WOW !! MUCH LOVE ! SO WORLD PEACE !
Fond bitcoin pour l'amélioration du site: 1memzGeKS7CB3ECNkzSn2qHwxU6NZoJ8o
  Dogecoin (tips/pourboires): DCLoo9Dd4qECqpMLurdgGnaoqbftj16Nvp


Home | Publier un mémoire | Une page au hasard

 > 

E-commerce capabilities assessment: -security of e-payment systems- case of the democratic republic of congo

( Télécharger le fichier original )
par Espérant Ngongo Mbuli
University of Walles - Master in Advanced information technology and Business Management 2013
  

Disponible en mode multipage

Bitcoin is a swarm of cyber hornets serving the goddess of wisdom, feeding on the fire of truth, exponentially growing ever smarter, faster, and stronger behind a wall of encrypted energy

September 2013

E-commerce capabilities assessment:
-Security of e-payment systems-

Case of the Democratic republic of Congo

Master Thesis

Author: Esperant NGONGO

Supervisor: Prof. Roberta Bernardi

Page | 2

Outline

E-commerce capabilities assessment: security of e-payment systems. Case of the Democratic republic of Congo

Table of Content

Abstract Preface

Acknowledgement

1. Introduction 6

1.1. Introduction 6

1.2. Motivation of the subject 6

1.3. Problem statement 7

1.4. Research questions 7

1.5. Scope and limitations 7

1.6. Methodology 8

2. Literature review 9

2.1. Overview 9

2.2. Definition of e-commerce 9

2.3. Types of e-commerce 10

2.4. M-commerce 12

2.5. E-commerce capabilities overview 12

2.6. Information system capabilities 13

2.6.1. Introduction 13

2.6.2. Information system capabilities overview 13

2.6.3. Information system capabilities in the scope of e-commerce 15

2.6.4. Information technology infrastructure for e-commerce 16

2.7. Information security capabilities for e-commerce 18

2.7.1. Introduction 18

2.7.2. Overview of the security of e-commerce 18

2.7.3. Overview of the security of e-commerce network 26

2.8. Securing e-payment systems for B2C e-commerce 28

2.8.1. Payment cards 29

2.8.2. Electronic cash 30

2.8.3. Stored-value card 31

2.8.4. E-checking 31

2.8.5. Security of mobile payment 33

2.9. Conclusion on the literature review 33

3. Research methodology 34

3.1. Introduction 34

3.2. Research design and justification 34

3.2.1. Introduction 34

3.2.2. Choice of the methodology 36

3.3. Data collection and sampling 37

3.3.1. Sampling technique 37

3.3.2. Sampling definition 38

3.3.3. Data collection method 39

Page | 3

3.4. Data analysis 40

3.4.1. Introduction 40

3.4.2. Data analysis method 41

4. Research findings 42

4.1. Response rate 42

4.2. Research findings 42

4.2.1. Working experience of respondents 42

4.2.2. Job position 43

4.2.3. E-payment services offered 44

4.2.4. Issues faced by e-payment systems 44

4.3. Specific findings for CIA security concept 45

4.3.1. Confidentiality 45

4.3.2. Integrity 46

4.3.3. Availability 48

4.4. Summary 49

5. Conclusion and recommendations 50

5.1. Introduction 50

5.2. Conclusion 50

5.2.1. E-payment system 50

5.2.2. E-payment system security 50

5.3. Recommendations 52

5.4. Areas for further studies 53

5.5. Study limitations 53

6. References / Bibliography 54

7. Appendix 57

7.1. List of abbreviations 57

7.2. List of figures 58

7.3. List of table 58

7.4. Questionnaire 69

Statement of originality

In presenting this dissertation for assessment, I declare that it is a final copy including any last revisions. I also declare that it is entirely the result of my own work other than where sources are explicitly acknowledged and referenced within the body of the text. This dissertation has not been previously submitted for any degree at this or any other institution.

Page | 4

Esperant NGONGO MBULI

Page | 5

Abstract

This research study investigates to what extend the e-payment systems are secured in order to contribute to the development of e-commerce capabilities in the Democratic Republic of Congo (DRC). This study has also assesses the existence of adequate e-commerce capabilities in terms of e-payment systems and how their security can be leveraged to really contribute to their effective use in the electronic payment transaction.

The research uses the survey method with questionnaire based on closed questions built from the checklist published by the International Standards Organization (ISO) as framework for information security assessment.

The major conclusion of this study is that some capabilities for e-commerce such as e-payment systems are available in the country but their security must be enforced and managed for the advert of e-commerce era which is yet in its inception phase.

Acknowledgement

I would like to thank the following people who provided to me significant support for the completion of my MBA program and this research, namely:

- Professor Roberta Bernardi, my supervisor, she has been a great source of advice and guidance in the development of this research and her valuable

support on reading material was highly appreciated. Thank you so much.

- My lovely wife, Tina who has been an important pillar and source of motivation through my MBA program and during this research. Thank you for your patience and lovely commitment shown.

- My children, Grace, Kelly, Joyce, Marie-Rose and Esperance Junior to whom I missed during the time I was involved in my journey to MBA and for the fun time sacrificed to the benefit of this research. This study is dedicated to you as source of motivation and inspiration for your studies as well.

- The professors at Robert Kennedy College who gave us valuable intellectual foods and reading materials for the acquisition of knowledge in Advanced Information Technology and Business Management. Thank you for your devotion.

- Above all, the Mighty GOD for the blessing given to the success of this achievement

Page | 6

Chapter 1: Introduction

I.1. Introduction

Modern electronic commerce (e-commerce) is one of the biggest commercial activities using the internet as channel of diffusion. The advance and continuing development of internet technologies in telecommunications and mobile applications has propelled the growth of E-commerce. Consequently making it much easier to do business over the internet and reach mass audiences globally and even in remote places.

E-commerce is now part of our lives and companies trading via the internet are exposed in a high speed changing environment where business opportunities changed frequently, according to the customer needs and technology innovations.

How this technology can be implemented in least developed country with poor telecommunication infrastructure, poor electronic payment systems, lack of regulation and capabilities in the subject matter?

Despite the fact that many studies focused on showing that less developed countries face a lack of telecommunication infrastructures and electronic payment systems, recent developments of mobile telephony in Africa change the way e-commerce can be perceived in this part of World because of the opportunities discovered in this emerged market.

So the question is not only about the infrastructures for e-commerce, which really exist, but in term of the existence of capabilities for e-commerce and how they can be leverage to develop the e-commerce.

I.2. Motivation of the subject

E-commerce is a new form of digital economy development where no physical boundary and face-to-face interaction are necessary to do commercial transaction.

In the Democratic republic of Congo (DRC), the fact that the growth of mobile technology and the large penetration of mobile telephony companies in the country, despite the fact that the telecommunication infrastructure in not well developed, can constitute an opportunity for the e-commerce development.

However, there is no research available to assess effectively the capabilities readiness of the country for the development of e-commerce.

The aim of this work is to assess if adequate e-commerce capabilities exist in the country and how they can be leveraged to the development of e-commerce. The focus will be given to the payment systems and their security.

I.3. Page | 7

Problem Statement

E-commerce is related to Internet technologies and electronic payment systems which are not well developed in most of the least developed countries like the Democratic republic of Congo (DRC). However, the development of the mobile telephony market offers some opportunities of getting internet access and m-commerce facilities in most of urban and suburban areas with high concentration of population.

The objective of this work is to define how e-commerce can be implemented in DRC taking into account all constraints of e-commerce capabilities.

Because the internet access in only present in urban areas, the research will focus only on companies located in such areas.

The poor penetration of the internet and the lack of electronic payment systems can be recognized as a detriment to the development of e-business in the country. Even if there is a regulation board for telecommunication and information technology, there are no rules defined for electronic commerce and electronic payment.

I.4. Research Question

Among many research questions which can be raised in the e-commerce field in the developing country like DRC, the choice for this research is to respond to the most fundamental question regarding e-commerce capabilities.

Do adequate e-commerce capabilities exist in the country and how to leverage them to the development of e-commerce? Does adequate security of payment systems exist in order to promote online payment?

I.5. Scope and limitation

This research in not intended to examine all capabilities involved in the development of e-commerce. According to the actual stage of telecommunication infrastructure development in the country, the adoption of the mobile telephony system as primary telecommunication media and the opportunity currently exploited by three major operators in mobile fund transfer system, the scope of this work will be limited to the main capabilities which are likely to be preponderant to an effective e-commerce development.

