matching
donations, training opportunities, and financial aid for college.
Many remote opportunities, including onboarding managers, program managers, software
engineers, and security sales specialists, are frequently open at the organization.
In a recent study conducted by Microsoft on the effects of remote work settings, respondents
listed phishing attacks, the security of end user devices, and employee training as three of their
top concerns.
Due to unreliable private Internet connections, distant workers occasionally used their mobile
devices. A Microsoft poll of IT decision-makers typically cited "'network and connectivity' and
'enabling devices for remote use' as major tech issues" that arose with the work-from-home
response.
VMware
For businesses in numerous industries, this IT company offers solutions for app modernization,
cloud computing, networking and security, and digital workspaces. Access to Stanford Federal
Credit Union, an online marketplace of perks and discounts, backup daycare, and a program that
aids parents of disabled children are just a few of VMware's perks.
According to research, cyber-attacks have increased in recent months, and many securities
experts attribute this to more employee involved at work from home because of the COVID-19
pandemic.
The primary causes of breaches, according to the specialists polled, were third-party apps,
ransom ware, out-of-date security systems, and process gaps.
Dell tech
Providing wider access to technology and hiring people with an interest in the digital world, Dell
is a multinational corporation. Through its Progress Made Real effort, Dell offers career
development programs, strongly encourages a work-life balance, and has a positive social
impact.
The firmware that a PC's microprocessor uses to start the computer system after you switch it on
is called BIOS (basic input/output system). Additionally, it controls the flow of information
between the operating system of the computer and any attached hardware, including the hard
drive, video adapter, keyboard, mouse, and printer.
8
The BIOS can be used as a gateway that can be opened by hackers in the field of illegal
technology to access data on a PC. As a result, Dell Technologies has developed a new degree of
protection to keep the BIOS door always locked in light of the overnight transition to a remote
workforce for many workers.
Dell Technologies has created Dell Safe BIOS Events & Indicators of Attack to identify threats
in order to defend against BIOS attacks.
9
light of this, businesses would be good to define BYOD rules and, to the greatest extent
practicable, enforce the distinction between personal usage and work devices.
There are certain disadvantages of many personal devices being linked to the main system. The
disadvantages include problems with security, appropriate control usage, risks to productivity
and performance, and issues with data retrieval. It becomes much more crucial to safeguard a
company network from viruses and other incursions whenever employees connect their own
devices to it.
Security issues involved in online transactions
Perhaps the most critical model in terms of security is the transaction model used by business
apps on the Internet. Data security is now a crucial concern because so much commercial
information is made available and transmitted online.
However, at this point, special attention should be paid to the particular security issues related
to the execution of payments through the Internet. In light of press reports of significant
security breaches to Internet servers, the security concerns for businesses pursuing electronic
commerce are giving rise to grave anxiety.
(Samiksha, 2021)
11
1. Why the research of security issues of remote working is important to Commercial Bank
If there is a remote working facility at Commercial bank, this research will provide solutions
and explore problematic issues generated by remote working at Commercial Bank.
Privacy violation can be identified as security issue of remote working. User privacy may be
compromised through improper management of private data, such as social security numbers or
user passwords, which is frequently unlawful. Private user data entering the software is a breach
of privacy. The information is written to a remote destination, like the network, file system, or
terminal.
Transaction violation also can be identified as a security of remote working. The most sensitive
model in terms of security is the transaction model used by business apps on the Internet. Data
security is now a crucial concern because so much commercial information is made available
and transmitted online.
Even 3rd party access can also be identified as a security issue of remote working. Data breaches
may result from remote access from third parties. Recent reports demonstrate that outdated
security measures like firewalls, virtual private networks (VPNs), and network access controls
(NACs) are insufficient to prevent threat actors trying to access the network through weak third-
party remote access.
We can learn more about remote working security difficulties by conducting this research. We
can also investigate their sources, handle them, and develop remedies to prevent them.
12
2. Why the research of security issues of remote working is important to Sri Lanka
According to Google scholar there is no research conducted in Sri Lanka regarding security
issues of remote working.
3. Why security issues of remote working are important to the world research domain
Remote working during the COVID-19 pandemic has had, and continues to have, a great impact
on the workforce. Through interviews with senior cyber security professionals, this research
explored how the traditional dynamics between employees and leadership have adapted in such
times, responding to a rapidly evolving cyber threat landscape, as well as an unpredictable period
for organizations and employees in terms of wellbeing and remote working culture. Focusing on
the transition to remote working, cyber security, the psychological contract (relationship between
employees and employers) and employee wellbeing.
Organizations have taken different approaches to security risk management. While some
employers relaxed corporate device policy and displayed increased trust in employees to ‘get the
job done’, other employers increased restrictions, occasionally to the perceived detriment of
productivity and collaboration.
Remote working has increased worry associated with insider threats. Through shadow IT
practices, inadequate remote working security controls or mitigations, and decreased visibility of
remote working environments, participants suggested that there are more opportunities for
employees to, deliberately or unwittingly, to expose organizations to risk.
Personal details
Transactions Security issues of remote working
Using personal devices
Using public and personal Wi-Fi
Research objective 01
To identify whether personal data theft is a security issue caused by remote working at
Commercial bank.
Research objective 02
To observe whether transaction theft is a security issue caused by remote working at Commercial
bank.
Research objective 03
To study whether using personal devices is a security issue caused by remote working at
Commercial bank.
Research objective 04
To identify whether using public and private Wi-Fi is a security issue caused by remote working
at Commercial bank.
14
Independent Dependent
Personal data theft
Using public and personal Wi-Fi Security issues of remote
Transaction theft working
Using personal devices
16
According to Emerald Insight, practically all firms are online connected, and the term "net
banking" has gained popularity. In developing economies like India, the idea of identity theft,
which was previously more widely known in the West, is becoming increasingly prevalent. This
paper's goal is to evaluate the current phishing attack landscape in India and to offer some
remedies that online businesses can use to combat this form of assault.
To determine the extent of the issue, a few statistics about phishing assaults across the globe are
contrasted with those for India. A few international banks' security policies are examined and
contrasted with those of their Indian counterparts. Finally, some recommendations on how to
handle the matter are given.
Identity theft has increased over the past few years, and it could become a significant issue in the
future, losing customers' trust in online banking. Most Indian banks are taking action to solve the
issue, however small and rural banks still need more work done.
Since identity theft is not just an individual's problem but also the duty of the financial institution
in question, precautions must be made to safeguard the identities and data of their online banking
customers. This essay tries to evaluate the current situation. There have been efforts made to
develop security measures that can be used by many businesses to strengthen security and
safeguard their customers' identities when using online banking.
(Geetha, 2021)
18
According to BBVA most of the cyber-attacks are related to personal data theft. We can be
mistaken in believing that no one cares about personal data. We frequently let our guard down
and fail to take the proper precautions to protect our personal details because of this
misconception.
Most of the time, information is taken with the intention of selling it on the black market, where
it is purchased by businesses with a bad reputation and used for advertising or commercial
research. However, personal data theft can also harm a person significantly in other situations.
The personal information could be important in the latter scenario if it is used to steal
one’s identity, carry out transactions in their name, or engage in fraud. What they can do with
our data is more important than the data itself.
Personal data can be obtained in a variety of ways, below are certain ways,
Dumpster diving – Discovering discarded paper documents in trash cans, CDs, USBs,
hard disks, etc.
Phishing – Email scams that impersonate well-known organizations in order to trick the
user and steal their data.
Social engineering – Whether by phone, online, through the mail or electronically, the
attacker gains the victim's trust and manipulates them to collect personal information.
Surfing – Some websites can download malware that can control a computer's webcam
or extract information from it.
Free software – This type of data theft is typical of free software.
Remember to destroy and render unreadable all documentation and materials that contain
personal data, such as bank statements, photocopies of ID cards, invoices, etc., to protect one's
personal data.
When not in use, always cover the webcam. If someone manages to take control of the computer,
personal photographs could be made public.
When someone asks for one’s personal information, be wary. Never give out particularly
sensitive information over the phone.
(Blanco, 2017)
19
According to Identity Theft Resource Center there are three types of identity theft which are
financial, criminal, and identity cloning.
The ultimate goals of identity theft may be the acquisition of money, other resources, or
privileges, or the protection of one's identity by disguising oneself as another, largely legal
entity. ID thefts may also use a company's reputation to their advantage to draw customers,
which can lead to instances of both corporate and consumer ID theft.
Identity theft can take many different forms, such as lost or stolen wallets, documents discarded
with personal information, phishing emails, etc. The most common form of reported identity
theft was Credit Card fraud, followed by phone or utilities fraud, bank fraud and employment
fraud. Only 30% of victims notified a police department. In 1999 20,000 cases of ID Theft were
reported in the UK.
In ID theft cases, the investigator will need to consider not only the financial evidence but also
the personal information gained, and subsequent actions triggered by a hijacked identity. This
evidence trail is to be recovered in the form of data, logs, etc. through various systems within
one or even multiple financial organizations.
One of the major ways of personal data theft is used by phishing. Phishing is the practice of
obtaining personal information by sending emails that look to be from reliable sources. A
phishing campaign involves the widespread dissemination of "spoofed" emails with reply
addresses, links, and branding that impersonate those from financial institutions, insurance
providers, shops, or credit card issuers. By employing corporate logos and formatting that is
comparable to those of the legitimate companies, the mails appear genuine. When personal
information, such as personal account numbers, passwords, and other sensitive information, is
requested for auditing or verification purposes, the hazard is perceivably dangerous. The UK
National Hi-tech Crime Unit detained a 21-year-old unemployed British man in April 2004 on
suspicion of engaging in a phishing attempt against The Cooperative bank and the Smile Internet
Bank. However, this man was only an amateur, and the authorities claim that he has no
connection to organized crime.