The following capabilities will be covered by the study:

1. Information and communication technology (ICT) which will include telecoms and computer infrastructure.

2. Payment systems capabilities which must be used for online transactions.

3. Security of the identified payment systems which can be used for the development of e-commerce.

Of course some aspect of regulation will be considered also as governance capabilities.

Page | 8

The study will be limited to the capital city of the country, Kinshasa, where there is a potentiality of e-commerce development according to the fact it is the first business center in the country where most of big businesses and banks have their head quarters.

Findings and recommendations will be then easily replicated to the most of urban areas of the country where minimal capabilities are available.

I.6. Methodology

There are no available statistics published in the country about e-commerce; the e-commerce is not yet in inception phase. This work will be among the first step in the research about the e-commerce development in the country.

Therefore, the objective of the research can only be achieved by collecting data from different available sources of information in areas where e-commerce capabilities are likely to be present ; academic researches, special journal in IS and web resources. The research will also use data collected from survey via interviews of organizations which will be involved in the e-commerce development, mostly banks, regulation board and Mobile operators.

Page | 9

Chapter 2: Literature review

II.1. Introduction

This chapter will discuss e-commerce terminologies involve in the good understanding of the key concepts of e-commerce like its definition, forms and organization. It'll also provide a clear understanding of capabilities which are necessary for the development of e-commerce.

There are a lot of reading resources available covering the e-commerce subject but a very few manual about e-commerce capabilities have been available for this research. Most of available information has been collected through master or doctoral thesis and form special technological journal.

II.2. Definition of e-commerce

Many authors defined e-commerce by designing a commercial activity conducted by the use of internet and/or electronic systems (Turban et al. 2008, Laudon and Laudon, 2006, Cobham, 2005).

Among the definitions chosen, Turban et al. (2008: p4) describe e-commerce as «a process of buying, selling, transferring, or exchanging products, services, and/or information via computer networks, including the Internet».

The Laudon's used the term Internet and web for the business transaction to define e-commerce (K. Laudon & J. Laudon, 2006), while a year before Graham Curtis and David Cobham (2005, p212) defined e-commerce in its broadest context as «any exchange of information or business transaction that is facilitated by the use of information and communication technologies».

In the same vision as Curtis and Cobham, Beynon-Davies (2002) separate the concept e-commerce which constitute the exchange of goods and services between businesses, individuals or groups by the use of Information and Communication technology (ICT) and I-commerce which is the use of internet technologies to enable e-commerce.

It means that the development of e-commerce couldn't be possible without the development of ICT and specially the Internet technology which is one of the key drivers for e-commerce development.

Page | 10

II.3. Types of e-commerce

It is better to know how e-commerce is classified to understand the different business models provided by this new economy.

Turban et al. 2008, K. Laudon and J. Laudon, 2006, David Cobham, 2005) classify electronic commerce by the nature or the way the participants involve in the electronic transaction. According to this point of view, three forms of e-commerce are identified:

1. Business-to-consumer e-commerce (B2C)

2. Business-to-business e-commerce (B2B)

3. Consumer-to-consumer e-commerce (C)

However, with the development of mobile and wireless technologies, the use of e-commerce, which was primarily conducted through fixed computers and networked terminals, can now be conducted wirelessly. This new development gives a new concept of e-commerce called Mobile commerce or m-commerce (Turban et al. 2008).

II.3.1. B2C e-commerce

It is an e-commerce between a company and its customers (Paul Beynon-Davies, 2002). Turban et al. (2008) and Kenneth C. Laudon and Jane P. Laudon (2006) also describe B2C e-commerce as retailing transaction of goods or services from a business to individual shoppers.

In this category of e-commerce, customers are using ICT capabilities to buy goods and/or services from businesses and making payment online without intermediary.

This kind of e-commerce is the most suitable to the less developed countries because of its ease of implementation. In fact, in this e-commerce model the infrastructure is not so sophisticated like for the B2B e-commerce which requires advanced technology for the interaction among business partners.

In this model, customer needs just internet connectivity and web browser (special program to read web page) to participate to e-commerce transactions.

Page |11

II.3.2. B2B e-commerce

As it is cleared described in the designation, B2B e-commerce involves participation of businesses or organizations in the e-commerce transaction.

Turban & al. (2008: p219) defines B2B e-commerce as «transactions between businesses conducted electronically over the internet, extranets, intranets, or private networks».

This definition shows implication of advanced technologies which are used in the B2B e-commerce to support and operate transactions among businesses.

II.3.3. C e-commerce

C e-commerce is the form of e-commerce where participants to electronic transactions are individuals, not businesses.

It is «e-commerce model in which consumers sell directly to other consumers» (Turban et al. 2008, p400).

Because consumers can't have their own infrastructure to implement a particular e-commerce infrastructure, this form of e-commerce in conducted using auctions which are implemented by specialized intermediaries.

Figure 1: form of e-commerce

Source Paul Beynon-Davies (2002, p 487)

II.4. Page | 12

Mobile Commerce (M-commerce)

The definitions of e-commerce given in previous sections stated the use of ICT to conduct commercial transaction; these technologies use fixed computer or network access terminal.

Turban et al. (2008, p431) defines Mobile commerce as «any business activity conducted via wireless telecommunications network. This includes B2C and B2B commercial transaction as well as the transfer of information and services via wireless mobile devices».

The advert of Smartphones with full keyboard capabilities and web browser application, coupled to the new standards of broadband mobile telecommunication (3G and 4G) which offer large bandwidth on handheld equipments make the technology mature to conduct business online with mobility.

II.5. E-commerce capabilities overview

Technology plays a major role in the development of the e-commerce. However, regarding the nature of the e-commerce activity, many other capabilities must be considered for the development of e-commerce.

To better understand capabilities concept in e-commerce it is good to have a clear understanding of e-commerce framework as described in the figure below.

Fig 2. E-commerce framework. Source Turban et al. (2008, p7)

Page | 13

In this framework the e-commerce is represented like a building with three main components:

- Roof: represents the e-commerce applications

- Walls: which sustain applications represent all support services for the e-commerce

- Foundation: represents the e-commerce infrastructure.

All these capabilities must be managed and governed in a best way for a successful e-commerce development.

For the context of this study, payment systems can be included in the IT capabilities for the nature of the infrastructure used for the payment systems. Their importance for e-commerce development motivates the choice of studying it as particular capability because it is a vital part of the e-commerce infrastructure.

II.6. Information system capabilities II.6.1. Introduction

This section will present definitions of capabilities and resources which are two concepts which will be used in this work regarding capabilities.

Day (1994) and Grant (1996) cited by Abhay N. Misha and Ritu Argarwal (2010) define capabilities as «firms capabilities, skills, and accumulated knowledge that enable it to repeatedly perform task that create value».

It emerges from this definition the concept of resource which includes «all assets, capabilities, organizational process, attributes, information knowledge, etc, controlled by a firm that enable the firm to conceive and implement strategies that improve its efficiency and effectiveness (Draft 1983)» (Barney 1991,p101) cited by Aurelio Raverini (2010).

II.6.2. Information system (IS) capabilities overview

Resources and capabilities in information system concept can be «termed as Information system capabilities» which are «skills, competences and abilities, upon which the value of the physical Information technology (IT) resource can be leveraged» (N.F. Doherty and M. Therry, 2009, p4).

According to Collis, D. J.(1994) cited by T. Ravichandran and C. Lertwomgsatien (2005), «capabilities are social complex routines that determine the efficiency with which firms transform inputs into outputs».

Page | 14

Figure 3. Initial structure of IT capabilities (Bharadwaj, 1999)
Source: A Raverini (2010, p87)

In his research A. Raverini (2010, p.99) gives a broadest and complete definition of IT capability in these terms: «IT capability is the capacity, diffused within the whole organization, to plan, use and manage the resources based on IT-complementarily and jointly with the other resources and capacities of the organization- in order to achieve a specific organizational objective and obtain a competitive and sustainable advantage over competitors».

Page | 15

II.6.3. Information system capabilities in the scope of e-commerce

II.6.3.1 Overview of the information system capabilities for e-commerce

According to the framework presented by Turban (Turban et al. 2008, p7), among the five (5) groups of infrastructures presented in his book, the first category called «Common business services infrastructures» includes; security, smart card/authentication, electronic payments, directories/catalogs, hardware and peripherals.

From this framework, this study will focus on the security of e-payment systems because it is the core of the electronic commerce capability which allows the concretization of the transaction.

From this choice of e-payment systems as a prime focus of this research, another implication is that it is not easy to talk about electronic payment systems that are using IT capabilities (systems, software, and human) without having a look at the way online transactions are to be secured in order to enable effective e-commerce development.

That's why this particular aspect of the IT capabilities of e-payment systems which consists on security of online payment system is the focus of this research about e-commerce capabilities readiness in DRC.