(Thomas, 2019)
20
(Gregory, 2021)
Users may be able to prevent this situation from happening periodically by always asking the
staff of the establishment if the Wi-Fi hotspot is authentic, but there is no assurance that they will
even be aware of the imposter. Even the company's employees may be accessing the infected
Wi-Fi network without being aware of it.
Because the attacker in this scenario has complete control over the hotspot, they have many more
attack options available to them, such as serving us malicious ads that contain spyware or
malware, changing the website we were on to a completely fake one, and gathering any login
information we entered for different services.
(Hougen, 2020)
23
regulations and audit trails for these businesses. This is particularly true for crucial systems that
deal with sensitive data, which are utilized by both public and private sector firms. In the past,
enterprise architects have established security policies and relied on technical safeguards to
protect their organizations' systems from cyber threats and misuse. Today, transaction theft is
one of the most critical threats to online security. In a cloud environment, artificial intelligence is
indispensable for managing financial risk. Despite numerous studies that have attempted to
examine the current methods, they are insufficient for conducting detection with high accuracy.
(Wang, 2021)
(Chadha, 2022)
25
Personal devices, as the name suggests, are those that an employee personally owns and uses to
carry out any type of job but are not registered with the company's mobile device management
system.
The greatest drawback is a lack of security. Without mobile application management, personal
devices are extremely susceptible to security risks. Every man or woman for themselves is the
stuff of nightmares when it comes to your sensitive corporate information. It might be less
expensive and easier, but it puts your safety in grave danger. Simply put, the company lacks the
means to impose or monitor security procedures.
The great majority of businesses that use remote workers ought to use company devices that are
managed through mobile device management. The level of security is far higher, devices are
simple to set up and modify, and issues can be quickly identified and resolved. For all parties
involved, it produces a more uniform, seamless experience.
(Joesph, 2021)
28
Chapter 3: Methodology
The research onion is a basic illustration that delineates the various stages an investigator must
contemplate to establish an effective research methodology. The model of the research onion
was introduced by Saunders, Lewis and Thorn hill in their publication titled Research Methods
for Commercial Scholars. This strategy endeavors to explicate the diverse phases of thesis
composition to assist scholars in formulating a more methodical procedure. The model of the
Research Onion presented here figuratively displays the diverse techniques that the research's
diverse constituents could be scrutinized to generate the ultimate research blueprint.
Figure
02
29
This study owns a conceptual framework with 4 independent variables and 1 dependent variable.
The independent variable one which is, personal data theft has an impact on the dependent
variable of security issues of remote working. A single reality is found here, which is from the
positivism approach.
A positivism approach is what can happen or not happen. According to the independent
variable, personal data theft has an impact on security issues of remote working, which is a
single reality that falls under the positivism approach.
The independent variable two which is, using public/private Wi-Fi has an impact on the
dependent variable of security issues of remote working. A single reality is found here, which is
from the positivism approach. According to the independent variable, using public or private Wi-
Fi has an impact on security issues of remote working, which is a single reality that falls under
the positivism approach.
The independent variable three which is, transaction theft has an impact on the dependent
variable of security issues of remote working. A single reality is found here, which is from the
positivism approach. According to the independent variable, transaction theft has an impact on
security issues of remote working, which is a single reality that falls under the positivism
approach.
The independent variable four which is, using personal devices has an impact on the dependent
variable of security issues of remote working. A single reality is found here, which is from the
positivism approach. According to the independent variable, using personal devices has an
impact on security issues of remote working, which is a single reality that falls under the
positivism approach.
MY The research onion has been developed by Saunders et al. 2007 to describe the stages
that a researcher must go through when developing an effective methodology, which is an
important section to consider when writing a research paper. In the beginning, the research
philosophy must be defined. This serves as the foundation for the appropriate research strategy,
which is implemented in the second step. The research strategy is chosen in the third step, and
the time horizon is determined in the fourth layer. The fifth stage is the identification of the data
collection methodology. The benefits of the research onion are that it creates a series of stages
30
through which the various methods of data collection can be understood, as well as illustrating
the steps through which a methodological study can be described.
There are two approaches which are Inductive and Deductive. Here, the deductive approach is
used to our conceptual framework because it is from theory to observations.
Testing the conceptual framework developed for security issues of remote working. Here,
observations are studied which the security issues of remote are working after developing the
conceptual framework. Therefore, it is appropriate to use deductive approach to this study.
For each independent variable and the dependent variable set of questions will be developed.
From the developed questions questionnaires will be made.
Questionnaire based survey is conducted to check the association between independent and
dependent variable.
To conduct the questionnaire, Survey is selected. In the questionnaire few questions are raised.
The questions have rating options from strongly agree to strongly disagree
(lickert scaler).