The target of this research in the bank sector will be focused on the following payment systems; online banking payment system and the local (private) and international well known bank cards provided by local commercial banks.

It must be understood that in the scope of this research, some local banks are using well known international cards such as Visa and MasterCard that are used worldwide as payment system (online and offline) and therefore providing some confidence to the user because of their brand name recognition and the existence of payment systems installed at the banks and shops.

This study will also assess the security readiness of the e-payments systems and any other online payment system proposed by local commercial banks in order to leverage them for an effective e-payment system for the development of e-commerce in RDC.

Also, as stated previously in this section, the advert of mobile network with gsm operator providing money transfer facility via mobile phone handsets, a new e-payment system is born in the country which is of big interest on e-commerce development; mobile payment which is described below.

Page | 16

II.6.3.2 Mobile payment (M-payment)

The development of mobile network opens an opportunity to mobile operators to provide money transfer and payment system facilities using available communication credit loaded into the sim card.

Mobile phone users can then, as for the stored-value card, store money as telecommunication credit in their mobile phone which can be used to pay goods and services to merchants, participating as partners of mobile operators.

In DRC, some mobile operators are working with banks to link m-payment account to real bank account.

This payment system is used to pay salaries for public administration's staff in areas without banking facilities.

Because this activity is not developed by the government; regulation is the main concern for this payment system. However, in this study, as for the other e-payment systems described in the research, security of the m-payment system will be assessed for its effective participation in e-commerce transaction.

II.6.4. Information technology infrastructure for e-commerce

E-commerce, as defined earlier in this work embedded new processes which require necessary physical IT infrastructure, managerial and organizational capabilities in order to succeed.

All definitions of e-commerce show its dependency to information system infrastructure and processes to conduct business activities online. There is an evident relationship between e-commerce capabilities and IS infrastructure (Kevin Zhu, 2004).

P. Weill and M. Broadbent (1998) cited by Kevin Zhu (2004) define IT infrastructure as a technology platform and information foundation from which enterprise applications emanate and it includes «hardware, software, networks, and data processing architecture».

E-payment systems will use IT infrastructure to enable processing of payment transactions

Figure 4: IT infrastructure component.

Source: Kenneth C. Laudon and Jane P. Laudon, 2006, p185

Page | 17

Page | 18

II.7. IT security capabilities for e-commerce II.7.1 Introduction

There are many capabilities required and needed to implement an effective e-commerce business, among which most important are:

+ Web servers hardware and software

+ Electronic commerce software

+ Electronic commerce security systems

+ Electronic commerce payment systems

II.7.2 Security of online payment systems used for e-commerce

E-commerce security is a vast subject covering:

+ Securing online transaction

+ Securing clients computers and internet access devices like PDA and smart

phone.

+ Securing communication channels between computers

+ Securing servers.

Security, in the context of e-commerce is an important attribute and one of the key

elements for its adoption, that's why server infrastructure and software used for e-

commerce need to be secured.

The security framework of the information technology which is considered in this

research is ISO 27001 framework that presents eleven (11) high-level objectives for

the security standards (Timothy P. Layton, 2007, pp77-113):

O Security policy

O Organization of information security

O Asset management

O Human resources security

O Physical and environment security

O Communications and operations management

O Access control

O Information systems acquisition, development and maintenance

O Information security incident management

O Business continuity management

O Compliance.

Page | 19

II.7.2.1 Overview of the framework for security and control of Information system

For the security of information technology, protection of information resources is defined through a set of standards for security and controls published as norm by the International Standards Organization (ISO) and the International Electro technical Commission (IEC), grouped in joint committee, under the norm ISO/IEC 17799 which is the reference code of practice about the security of information system (Kenneth C. Laudon and Jane P. Laudon, 2006 and Anthony Tarantino, 2008).

The definition of the international security management system (ISMS) standard under the reference ISO/IEC 27001:2005 (called ISO 27001) in replacement of the British standard institute code of conduct in IS security «BS 77799-2:2002» inaugurates the new era of information security management (Anthony Tarantino, 2008, p169).

ISO 27001 titled «Information technology - security techniques - information security management systems - requirements», is not a technical specification but a management system which is a first of international security standards, defined by ISO which have number series ISO 27000 (A. Tarantino, opcit, p172).

The ISO/IEC 17799:2005 (ISO 17799) later named ISO 27002, has been developed under the title «Information technology - security techniques - code of practice for information security management» as a set of guidelines for the implementation of the ISO 27001security standards.

According to ISO 27002, there are three fundamental attributes of an information asset (data representing a value for an organization); confidentiality, availability and integrity which can be impacted by risks from a wide range of threats: fraud or criminal activity, system failure, user errors, etc (A. Tarantino, 2008, p174).

For this research the concept of security of the information is the one provided by ISO 27002: «information is characterized within ISO 17799» (ISO 27002) «as the preservation of:

? Confidentiality - Ensuring that information is accessible only to those authorized to have access to it,

? Integrity - safeguarding the accuracy and completeness of information and processing methods,

? Availability-Ensuring that authorized users have access to information and

associated assets when required» (IT Governance Institute, 2006).

II.7.2.2 Security of online e-commerce transaction

The highest worry about e-commerce users is that their personal information, especially credit card number, bank account details, can be stolen when proceeding online transaction or on the server of the company running the online business.

According to Timothy P. Layton (2007, p100), ISO 27001 controls about e-commerce include fraud, insurance, confidentiality, and authorization to data access while the control related to online transaction is related to «the security and protection of data and information involved in network transactions».

II.7.2.3 Security Policy

Why security policy is important in the context of security of e-payment systems?

As described above in this research, security of Information system is defined within a framework of guidance and requirements developed by ISO/IEC under the ISO 27001/2 framework for the development of an Information Security System Management (ISMS).

Figure 5: Level of acceptable security for e-commerce
Source: Gary Schneider, 2011, p443

Page | 20

Page | 21

The most important for the security policy development is to make sure that answers can be provided to the following questions:

V' Who is accessing the site? => Authentication of the user

V' Who is allowed to connect and access to the site? => Access control V' Who is granted access to information? => Confidentiality or security V' Who is allowed to modify information? => Integrity

V' Who or what causes a specific event to occur on the system and when it happens? => Audit

These fundamental questions will be the drivers for en effective security policy implementation for an e-commerce information system.

II.7.2.4 Computer security overview

This research considers computer security in the context of all kinds of threats that an information system can face that is able to destroy abuse or corrupt the information: unauthorized access, use, modification or deletion of information.

To protect against threat, countermeasure; «physical or logical procedure that recognizes, reduces, or eliminates a threat», must be taken to ensure that the risk associated to the so called threat is mitigated. (Gary Schneider, 2011, p440).

In today's computer use, the big threat is called hackers or crackers who are able to break security of information system and gain unauthorized access to computers or servers to steal information or damage the system.

II.7.2.5 Overview of the client computer security

Client computers (laptop and desktop) or wireless devices are used to connect to the internet in order to participate to the e-commerce. These client machines or devices must be protected against threats or harmful programs contained in web sites.

In this section an overview of web sites contents which represent a threat to the client computers such as cookies, web bugs, active contents, java applets, java script, active control, and graphics or plug in, viruses and worms will be discussed.

Cookies

In the context of security, the definition that describes well cookie is provided by Turban (Turban et al., 2006, p.165) who defines a cookie as «a data file that is placed on a user's hard drive by a remote web server, frequently without disclosure or the user's consent that collects information about the user's activities at the site».

This definition states clearly that a cookie is like a spy who observes user's online activity, therefore susceptible to illegal activity on a client machine.

Page | 22

For e-commerce, web server's cookies store useful information about user activity such as shopping card information which will be required by the payment processing system.

Web bugs

Turban et al. (2006) and G. Schneider (2011) identify web bugs as «tiny graphics» which can be embedded in web pages or emails to store cookies on a user's computer in order to monitor his activity on the web.

Active content, java applets, active control

G. Schneider (2011, p446) defines active content as «program that are embedded transparently in web pages and cause action to occurs», to extend the functionality of html.

In the context of e-commerce, active content permits for example to place items in a shopping cart, calculate the total amount of the invoice and deduct the tax, add shipping cost and any other fees automatically when a user shop online.

Active content can be java applets, JavaScript, Vbscript and active controls which are used on the web site to implement automation or execution of some actions.

Activex control is to be associated to object on the web page in which programs and properties have been embedded.

Active content, java applets, active control can implement malicious instructions which can break security of the client computers.

Viruses, worms, antivirus

Virus is program that attaches itself to another program in the computer to cause damage in the host computer every time when this application program will be executed.