Strongly agree – 5
Agree – 4
31
Neutral – 3
Disagree – 2
Strongly disagree – 1
To enter data, we use excel software. And, to analyze data using statistical testing excel will be
used. The data analysis will be done using bar charts, pie charts, descriptive statistics, mean
standard deviation, maximum standard deviation, minimum standard deviation, correlation test
and regression test.
3.7.5 Limitations of the research
There are barriers we need to tolerate while conducting research. Certain limitations include high
cost, time being limited, electricity issues, travelling issues and respondents are from different
physiological level being a major threat.
4.1.1.1 – Presentation of data for “Is personal data issue caused by remote working a
significant security issue?”
10
0
SA A N D SD
For the question, “Is personal data issue caused by remote working a significant security issue?”
majority are strongly agree with the count of 10 and minority is strongly disagree with the count
33
of 5. The overall responses are towards the positive side as the strongly agree and agree total
count is higher than strongly disagree and disagree count.
4.1.1.2 – Presentation of data for “Is financial details issue caused by remote working a
significant security issue?”
12
10
0
SA A N D SD
For the question, “Is financial details issue caused by remote working a significant security
issue?” majority are agree with the count of 12 and minority is strongly disagree with the count
of 3. The overall responses are towards the positive side as the strongly agree and agree total
count is higher than strongly disagree and disagree count.
34
4.1.1.3 – Presentation of data for “Is medical data issue caused by remote working a
significant security issue?”
10
0
SA A N D SD
For the question, “Is medical data issue caused by remote working a significant security issue?”
majority are disagree with the count of 9 and minority is strongly disagree with the count of 4.
The overall responses are towards the negative side as the strongly agree and agree total count is
lower than strongly disagree and disagree count.
35
4.1.1.4 – Presentation of data for “Is social media account details issue caused by remote
working a significant security issue?”
10
0
SA A N D SD
For the question, “Is social media account details issue caused by remote working a significant
security issue?” majority are neutral with the count of 10 and minority is strongly disagree with
the count of 4. The overall responses are towards the negative side as the strongly agree and
agree total count is lower than strongly disagree and disagree count.
36
4.1.2.1 - Presentation of data for “Is personal accounts theft issue caused by remote
working a significant security issue?”
For the question, “Is personal accounts theft issue caused by remote working a significant
security issue?” majority are agree with the count of 9 and minority is strongly agree with the
count of . The overall responses are towards the positive side as the strongly agree and agree
total count is higher than strongly disagree and disagree count.
37
4.1.2.2 - Presentation of data for “Is company procumbent payments issue caused by
remote working a significant security issue?”
10
0
SA A N D SD
For the question, “Is procurement payment issue caused by remote working a significant security
issue?” majority are neutral with the count of 11 and minority is strongly disagree with the count
of 2. The overall responses are towards the positive side as the strongly agree and agree total
count is higher than strongly disagree and disagree count.
38
4.1.2.3 - Presentation of data for “Is employee salary payments issue caused by remote
working a significant security issue?”
10
0
SA A N D SD
For the question, “Is employee salary payment issue caused by remote working a significant
security issue?” majority are neutral with the count of 11 and minority is disagree and agree with
the count of 6. The overall responses are towards the positive side as the strongly agree and
agree total count is higher than strongly disagree and disagree count.
39
4.1.2.4 - Presentation of data for “Is investments issue caused by remote working a
significant security issue?”
10
0
SA A N D SD
For the question, “Is investments issue caused by remote working a significant security issue?”,
majority are neutral with the count of 10 and minority is strongly agree with the count of 5. The
overall responses are towards the negative side as the strongly agree and agree total count is
lower than strongly disagree and disagree count.
40
4.1.3.1 – Presentation of data for “Is theft of personal information issue caused by remote
working a significant security issue?’’
For the question, “Is theft of personal information issue caused by remote working a significant
security issue?” majority are neutral with the count of 9 and minority is strongly disagree with
the count of 5. The overall responses are towards the positive side as the strongly agree and
agree total count is higher than strongly disagree and disagree count.
41
4.1.3.2 – Presentation of data for “Is unencrypted connections issue caused by remote
working a significant security issue?’’
10
0
SA A N D SD
For the question, “Is unencrypted connections issue caused by remote working a significant
security issue?” majority are neutral with the count of 11 and minority is strongly disagree with
the count of 2. The overall responses are towards the positive side as the strongly agree and
agree total count is higher than strongly disagree and disagree count.
42
4.1.3.3 – Presentation of data for “Is cyber-attacks on businesses issue caused by remote
working a significant security issue?’’
10
0
SA A N D SD
For the question, “ Is cyber-attacks on businesses issue caused by remote working a significant
security issue?”, majority are neutral with the count of 10 and minority is strongly disagree with
the count of 3. The overall responses are towards the positive side as the strongly agree and
agree total count is higher than strongly disagree and disagree count.
43
4.1.3.3 – Presentation of data for “Is malware distribution issue caused by remote working
a significant security issue?’’
10
0
SA A N D SD
For the question, “Is malware distribution issue caused by remote working a significant security
issue?” majority are neutral with the count of 10 and minority is strongly disagree with the count
of 4. The overall responses are towards the positive side as the strongly agree and agree total
count is higher than strongly disagree and disagree count.
44
4.1.4.1 – Presentation of data for “Is data theft issue caused by remote working a
significant security issue?’’
10
0
SA A N D SD
For the question, “Is data theft issue caused by remote working a significant security issue?”
majority are strongly agree with the count of 10 and minority is strongly disagree and neutral
with the count of 4. The overall responses are towards the positive side as the strongly agree and
agree total count is higher than strongly disagree and disagree count.
45
4.1.4.2 – Presentation of data for “Is devices to be damaged issue caused by remote
working a significant security issue?’’
For the question, “Is devices to be damaged issue caused by remote working a significant
security issue?” majority are neutral with the count of 9 and minority is strongly disagree with
the count of 4. The overall responses are towards the positive side as the strongly agree and
agree total count is higher than strongly disagree and disagree count.
46
4.1.4.3 – Presentation of data for “Is malware issue caused by remote working a significant
security issue?’’
10
0
SA A N D SD
For the question, “Is malware issue caused by remote working a significant security issue?”
majority are disagree with the count of 10 and minority is strongly agree with the count of 4. The
overall responses are towards the negative side as the strongly disagree and disagree total count
is higher than strongly agree and agree count.
47
4.1.4.4 – Presentation of data for “Is improper mobile management issue caused by remote
working a significant security issue?’’
10
0
SA A N D SD
For the question, “Is improper mobile management issue caused by remote working a significant
security issue?” majority are disagree with the count of 9 and minority is strongly agree with the
count of 5. The overall responses are towards the negative side as the strongly disagree and
disagree total count is higher than strongly agree and agree count.
48
4.1.5.1 – Presentation data for “Has work from home strategy implemented at Commercial
bank caused a significant security issue”?
10
0
SA A N D SD
For the Dependent variable question, “Has work from home strategy implemented at commercial
bank caused a significant security issue?” majority are neutral with the count of 10 and minority
is disagree with the count of 5. The overall responses are towards the positive side as the
strongly agree and agree total count is higher than strongly agree and agree count.
49
Minimum 1 1 1 1
Maximum 5 5 5 5
Average 3.285714 3.342857 2.971429 2.714286
Standard
Deviation 1.446526 1.211291 1.271537 1.36277
For the question “ Is personal details issue caused by remote working a significant security
issue?” range of answers are Strongly disagree to Strongly agree. The average value is 3.2 which
is closer to 3. So, the average response in 3. Standard deviation for the question is 1.44.
For the question “ Is financial details issue caused by remote working a significant security
issue?” range of answers are Strongly disagree to Strongly agree. The average value is 3.34
which is closer to 3. So, the average response in 3. Standard deviation for the question is 1.21.
For the question “Is medical data issue caused by remote working a significant security issue?”
range of answers are strongly disagree to strongly agree. The average value is 2.9 which is closer
to 3. So, the average response in 3. Standard deviation for the question is 1.27.
50
For the question “ Is social media account details issue caused by remote working a significant
security issue?” range of answers are Strongly disagree to Strongly agree. The average value is
2.7 which is closer to 3. So, the average response in 3. Standard deviation for the question is
1.36.
Maximum 5 5 5 5
Average 3.028571 3.628571 3.342857 2.971429
Standard
Deviation 1.219588 1.474147 1.294461
1.294461
For the question “ Is personal account issue caused by remote working a significant security
issue?” range of answers are Strongly disagree to Strongly agree. The average value is 3.02
which is closer to 3. So, the average response in 3. Standard deviation for the question is 1.29.
For the question “ Is company procument payment issue caused by remote working a significant
security issue?” range of answers are Strongly disagree to Strongly agree. The average value is
3.62 which is closer to 4. So, the average response in 4. Standard deviation for the question is
1.21.
For the question “ Is employee salary payments issue caused by remote working a significant
security issue?” range of answers are Strongly disagree to Strongly agree. The average value is
51
3.34 which is closer to 3. So, the average response in 3. Standard deviation for the question is
1.47.
For the question “Is investments issue caused by remote working a significant security issue?”
range of answers are strongly disagree to strongly agree. The average value is 2.97 which is
closer to 3. So, the average response in 3. Standard deviation for the question is 1.29.
Maximum 5 5 5 5
Average 2.942857 3.285714 3.571429 3.257143
Standard
Deviation 1.152272 1.24347 1.313792
1.349136
For the question “Is theft of personal information issue caused by remote working a significant
security issue?” range of answers are strongly disagree to strongly agree. The average value is
2.9 which is closer to 3. So, the average response in 3. Standard deviation for the question is
1.34.
For the question “ Is company procument payment issue caused by remote working a significant
security issue?” range of answers are Strongly disagree to Strongly agree. The average value is
3.28 which is closer to 3. So, the average response in 3. Standard deviation for the question is
1.15.