A worm is a «type of virus that replicates itself on the host machine» to spread out the infection. (G. Schneider, 2011).

The countermeasure against virus and worm is antivirus software installed on all computers and servers in the network.

Page | 23

Digital certificate, digital signature

Like for the epistolary communication with signed letters or documents to identify the sender by its signature, electronic communication uses digital signature in place of the personal signature.

Digital signature uses the encryption technology to ensure that only authenticated users can access to the resource.

Digital certificate or digital ID is defined by G. Schneider (2011, p455) as «an attachment to an email message or a program embedded in a web page that verifies that the sender or web site is who or what it claims to be».

Digital signature and digital certificate are used to ensure confidentiality of the transaction on the web site; they can help to ensure secured online transaction for e-commerce.

II.7.2.6 Overview of the security of the communication channel

Data packets flowing to the internet are not using the same path to reach the server. Information sent over the net can be intercepted, altered or deleted before it can reach the receiver.

E-commerce will face integrity, confidentiality and availability threat inherent to the nature of the Internet as communication channel.

Confidentiality threat

The main concern of confidentiality is to make sure that information is protected against unauthorized disclosure, while the privacy is concerned by the legal instrument and policy to ensure the protection of private information.

The theft of sensitive information or personal data such as credit card number, names, and addresses is one of the most important threats for e-commerce. Therefore, e-commerce infrastructure must address this threat with highest priority.

One of the technology solutions used to ensure data confidentiality is the encryption tools and solutions.

What is the encryption?

In this study, the definition given by G. Schneider (2011, p465) is considered: «Encryption is the coding of information by using a mathematically based program and a secret key to produce a string of characters that is unintelligible».

Encrypted information can travel around the internet to ensure that it can't be disclosed easily.

Page | 24

Integrity threats

An integrity threat appears when information or data can be object of unauthorized modification, alteration, creation or deletion.

Cyber vandalism is one of the examples of integrity violation because it destroys or modifies information on existing web sites.

Integrity prevention can be achieved by intrusion detection systems which monitor suspicious activity on the network or computer to prevent unauthorized access to information stored on the system or transmitted on the network.

Availability threats

Turban et al. (2006, p517) defines availability as «assurance that access to data, website, or other electronic commerce data service is timely, available, reliable, and restricted to authorized users».

The availability threat consists of all events which cause delay or deny access to data. The most known is the Denial-of-Service (DOS) attack which trouble normal operation of a computer or server and can conduct on abnormal slowness of the server, network or electronic systems such as Automated Teller Machine (ATM).

E-payment systems must be protected by IDS or Firewall able to stop these kinds of attacks.

Authentication, authorization and non repudiation

To conclude on the communication channels, it is clearly described in the previous sections that e-commerce relies on the confidentiality, integrity and availability (CIA) of information and the business web site (Turban et al., 2008, p. 517).

These functions depend on the authentication which is a process to «assure the real identity of an entity which can be a user computer, program, website or any Information resource (Turban et al. 2008, p 517).

Authorization is the process of ensuring that the authenticated entity has been granted rights to access resource and which operations it'll perform on it.

The non repudiation will ensure that authenticated entity cannot falsely deny action it conducts online.

For e-commerce perspective non repudiation will be the «assurance that online customers or trading partners cannot falsely deny (repudiate) their purchases or transactions». (Turban et al, 2008, p518).

Page | 25

Threats to physical security of the internet communication channels The packet-switching infrastructure permits to have many links to the internet.

In case of physical attack to one of the link; data packets will be routed to another link to the internet.

For e-commerce business the countermeasure to this threat will be to use redundant links to different Internet Service Providers (ISPs) which in their turn have many different links to internet.

Threat to Wireless network

Wireless access points (WAP) provide network connectivity to computer (mostly laptops) and other mobile devices within a short range of hundred meters to access to a shared resource, in the case of this study, the internet.

If the wireless access point is not protected, anyone can connect to the network and gain access to the resources on the network.

The security on wireless is implemented via a wireless encryption protocol (WEP) which permits to encrypt and decrypt data over wireless transmission.

Threat to server computer

There is no system which can be hundred percent secured, even if strong security policies and measures are implemented, web servers will have vulnerabilities which can be exploited to compromise them.

The confidentiality can be compromised by the web server itself if it allows automatic display of directory listings and the folder names are revealed to the web browser. (G. Schneider, 2011, p.474).

Web servers are connected to back-end storage server (database servers) where valuable information about products and customers are stored; in case of unauthorized access, that information can be disclosed.

Modern database management systems (DBMS) have security features to authenticate users. This login information can be stolen by hidden malicious programs installed by hackers in the servers.

Also, some organization will keep default DBMS credentials which are provided by the editor; this will keep a security hole to the database which can be exploiting by the hackers.

Page | 26

II.7.3. Overview of security of E-commerce network

In the previous sections, the research presents an overview of threats that e-commerce and e-payment systems are likely to face.

Because of the diversity of threats and the way the networks are attacked in today's internet era, organization or business cannot rely on a single security technology; it must use security technologies at different layers of the network.

Figure 7 below shows the three layers of the network which needs to be protected.

Figure 6: layered security

Source: Turban et al. 2008, p 532

- Router level : perimeter security to internet

- Firewall: isolation of traffic communication between the internet and the LAN - LAN switch: access security on local resources

Page | 27

II.7.3.1 Firewalls

Turban et al. (2008, p 533) defines firewall as a network resource «consisting of both hardware and software that isolates a private network from a public network».

Firewall examines all packets passing through it and allows or denies the traffic according to the rules defined by the network administrator.

Firewall can protect against many threats such as unauthorized access, viruses, spams, harmful macro, applications backdoors, etc.

In e-commerce environment, firewall is used to block all packets coming from un-trusted source or accessing to a specific resource on the LAN.

II.7.3.2 Demilitarized zone (DMZ)

Demilitarized zone is defined by Turban (Turban et al., 2008, p534) as «a network area that sits between an organization's internal network and the internet, providing physical isolation between the two networks that is controlled by rules enforced by a firewall».

In e-commerce infrastructure web server will sit in the DMZ, publicly accessible area and the database server will be installed in the internal LAN protected by another firewall. In such deployment, network has two firewalls to hardener the security.

Figure 7: DMZ deployment

Source: Turban et al.,2008, p535

Page | 28

II.7.3.3 Personal firewalls

Actually many home users have broadband connection to the internet which allows them to get permanent connection to the Internet. This permanent exposure to internet expose computer to attacks.

Personal firewall have been developed to protect desktop or laptop by monitoring traffic flowing on the LAN interface card and taking action according to the rule defined by the user.

II.7.3.4 Virtual Private Network (VPN)

G. Schneider (2011, p 86) defines a Virtual Private Network as «an extranet that uses public networks and their protocols to send sensitive data to partners, customers, suppliers, and employees using a system called IP tunneling or encapsulation».

IP tunneling creates a private communication channels on the internet in which information is encrypted to make it invisible to the other internet users which are not involved in the communication transaction.

Protocol tunneling permits to encrypt data packets and encapsulate them into packets to ensure confidentiality and integrity of data, to be transmitted over the internet.

II.7.3.5 Overview of intrusion detection systems (IDS)

The necessity of monitoring the Information system for unauthorized access permits the development of special systems and software that can monitor activity on the network and detect illegal activities.

These appliances and software are called Intrusion prevention system (IDS). II.8. Securing e-payment systems for B2C e-commerce

E-commerce needs a special payment system to enable online payment of goods and services sold online.

According to the Laudon's (Kenneth C. Laudon and Jane P. Laudon, 2006, p416), «electronic payment systems for the internet include systems for digital credit card payments, digital wallets, accumulated balance payment systems, store value payment systems, digital cash, peer-to-peer payment systems, digital checking and electronic billing presentment systems».

With the development of mobile telephony, another payment system is available and consists of paying good and service using mobile phone. This is known as m-payment system and will be developed shortly in e-commerce transaction.

Page | 29

II.8.1 Payment cards systems

Payment cards are cards with payment of financial information embedded in an electronic chip and which can be used for payment.

Three kinds of cars are currently used: (Turban et al., 2008, p551)

? Credit card ? Debit

? Charge card

Card processing overview

Card payment processing consists on authorization of the transaction and the settlement of the money.

Authorization is the phase during which verification is done to check the validity of the card and the availability of the fund to be paid for the transaction.

Settlement is the phase which consists on the transfer of money from the buyer's card bank account to the seller's account.

Payment processing is a service offered by payment processing service Provider (PSP).

Figure 8: Processing of a card transaction
Source: Gary Schneider, 2011, p.501

Page | 30

The most threat for payment card is «the fraud»; and tools have been developed to combat it (Turban et al., 2008, pp 553-554).

> Address verification system (AVS): seller compare the shipping address entered on the e-commerce portal with the address contained in file at the cardholder's bank.

> Manual review: staffs review manually suspicious transactions orders to detect fraudulent transaction. This method can be used on business with small amount of transactions.

> Fraud screens and automated decision models: Intelligent systems which use automated rules to determine if the transaction can be accepted rejected or suspended.

> Card verification number (CVN): this number is printed on the back of the credit card; the verification will ensure that the buyer has the card into his hands. This verification will not be useful in case of stolen number.

> Card association payer authentication services. This service is provided by card issuer and offers the possibility for the card holder to register with the system to ensure the protection of the card. Merchant web portal will interact with this service to validate the authenticity of the card. Mastercard offers «Mastercard securecode» and Visa the «verified by visa» to authenticate and certify their cards.

> Negative file. Customer and information about the connection such as IP address name, shipping or billing address, contact numbers, etc are stored in a file. When the transaction takes place on the web portal it is matched against the information contained in the file and flag in case of problem.

II.8.2 Electronic cash

Electronic cash (e-cash or digital cash) is «a general term that describes any value storage and exchange system created by a private (non-governmental) entity that doesn't use paper documents or coins and that can serve as a substitute for government issued physical currency» (G. Schneider, 2011, p502).

Security issue of e-cash

As for the credit card payment, privacy and security of the transaction is the most important issue for e-cash implementation in the e-commerce business.

Fraud is a big concern for e-cash; therefore security system must be in place to prevent double spending which can happen while the electronic cash is submitted twice for the same cash amount to two different merchants.

To prevent this situation, cryptographic algorithms are creating tamperproof electronic cash that can trace back the transaction to its origin.

Page | 31

The e-cash has a significant disadvantage because it doesn't provide an audit trail and can be used as money-laundering (conversion of illegal owned money to cash) system.

E-cash needs to be supported by a strong regulation to define standards with the supported secured system and banking in order to be widely accepted as an alternative to credit/debit card.

II.8.3. Stored-value card

Stored-value card looks like a credit/debit card and function like credit/debit card, however it has a currency value (amount) preloaded in the electronic chip or magnetic strip.

Same security concerns as for the credit card systems must be addressed for this e-payment system.

. II.8.4 E-checking

E-check is a valid electronic copy of the paper check which contains all information contained on the paper check; however it requires a special infrastructure to be in place.

The processing of e-check is done by an Automatic Clearing House (ACH) which has its Information system connected to the different banks.

Figure 9: E-checking processing using Authorize.net
Source: Turban et al. 2008, p 567

Page | 32

E-check security

As for the manual check, e-check security concern is the fraud. The system must make sure that the check is signed by the authorized person and the bank account has sufficient amount of money to pay the transaction.

E-check payment system security will consist mostly on:

? digital signature and validity of e-check

? authorization of the transaction

? security of the transaction

? verification of the availability of the amount

? Effective policy to drive the ACH.

II.8.5 Security of M-payment

Mobile phone with integrated sim card which load encrypted information, offers security and privacy, but for its use in the e-commerce other security concerns have to be considered.

The lack of standards and disparity of the existing systems are the main concerns for the use development of this payment system in online transaction despite the fact that identification, security and authorization of the transaction are already implemented in the m-payment systems.

To effectively use m-payment in e-commerce development, strong partnership between banks, mobile operators and businesses must be developed for the integration of their information systems to provide dynamic and secured mobile payment system (P. Candance Deans, 2005, p 84).

This integration will raise issue of security of Information systems that has been described in this work to ensure security of the online transaction.

The nature of the mobile phone which can be stolen any time or broken, the malfunction of mobile network because of technical issues will surely raise issues such as fraud, repudiation of the transaction and availability of service.

That's why, on top of all security measures which can be implemented, this emerging system needs to have law and regulation in place.

Page | 33

II.9 Conclusion on the literature review

The literature review gives a broad view and understanding of e-commerce concepts and Information technology capabilities.

Capabilities in e-commerce link together Information technology capabilities with organizational processes to respond to the highly changing nature of the e-commerce because of the dynamic changes involved in its development.

The diversity of the payment systems studied in this research and the challenge of their security is the fundamental element which will be used in this research to assess the e-commerce capabilities in the Democratic republic of Congo (DRC).

A particular attention will be given to the mobile payment systems which appear as an emerging innovation in the country with the development of the mobile networks.

The study will analyze the security of the existing e-payment systems such as credit/debit card and other online payment offered by local banks and their organizational processes to assess their readiness to the emergence of e-commerce in DRC.

Security according to the CIA concept (Confidentiality, integrity and availability) as described in the ISO 27001/2 framework and other sources cited in the section II.7.2 of this work will be the driver for the assessment which will be used in this study.

The objective of this research is to assess the status of e-commerce capabilities in DRC with a specific focus on online payment systems security in order to better understand how such capabilities can be better leveraged for an effective development of e-commerce in DRC.

Page | 34

Chapter 3: Research Methodology

III.1 Introduction

This chapter discusses the methodology used to collect information and the overall research design and justification. It also defines the sampling; population used for data collection and the questionnaire design.

The security of the payment system is the main concern which must be addressed in order to bring confidence for the user. In their books according to electronic payment systems for e-commerce the Laudon's (K. Laudon and J Laundon, 2008) and G. Shneider (2011) presented the concept of CIA (Confidentiality, integrity and availability) as a quality to which a payment system must conform. So this research will use this concept to assess security of online payment systems in DRC

The concept of the security of the information system as provided by the ISO 27001/2 standards as described in the previous chapter of this study highlights the important place taken by the CIA concept in terms of the security of the online transaction used for the e-commerce in general and particularly for e-payment systems. Of course the other elements of the security focusing on human, physical infrastructure, etc are most likely to be easy to set up and should exist in most of the bank IT infrastructure in the country.

So CIA remains a challenge because as it is well known, all other security elements regarding e-payment systems have as prime objective to ensure confidentiality, integrity and availability of the system.

III.2 Research design and justification III.2.1 Introduction

The research design or methodology describes the process and actions taken to collect responses or data and the way these responses have been analyzed to give an answer the research question.

For this research, the literature review didn't provide relevant information to the research question for this study; therefore it is difficult to use secondary data collection method.

In fact, because of the specificity of the subject and the use of component elements of a framework to assess the security of e-payment systems in the specified country, the primary data collection method is the best one for this research. Data (responses) will be collected directly from participants to the survey which will use questionnaire built from checklists.

Page | 35

E-commerce is on its inception phase in the country, therefore it is not already perceived as part of the economical live. For this reason, the research will also use interviews as to get some responses in a face-to-face interaction with stakeholders in the e-payment and e-commerce planet.

Prior to justify which methodology is better for this research, it is better to give an overview of the two methodologies used for data collection; qualitative and quantitative.

Qualitative research methodology

Jackson (2010, p 101) defines qualitative research as a research method that «focuses on phenomena that occur in natural settings, and the data are analyzed without the use of statistics.

«Qualitative research generates text which is often interpreted in a subjective way (although it is possible in certain circumstances to convert textual information to numbers)» (Gabriel J., 2012).

These two definitions indicate clearly that qualitative research is based on observation of specific field or area of research without statistical analysis in the mind.

For qualitative research data or response is collected by the mean of questionnaire or interviews.

Quantitative research methodology

It has been stated by professor G. Jacobs (2012) that «quantitative research generates measurable information that can be converted into numbers and analyzed statistically. Data is often gathered in questionnaire surveys».

In quantitative research, even though data can be collected some time using interview like for the qualitative methodology, the focus is to simplify, objectify or quantify the observation so that data collected can be easily interpreted using statistical tools.

The difference between the two methodologies is given in the table below provided by Malhotra (2004, cited by Mirza et al. (2011, p 53-54)) based on objective, sample data collection and analysis and the outcome basis.

Page | 36

Table 1: Qualitative vs quantitative research methodologies
Source: Mirza et al. (2011, p53-54)

Basis

Qualitative

Quantitative

Objective

To gain the qualitative

understanding of the underlying reasons and motivation

To quantify the data and generalize the results from the sample to the population of interest

Sample

Small number of non representative cases

Large number of representative cases

Data collection

unstructured

structured

Data analysis

Non statistical

statistical

Outcome

Developed an initial understanding

Recommend a final course of action

III.2.2 Choice of the methodology

The choice of the research methodology depends on the nature of the research area and the way data have to be collected and analyzed.