52
For the question “ Is employee salary payments issue caused by remote working a significant
security issue?” range of answers are Strongly disagree to Strongly agree. The average value is
3.57 which is closer to 4. So, the average response in 4. Standard deviation for the question is
1.24.
For the question “Is malware distribution issue caused by remote working a significant security
issue?” range of answers are strongly disagree to strongly agree. The average value is 3.25 which
is closer to 3. So, the average response in 3. Standard deviation for the question is 1.31.
Maximum 5 5 5 5
Average 3.428571 3.314286 2.742857 2.885714
Standard 1.254906
Deviation 1.268228 1.323352
1.39928
For the question “Is data theft issue caused by remote working a significant security issue?”
range of answers are strongly disagree to strongly agree. The average value is 3.42 which is
closer to 3. So, the average response in 3. Standard deviation for the question is 1.39.
For the question “Is devices to be damaged issue caused by remote working a significant security
issue?” range of answers are strongly disagree to strongly agree. The average value is 3.31 which
is closer to 3. So, the average response in 3. Standard deviation for the question is 1.25.
53
For the question “Is malware issue caused by remote working a significant security issue?” range
of answers are strongly disagree to strongly agree. The average value is 2.74 which is closer to 3.
So, the average response in 3. Standard deviation for the question is 1.26.
For the question “ Is improper mobile management issue caused by remote working a significant
security issue?” range of answers are Strongly disagree to Strongly agree. The average value is
2.88 which is closer to 3. So, the average response in 3. Standard deviation for the question is
1.32.
4.2.5 – Descriptive Statistics for Security issues of remote working at Commercial bank
Has work from home strategy implemented at
Commercial bank caused a significant
security issue?
Minimum 1
Maximum 5
Average 3.142857
Standard Deviation 1.396274
For the question “Has work from home strategy implemented at Commercial bank caused a
significant security issue?” range of answers are strongly disagree to strongly agree. The average
value is 3.14 which is closer to 3. So, the average response in 3. Standard deviation for the
question is 1.39.
54
The correlation value between Personal data theft of remote working strategy implemented at
commercial bank caused significant security issue is 0.785672 which is greater than 0.7 and the
correlation value is High positive.
The correlation value between Transaction data theft of remote working strategy implemented at
commercial bank caused significant security issue is 0.853419 which is greater than 0.7 and the
correlation value is High positive.
55
The correlation value between using public/personal Wi-Fi of remote working strategy
implemented at commercial bank caused significant security issue is 0.928173 which is greater
than 0.7 and the correlation value is High positive.
The correlation value between Using Personal devices of remote working strategy implemented
at commercial bank caused significant security issue is 0.733181 which is greater than 0.7 and
the correlation value is High positive.
The Anova Table P value between Independent variable security issues of personal data theft
caused by remote working and work from home strategy implemented at commercial bank
caused significant security issue is 0. The P is less than 0.05 and there is a relationship among
the variables.
4.4.2 – Regression analysis between security issues of transaction theft caused by remote
working and work from home strategy implemented at commercial bank caused significant
security issue.
ANOVA
56
df SS MS F Significan
ce F
Regressi 1 24.0638 24.063 61.6594 0.000834
on 8 1 98
Residual 23 8.97620 0.3902
3 7
Total 24 33.04
The Anova Table P value between Independent variable security issues of transaction theft
caused by remote working and work from home strategy implemented at commercial bank
caused significant security issue is 0. The P is less than 0.05 and there is a relationship among
the variables.
4.4.3 – Regression analysis between security issues of using public/personal Wi-Fi caused
by remote working and work from home strategy implemented at commercial bank caused
significant security issue.
ANOVA
df SS MS F Significan
ce F
Regressi 1 28.464 28.464 143.07 0.000236
on 16 16 22 11
Residual 23 4.5758 0.1989
4 5
Total 24 33.04
The Anova Table P value between Independent variable security issues of using public/personal
Wi-Fi caused by remote working and work from home strategy implemented at commercial bank
caused significant security issue is 0. The P is less than 0.05 and there is a relationship among
the variables.
4.4.4 – Regression analysis between security issues of using personal devices caused by
remote working and work from home strategy implemented at commercial bank caused
significant security issue.
ANOVA
df SS MS F Significanc
57
eF
Regressi 1 17.760 17.760 26.73 0.0003057
on 77 77 55 99
Residual 23 15.279 0.6643
23 14
Total 24 33.04
The Anova Table P value between Independent variable security issues of using personal devices
caused by remote working and work from home strategy implemented at commercial bank
caused significant security issue is 0. The P is less than 0.05 and there is a relationship among
the variables.
commercial bank
caused significant
security issue.
Security issues of Positive yes Positive Reject H0
using Relationship
public/personal Wi-
Fi caused by remote
working and work
from home strategy
implemented at
commercial bank
caused significant
security issue.
Security issues of Positive yes Positive Reject H0
using personal Relationship
devices caused by
remote working and
work from home
strategy
implemented at
commercial bank
caused significant
security issue.
For Security issues of personal data theft caused by remote working and work from home
strategy implemented at commercial bank caused significant security issue., there exists a
positive relationship, therefore, reject H0.
For Security issues of transaction data theft caused by remote working and work from home
strategy implemented at commercial bank caused significant security issue., there exists a
positive relationship, therefore, reject H0.
For Security issues of using public/personal Wi-Fi caused by remote working and work from
home strategy implemented at commercial bank caused significant security issue., there exists a
positive relationship, therefore, reject H0.
59
For Security issues of using personal devices caused by remote working and work from home
strategy implemented at commercial bank caused significant security issue., there exists a
positive relationship, therefore, reject H0.
Chapter 5 – Conclusions
The following conclusion presents the findings of a research study conducted to explore the
security implications of remote working, particularly in the context of a commercial bank. As
remote work becomes increasingly prevalent, concerns about security vulnerabilities have come
to the forefront. This study aims to shed light on various security issues associated with remote
working and their potential impact on the implementation of a work from home strategy at a
commercial bank. The research encompasses an analysis of personal data theft, transaction theft,
the use of public/personal Wi-Fi, and the use of personal devices in remote work scenarios.
Through correlation, regression analysis, and hypothesis testing, the study seeks to uncover
patterns and relationships that inform the overall security landscape of remote work at a
commercial bank.
This study is driven by 4 objectives
To assess the perception of participants regarding the significance of security issues
related to personal data theft in the context of remote working.
To examine the perceived significance of security concerns pertaining to transaction theft
caused by remote working.
60
To explore the perception of participants regarding security risks associated with the use
of public/personal Wi-Fi in a remote work setting.
To investigate the perceived security implications of using personal devices for remote
work.
The target population for this study consists of employees in the banking sector who have
experienced or are currently engaged in remote working. A sample size of [mention the sample
size] participants was selected using a questionnaire-based survey. The questionnaire consisted
of a series of questions that gauged the participants' opinions and perceptions about various
security issues related to remote working. The participants' responses were then analyzed using
statistical techniques such as descriptive statistics, correlation analysis, and regression analysis to
derive meaningful insights
In summary, this research delves into the security implications of remote working within the
context of a commercial bank. It investigates participants' perceptions of security concerns
related to personal data theft, transaction theft, Wi-Fi usage, and the use of personal devices. The
study's methodology involves data collection through questionnaires, followed by a thorough
analysis of the responses using descriptive statistics, correlation analysis, and regression
analysis. The objectives of the study are to understand the relationships between these security
concerns and the implementation of a work from home strategy at a commercial bank. The
ensuing conclusions offer insights into the complex interplay between remote work and security
considerations in a banking environment.
5.1.1 – Conclusion for Is personal data issue caused by remote working a significant
security issue?
61
The majority of respondents strongly agree that personal data theft caused by remote working is
a significant security issue, with a count of 10. This indicates a high level of concern among
participants about the potential risks associated with personal data theft while working remotely.
5.1.2 – Conclusion for Is financial details issue caused by remote working a significant
security issue?
A significant number of respondents (12) agree that financial details issue caused by remote
working is a significant security concern. This consensus further emphasizes the importance of
addressing financial data security when implementing remote work strategies.
5.1.3 – Conclusion for Is medical data issue caused by remote working a significant security
issue?
Most respondents (9) disagree that medical data issues caused by remote working are a
significant security issue. This suggests that participants may perceive medical data as less
vulnerable compared to other types of personal information when working remotely.
5.1.4 – Conclusion for Is social media account details issue caused by remote working a
significant security issue?
The majority of respondents (10) express neutrality regarding the significance of social media
account details being compromised due to remote working. This indicates that the concern level
for social media account security during remote work is relatively balanced.
62
5.2.1 – Conclusions for Is personal accounts theft issue caused by remote working a
significant security issue?
A majority of respondents agree (9) that personal accounts theft caused by remote working is a
significant security issue. This suggests that there is a substantial concern among participants
about the potential risks associated with personal account theft during remote work.
5.2.2 – Conclusions for Is company procurement payments issue caused by remote working
a significant security issue?
63
Respondents are mostly neutral (11) regarding the significance of company procurement
payment issues caused by remote working as a security concern. This suggests that there might
be mixed opinions about the security risks associated with procurement payments during remote
work.
5.2.3 – Conclusions for Is employee salary payments issue caused by remote working a
significant security issue?
The respondents' opinions are divided, with some participants disagreeing (6) and others
agreeing (6) that employee salary payment issues caused by remote working are significant
security concerns. This indicates differing perceptions among participants about the potential
risks to employee salary payments during remote work.
5.2.4 – Conclusions for Is investments issue caused by remote working a significant security
issue?