The two methodologies present some similarities, such as: (Sherril L. Jackson, 2010, p 106):

4 The researcher makes some type of inference based on data collected 4 Data is analyzed in order to draw a conclusion

4 Findings are published so that they can be reviewed by others.

However the data collection and the sampling methods are the determinant elements for this research; because of the specificity of its research question which is based on perceived values of the concept CIA (confidentiality, integrity and availability) applied to the e-payment systems in the DRC (Democratic republic of Congo).

These characteristics of the e-payment systems to be assessed are most likely to be quantified. For example confidentiality perception can be quantified by a scale of numbers; 5= confidential, 4=somehow confidential, 3=not applied, 2=unknown, 1=non confidential.

Of course for this research some interviews will be used to clarify some concepts developed in the questionnaire to avoid misunderstood or confusions in responses, however, depending on the way the questionnaire will be structured by the use of checklist, responses will be easily translated into quantified information.

Page | 37

For example to assess the availability of e-payment system, the checklist can be used to determine either or not the system is redundant, and if the redundancy consists on high availability system or not.

It appears, in the light of the two examples provided above, quantitative research method is the most appropriate for this research because the collected information or responses will be analyzed statistically to assess at which extend the e-payment systems in DRC are compliant with the CIA concept.

The structured data collection method, the statistical data analysis and the primary data collection method through surveys which will be used in this research confirm the choice of the quantitative research method approach of this study.

III.3. Data collection and sampling III.3.1 Sampling technique

It is clearly indicated in the previous section that this research will use the survey as primary data collection method; this involves the organization of participants to the survey by using sample of representative population to ensure that collected data can be generalized for a reliable conclusion.

There are two main ways to define a sampling; probability and nonprobability. Sherril L. Jackson (2010, p117-118) defines these two sampling techniques as follow.

? Probability sampling is «a sampling technique in which each member of the population has an equal likelihood of being selected to be part of the sample».

? Nonprobability sampling is «a sampling technique in which individual members of the population do not have an equal likelihood of being selected to be member of the sample».

Which sampling method to be used by this study?

According to what was defined previously about the choice of the methodology regarding the specific nature of the research question, the nonprobability sampling technique will be used.

However, there are two kinds of nonprobability; the convenience sampling and the quota sampling (Sherril L. Jackson, 2010, p119).

For this research, the quota sampling will be used because it is the one which ensures that the sample is like the population in some characteristics, but uses convenience sampling to obtain the participants» (Sherril l. Jackson, 2010, p119).

Page | 38

The research question by its nature limits the participants to the survey to: + Banking sector: where e-payment system are likely to be installed

+ Mobile operators: developing and implementing m-payment systems.

Within these two sectors, participants are chosen in the area of security (management, regulation and implantation):

+ Executive level: because the «complexity and criticality of information security and its governance demand that it be elevated to the highest organizational levels. As a critical resource, information must be treated like any other asset essential to the survival and success of the organization» (IT governance institute, 2006)

+ IT department: in charge of implementation, management and maintenance of the IS security

+ E-payment system manager/sales: dealing with customers in terms of banking services offered to customers

+ Information system auditors: ensuring that security policy are followed and ensure audit of the IS.

This structure of the sampling in this study shows that definitely, the research is using the quota sampling technique.

III.3.2 Sampling definition

The survey will be conducted to sixteen (16) commercial banks located in the capital city of the DRC (Kinshasa), the Central Bank of the DRC and the three (3) main mobile operators offering m-payment services.

Commercial banks are those implementing e-payment systems and offering e-payment services to customers while mobile operators are implementing m-payment systems and offering m-payment services. On top of these two organizations, the Central Bank is acting as the monetary authority in the country and de facto regulator of the banking system in the country and therefore in charge of defining e-payments regulation and rules.

Page | 39

For the commercial banks and the mobile operators sectors, the sample will consist of:

> 1 C-level member (CEO or COO)

> 1 IT director or IT manager, the head of the IT department

> 1 IT security officer within the IT department

> 1 e-payment or m-payment business system manager or sales manager

> 1 Information system auditor

For the central bank, as the guarantor of the financial regulation, answers will be provided by:

> 1 C-level or board member (Governor or Managing director)

> 1 Director in charge of regulation

> 1 Director in charge of operations

> 1 IT Director

> 1 IT Security officer

> 1 IS Auditor

This sampling definition ensures that all the existing commercial banks in the country will participate in the survey and therefore constitute the whole population of possible informants for this research. The size of the sample for which we are expecting respondents for this survey is 101.

III.3.3 Data Collection method

For this research, the survey is the method of the data collection.

Questionnaire uses closed-ended questions and checklists will use likert rating scale which will provide all alternatives of the response.

The likert rating scale of 5 has been used for the alternative responses in the way that 5 indicates the best option and 1 the worst option: 5=strongly agreed, 4=agree, 3=neutral, 2=disagree, 1=strongly disagree.

Surveys have been sent by email through the traditional mail system (hands delivery to the reception) with an acknowledgement of the receipt of the questionnaire.

For this reason, questions have been clearly explained to allow self-explanation to the respondent. However, for the CEO and the IT officer, some interviews have been requested to clarify particularity of questions which have sensitive perception for them.

Page | 40

III.4. Data analysis method III.4.1 Introduction

Data collected through the survey have to be organized in such way to be used by descriptive statistics tools because the research method used is quantitative.

The first step consists of grouping data into tables; therefore for this research the frequency distribution is the best method for the organization of data collected.

The research question focuses on characteristics of e-payment systems which are meaningful for its security. This limitation influences the way collected data will be used to assess the security of e-payment systems.

In the literature review chapter, the research presented elements that are likely to be considered in order to determine if the information system on which e-payment system is built is compliant to the CIA concept of this research.

Therefore, knowing the number of organizations involved in the survey, the better way to represent the existence of specific element is the frequency distribution. For example, the analysis will provide such information like how many banks have firewall protecting their e-payment systems. This information will be better represented in a frequency distribution.

The frequency distribution tables for some elements of the survey will also be represented graphically using bars. Bar graphs will be used instead of histogram because for this research responses collected through the survey are «qualitative variable» which mean «categorical variable for which each value represents a discrete category» (Sherril L. Jackson, 2010, p218).

Page | 41

3.4.2 Data analysis technique

The descriptive statistics measures are most suitable to analyze data for this research. Prior to mention which analysis technique is used for this research, an overview of the three (3) main measures of central tendency; mean, median and mode, is given in the table below.

Table 2: Types of central tendency measures
Source: Sherril L. Jackson (2010, p225)

 

Mean

Median

Mode

Definition

The arithmetic average

The middle score in a distribution of scores organized from highest to lowest or lowest to highest

The score occurring with greatest frequency

Use with

Interval and ration data

Ordinal, interval, and ratio data

Nominal, ordinal, interval or ratio

Cautions

Not for use with distribution with a few extreme score

 

Not q reliable measure of central tendency

For this research, data collected use the likert rating scale with values ranging from 1 to 5; 5 being the best choice.

According to this rating, this research will use the mode as data analysis technique because it is the appropriate method to assess the CIA capability of the e-payment system by indicating the score occurring with the highest frequency.

For example, if the survey returns that among sixteen (16) banks 10 of them has a firewall in place, this information is more relevant than the mean or the median.

However, to some extend, the mean can be used to define the average of some capabilities according to the data collected and the element which is assessed.

For example, to assess the existence of data backup capability globally is the sample, it can be easier to say that this capability exists on an average of 65%. This calculation uses the mean as data analysis technique to assess the overall capability.

While the mode will be used to assess individual capability, conclusion in the context of assessment of all the e-payments systems studied will use the mean to state the average of organizations having such capability implemented.

Page | 42

Chapter 4: Research findings

IV.1 Response rate

According to the sampling described in the previous chapter, a questionnaire has been sent to sixteen (16) commercial banks and the three (3) major mobile operators for five respondents per institution. This sampling gave a number of ninety five (95) respondents. On top of this number, six respondents were expected from the Central bank as regulator body of the banking activity in the country.

From this sampling, only four (4) banks and two (2) mobile operators responded to the questionnaire. From the banking sector, all expected respondents filled the questionnaire while from the mobile operators, only one CEO responded. This gives a total of twenty nine (29) respondents out of one hundred and one (101), giving a response rate of 29 divided by 101, representing 28.71% of response rate.

IV.2 Research findings

IV.2.1 Working experience of respondents

The number of years of experience of the respondents is key information on the quality of the knowledge respondents possess in the subject matter.

The table below summarizes the working experience of the respondents

Table 3: repartition of respondents per working year

Year of experience

Number of respondent

percentage

<= 1

3

10.34%

1 - 5

5

17.24%

6 - 10

11

37.93%

>10

10

34.49%

Total

29

100%

From this table, more than 72% of respondents have more than 5 years of experience in the banking or e-payment sector and might have valuable information in the use of electronic payment systems.

Page | 43

IV.2.2 Job position of respondents

The repartition of respondents according to their position in the organization is given in the table below.

Table 4: Respondents by position in the company

Position

Number of respondent

percentage

CEO / Managing Director

5

17.24%

IT Director or IT Manager

6

20.69%

Information security Officer

6

20.69%

E-payment business manager

6

20.69%

Information system auditor

6

20.69%

Total

29

100%

The study results show that 41.38% of respondents occupy the post within the IT department or Direction, 20.69% are business managers of e-payment systems and 20.69% represent the IT auditor respondents. This implies that respondents for this study have necessary technical and business expertise in the e-payment system.

IV.2.3 E-payment services

The study reveals the e-payment methods in the table below.

Table 5: E-payment methods

services

Number of institutions

percentage

Visa

4

36.37%

Master Card

3

27.27%

Electronic cash (M-payment)

2

18.18%

Local debit card

2

18.18%

Total

 

100%

Page | 44

According to the table above, the most provided e-payment system is Visa with 36% and MasterCard with 27% followed by M-payment and the local debit card.

This result indicates that most of the banks use Visa or MasterCard, both representing more than 63% of e-payment methods.

IV.2.3 Issues faced by e-payment systems

The table below indicates the main issues observed in the different institutions assessed.

Table 6: List of issues faced by e-payment systems

Issues

Number of institutions

percentage

Fraud

4

18.18%

Theft

6

27.27%

Unavailability

6

27.27%

Disclosure of information

4

18.18%

Falsification

2

9.10%

Total

 

100%

The study reveals that all six institutions have faced issues of theft of cards or mobile phones, and the unavailability of the e-payment systems. These two main issues represent more than 54% of issues observed, whereas the disclosure of confidential information represents 18% of total responses and the falsification of the information is observed mostly on m-payment system (9%).

Page | 45

IV.3 Specific findings regarding the Confidentiality, Integrity, Availability (CIA) IV.3.1 Confidentiality

The confidentiality of the e-payment system is guaranteed by the existence of the firewall and the encryption system in the network infrastructure. The table below shows the results of the availability of these two elements in the assessed organizations.

Table 7: Confidentiality elements

Element

Number of company

Firewall

6

Encryption

3

The study results show that 100% of the responding institutions have a firewall installed in their IT infrastructure and 50% have an encryption system deployed.

However, the integrity check of the firewall is an important element to assess the real value of the firewall in the LAN infrastructure.

The table below shows the result of the integrity of the e-payment systems reviewed. According to the likert scale used for the questionnaire, the occurrence table of the integrity check of the firewall configuration is provided per institution.

Table 8: Integrity check of the firewall configuration

Institution

Score

Bank 1

4

Bank 2

3

Bank 3

2

Bank 4

3

Mobile operator 1

2

Mobile operator 2

2

Page | 46

From the table above, the extracted table below shows how often the configuration of the firewall is checked for integrity.

Table 9: Integrity check of the firewall configuration

Response / Score

Frequency

Percentage

Not sure / 2

3

50%

Monthly / 3

2

33.33%

Weekly / 4

1

16.67%

 

6

100%

This result shows that the most observed value is the score 2 (Not sure) which is the mode of this frequency distribution. This means that 50% of the observed institutions do not have an integrity check of the firewall configuration in place increasing the vulnerability of the system. 33.33% have a monthly check while only 16.67% have a weekly check.

So the integrity of the configuration of the firewall can be compromised and it'll take at least a week to discover the exploit.

IV.3.2 Integrity

The integrity has to be assessed through the existence of digital certificate system, authentication and authorization for data access, and the protection against the virus.

Table 10: System integrity result

Capability

Number of institution

Digital certificate

1

Authentication

6

Authorization

6

Antivirus

6

 
 

The study result shows that the majority of assessed institutions don't have a digital certificate system in place; only one of them has a certificate server deployed.

Page | 47

The assessment of the integrity through the reporting of the unauthorized attempts to sensitive data and physical access control to computers hosting sensitive data is given in the table below.

Table 11: Reporting of unauthorized attempts to sensitive data

Institution

Score

Bank 1

5

Bank 2

5

Bank 3

5

Bank 4

5

Mobile operator 1

2

Mobile operator 2

5

This table shows that the majority of the assessed companies have a reporting system in place for unauthorized attempts to access sensitive data.

However, the physical access control of the system holding sensitive data is an important element to guarantee integrity of data.

Table 12: Additional physical access control

Institution

Score

Bank 1

2

Bank 2

2

Bank 3

1

Bank 4

1

Mobile operator 1

2

Mobile operator 2

1

The frequency distribution table of the additional physical access control to system holding sensitive data is given in the table 13 below.

Table 13: Frequency distribution of additional physical access control

Score

Frequency

Percentage

No / 1

3

50%

Not sure / 2

3

50%

 

6

100%

The table above shows that 100% of the assessed institutions don't have a strict physical access control mechanism on top of logical access controls for computers storing sensitive data. Even though unauthorized attempts to sensitive data are reported, strong physical access control mechanisms to computers systems holding sensitive data missed.

IV.3.3 Availability

Regarding the availability of e-payment system the study has to provide input about key concepts which are likely to facilitate a system recovery such as existence of uninterrupted power system, a formal contingency or business resumption plan, and a backup facility for data and programs.

Table 14: Availability capabilities

Capability

Number of institutions

Uninterrupted power source

6

Data backup

6

Contingency plan

2

From the table above, all the responding institutions have backup facilities for both data and power source in place. However the availability of the system is sustained by a contingency or business resumption plan, which is under development. This plan is available in only of the two institutions contacted.

Page | 48

Page | 49

IV.4 Summary

This chapter presents a synthetic view of the status of the security of the e-payment system in the country according to the CIA concepts which are most important in the broadest view of the security of the information system.

Table 15: Summary of the security capability

Description of capability

Status

Firewall

Available

Digital certificate

Not available

Antivirus protection

Available

Authentication

Available

Authorization

Available

Data backup

Available

Contingency Plan

Not available

Page | 50

Chapter 5: Conclusions and recommendations

V.1 Introduction

The previous chapter illustrated the status of the security of the e-payment system through the results of the questionnaire collected in the six institutions from which responses have been received.

This chapter discusses the conclusion and recommendations for the effectiveness of the readiness of the banking system to really contribute to the development of the e-commerce in the country by improving the security of the e-payment system.

It will also make some recommendations to the use of this research and the future researches on similar topics.

V.2 Conclusions

V.2.1 E-payment system

The two major players of the market are Visa and MasterCard. Together, these two players represent more than 63% of e-payment methods used in the country.

Because the security of these e-payment systems is not fully handled by the IT infrastructure of the local banks, these two payment systems provide a guaranty that e-commerce can be developed in the country using these two e-payment channels. However, because this facility is linked to bank account held by the local bank, the security of the IT infrastructure of local banks become an imperative condition to the use of these two e-payment systems.

V.2.2 E-payment system security

The summary given in the section 4.4 of the previous chapter is the map representing the way of improvements in order to guaranty the security of the e-payment system for an effective development of e-commerce.

V.2.2.1 Firewall

All the institutions have a firewall in their IT infrastructure, however, it has been reported by this study that the integrity check of the configuration of the firewall in not conducted on a daily basis. According to this finding, the main security concern is to maintain the integrity of the configuration of the firewall. The cost of the illegal access can be very high because of the long delay of the check of the integrity of the configuration of the firewall.

Page | 51

V.2.2.2 Digital Certificate

The study result reports that only one (1) among six (6) assessed institutions has a certificate server installed. This means that in most of these banks, electronic transactions are not signed. This implies high risk of data falsification and transaction repudiation because the integrity of data can't be guaranteed.

Commercial banks in DRC must implement digital certificate infrastructure to ensure electronic transactions to be signed digitally to enforce their integrity.

V.2.2.3 Antivirus

All the assessed IT systems have antivirus software installed and managed to clean and fix all virus infection.

V.2.2.4 Authentication and Authorization

The study result reveals existence of authentication and authorization facilities in all the assessed companies. However the physical access control to the computers systems hosting very sensitive data need to be addressed.

V.2.2.5 Contingency plan

E-payment systems, by their nature, must be accessible and available any time. Their availability is one of the sine qua non conditions for an effective use in e-commerce transaction.