Most respondents express neutrality (10) regarding the significance of investments issues caused
by remote working as a security concern. This suggests that participants may not view
investment data as a primary security concern in the context of remote work.
5.3.1 – Conclusions for Is theft of personal information issue caused by remote working a
significant security issue?
Respondents are predominantly neutral (9) regarding the significance of theft of personal
information caused by remote working as a security issue. This suggests that opinions are
divided on the extent to which personal information theft is considered a major security concern
during remote work.
64
5.4 – Conclusion for using personal devices issue caused by remote working a
significant security issue
There is a positive relationship between security issues related to using personal devices for
remote working and the implementation of a work from home strategy at the commercial bank.
As concerns about the security of personal devices used for remote work increase, the perception
of a significant security issue tied to the work from home strategy also increases. The hypothesis
that there is a positive relationship between these variables is supported.
5.4.1 – Conclusions for Is data theft issue caused by remote working a significant security
issue?
A majority of respondents strongly agree (10) that data theft caused by remote working is a
significant security issue. This indicates a high level of concern among participants about the
potential risks associated with data theft when using personal devices for remote work.
65
5.4.3 – Conclusions for Is malware issue caused by remote working a significant security
issue?
Respondents are mostly in disagreement (10) about the significance of malware issues caused by
remote working as a security concern. This indicates that participants do not perceive remote
working to be a significant factor in contributing to the risk of malware infections.
5.4.4 – Conclusions for Is improper mobile management issue caused by remote working a
significant security issue?
The majority of respondents disagree (9) that improper mobile management caused by remote
working is a significant security issue. This suggests that participants may not consider improper
mobile management to be a primary security concern during remote work.
A recurrent trend across multiple security concerns appears in this extensive study that examines
the security implications of remote working within the setting of a commercial bank. According
to the research, there is a link between these worries and using a work from home method. This
shows that the perception of a serious security risk connected with the work from home approach
increases as concerns about security issues, in particular personal data theft, transaction theft,
Wi-Fi usage, and the use of personal gadgets, climb due to remote working.
As the commercial banking sector continues to navigate the landscape of remote work, these
insights provide valuable guidance for decision-makers. They underscore the importance of
prioritizing robust security measures and comprehensive strategies to mitigate potential risks
associated with remote work. By recognizing the interplay between security concerns and the
implementation of remote work strategies, organizations can formulate more effective and well-
rounded approaches to safeguarding sensitive information and maintaining a secure operational
environment.
In conclusion, this study not only highlights the significance of security concerns during remote
work but also emphasizes the imperative of fostering a secure work environment that aligns with
66
the changing dynamics of the modern workplace. As organizations adapt to remote work, an
unwavering commitment to security remains pivotal to maintaining trust, protecting assets, and
ensuring the integrity of operations in an evolving digital landscape.
Chapter 6 – Recommendations
As the modern business landscape continues to evolve, the adoption of remote work strategies
has become a prominent consideration for organizations worldwide. While remote work offers
flexibility and efficiency, it also presents unique security challenges, particularly concerning
personal data theft. In light of this, the following set of recommendations has been crafted to
empower Commercial bank with effective strategies to address and mitigate the risks associated
with personal data theft during remote work.
These recommendations aim to guide Commercial bank in establishing comprehensive security
measures, fostering employee awareness and accountability, and implementing advanced
technological solutions to safeguard sensitive customer information. By proactively addressing
the intricacies of personal data theft in a remote work context, Commercial bank can uphold
their commitment to data privacy, maintain customer trust, and ensure the robustness of their
security infrastructure. Each recommendation addresses specific aspects of personal data theft
concerns and offers actionable steps to ensure a secure and resilient remote work environment.
67
enhanced security. Clear protocols for secure data sharing and collaboration should be
established, prioritizing the use of encrypted communication channels to maintain
confidentiality. Additionally, guidelines for secure printing and disposal of sensitive documents
should be communicated to prevent physical data breaches that may arise from mishandling of
printed materials.
Furthermore, adopting advanced intrusion detection and prevention systems (IDPS) can provide
real-time monitoring of network traffic, detecting and responding to any suspicious activities that
may indicate transaction data theft attempts.
Fi connections. Regular vulnerability assessments and security audits of remote devices can also
help identify potential weaknesses in network security.
References
Blanco, A. G., 2017. How can I protect myself from data theft. BBVA, 1(1), p. 3.
Geetha, V., 2021. Online personal theft - Indian perspective. Emerald Insight, 1(1), p. 2.
Geoogia Crossland, A. E., June. security issues in remote working. Remote working and in
security, 1(1), pp. 1-2.
Thomas, O., 2019. Online ID thefts, investigation and response. Angeloupoulo, 1(1), p. 3.
Tina, 2010. Internet transactions and Identity theft. Ezine Articles, 2(1), p. 3.
Wang, L., 2021. Transaction theft and security. Science Direct, 2(1), p. 4.
https://www.commercial-bank.com/about-us/our-mission-vision-and-values.html