Despite the fact that backup facilities exist for data and power source, there is no written plan for business continuity. So in case of failure, the e-payment systems can't be recovered in acceptable delay.

To illustrate this argument, during our research, one of the mobile company assessed experienced a fire incident at one of its data center and the m-payment system was affected during a period of five (5) days.

The availability of the e-payment system requires commercial banks and mobile operators offering m-payment services to implement contingency plan to improve the system recovery.

To answer to the main research question, from the conclusions given above, it appears that the security of e-payment systems, according the CIA concept used for this study, is yet to be implemented. However, the two main fields of improvement are the integrity which is to be enforced by the implementation of certificate servers and the availability which must be sustained by a development of business contingency plans to guarantee a quick recovery of the system in case of failure.

Page | 52

V.3. Recommendations

The main objective of this research was to investigate the security of e-payment systems in the Democratic republic of Congo (DRC) to assess their readiness for an effective development of e-commerce.

The security concept of the information system being wide, the study focused on three major concepts; confidentiality, integrity and availability.

In order to contribute really on the development of e-commerce, commercial banks are recommended the following points:

1. The top management has to make sure that security plan is developed in the bank regarding the e-payment system mostly to ensure that e-payment system guarantee confidentiality, integrity of electronic transactions, and availability of the e-payment system to allow its effective use in e-commerce transaction.

2. The top management has to integrate the security of the information system among the priority of their future IT infrastructure.

3. The e-commerce development will bring new business opportunity for the banks and e-payment system is one of the strategic components to ensure a competitive advantage in the sector. Therefore, plan must be developed to anticipate the growth of this business in short term. Therefore, improvement of security of e-payment system must be addressed as a priority action.

4. E-payment systems must be developed with the aim to reduce and fight against the main issues faced by the e-payment systems reported in this study such as fraud, theft, unavailability and disclosure of sensitive information.

V.4. Page | 53

Areas for further research

There are still many areas to cover in the field of the security of the e-payment systems which can interest researchers such as identity management, development of security policies and procedures, regulation of the electronic transactions.

However, this study illustrated some other capabilities to develop for an effective e-commerce development in the country. Among these capabilities, support services for e-commerce such as order fulfillment, logistics, and the development of the security systems are other areas of interest for further studies.

This study has a merit of being among the first in the country because the e-commerce development is yet in its inception phase. It will be therefore subject to criticism for improvements to ensure that existing e-payment systems be leveraged for an effective development of e-commerce in the country.

V.5. Study limitations

The conclusion and recommendations of this study are to be considered within the specific limitations and conditions under which the research has been conducted such as sample of informants, data collection method and the data analysis.

The seizing of the sample took into account only commercial banks and mobile operator companies offering e-payment services in Kinshasa, capital city of the DRC. The low response rate for this research is to be considered also among the limitations from the conclusion drowned for this study.

The responses received are related to the data collection method used and the kind of questions used for the assessment. This study used closed-end questions built from the check list provided by ISO 27001 frameworks. Not all the check lists have been used for this research but only few of them considered as more relevant for the CIA security concept used in this study.

The study uses the quantitative analysis method based on the likert scale data collected through the questionnaire. According to the research question, the research uses two mains statistical analysis tools such as means and mode to assess the security capabilities observed. The limitations of this method with such kind of assessment based on checklist are that correlation or regression analysis can't be done because conclusions are directly linked to scores corresponding to likert scales.

Page | 54

6: References and bibliography

Abhay N. Mishra and Ritu Agarwal (2010). Technological Frames organizational capabilities, and IT use: An empirical investigation of electronic procurement. Information System Research, Vol 21 No 2, pp 249-270

Anthony Tarantino (2008). Governance, risk, and Compliance Handbook: Technology, Finance, environmental and international guidance and best practices. Wiley & sons, New Jersey (USA)

Aurelio Raverini (2010). «Information technology capability within small-medium enterprises». PhD Thesis. School of Computer and security science of computing, health and science. Edith Cowan University, Petth, Australia

Candance Deans P. (2005). E-commerce and M-commerce Technologies. IRM Press. Hershey (USA)

Collis, D.J., Beath, C.M.; and Goodhue, D. (1996). Develop long-term competitiveness through IT assets. Sloam management review, 38, 1 pp 31-45

Collis, D.J. (1994) research Note: How valuable are organizational capabilities? Strategic management Journal, 15, 8 pp 143-152

Council of Europe (2011). Summary of the main messages and outcomes of the conference prepared by the Council of Europe Secretariat. «Our internet - our rights, our freedoms». Toward the Council of Europe Strategy on Internet governance 20122015 [Online]. Available from http://www.coe.int/informationsociety/conf2011/viennaconferencesummaryen.pdf [Accessed 12/06/2013]

David A. Montagne (2010). Essentials of Online payment security and fraud prevention In: Essentials series. 1st Edition. Wiley & Sons, New Jersey (USA)

Donald O'Mahony and Michael A. Pierce (2001). Electronic payment systems for e-commerce, Artech House Print on demand, 2 Sub editions. ISBN-10 1580532686 (UK)

Efraim Turban and D. King (2011). Electronic Commerce 2012: A managerial and social network perspectives, 7th Edition. Pearson-Prentice Hall:USA

Prof Gabriel Jacobs (2012). A brief outline of research expectations and processes. Robert Kennedy College, Unpublished.

Page | 55

Ganesh D, Bahatt and Varun Grover (2005). Type of information technology capabilities and their role in competitive advantage: An empiric study. Journal of Management Information systems Vol 22, No 2, pp 253-277

Gary P. Schneider (2011). Electronic Commerce, 9th edition. Cengage Learning, Boston

Graham Curtis and David Cobham (2005). Business Information Systems. Analysis, Design an Practice. Fifth Edition. Prentice Hall (Financial Time), Harlow (UK)

IT Governance Institute (2003). Board Briefing on IT Governance. 2nd edition. It Governance Institute. Rolling Meadows, IL USA.

IT Governance Institute (2006). Information security governance: Guidance for Boards of Directors and Executive Management. 2nd edition. It Governance Institute. Rolling Meadows, IL USA.

Jeffrey A. Ogden, Paul Benjamin Lowry, Kenneth J. Petersen, and Phillip L. Carter (2008). «Explaining the Key Elements of Information Systems-Based Supply-Chain Strategy That Are Necessary for Business-to-Business Electronic Marketplace Survival,» Supply Chain Forum: An International Journal, vol. 9(1), pp. 92-110.

Available from http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1464522.
[accessed 28/04/2013]

Jeffrey Scott Ray (2011). «Using Effective E-Commerce Strategies to Improve Organizational Performance». Social science Network [Online]. November, 20 2011. Available from http://papers.ssrn.com/sol3/papers.cfm?abstractid=2115064 [Accessed 21/04/2013]

Kenneth C. Laudon and C. Guercio (2011). E-Commerce 2012, 8th Edition. Pearson-Prentice Hall. New Jersey (USA)

Kenneth C. Laudon and Jane P. Laudon (2006). Management information systems, Managing the digital firm, 10th edition. Pearson education inc, New Jersey, USA

Kevin Zhu (2004). The complementarity of Information technology infrastructure and e-commerce capability: A resource-based assessment of their business value. Journal of management of Information system. Summer 2004, Vol 21, No 1 pp 167 -202

Lior Fink (2011). How do IT capabilities create strategic value? Toward greater integration of insights from reductionistic and holistic approaches. European Journal of Information systems (2011) 20, pp16-33

Page | 56

Mirza K. Baig, Hussein Raza, Umer Farooq (2011). «E-commerce adoption. A comparative study of Sweden and Pakistan». Master Thesis. Linkopings University, Stockholm

Monideepa Tarafdar&Steven R. Gordon (2013). «How information technology capabilities influence organizational innovation: Exploratory findings from two case studies». Available from http://is2.lse.ac.uk/asp/aspecis/20050014.pdf. [accessed 28/04/2013]

Neil F. Doherty (2009). «The role of IS capabilities in delivering sustainable improvements to competitive positioning». Journal of Strategic Information Systems 19 (2009) 100-116.

Nikhilesh Dholakia and Nir Kshetri (2005). «World Trade Point Federation: Bringing E-Commerce Capabilities to Developing Nations» Social science research network.[Online] International Journal of Cases on Electronic Commerce (IJCEC), Vol. 1, No. 1, pp. 39-53. Available from http://papers.ssrn.com/sol3/papers.cfm?abstractid=846464 [accessed 28/04/2013]

Nikhilesh Dholakia and Nir Kshetri (2005). «Social science research network. Mobile Commerce as a Solution to the Global Digital Divide: Selected Cases of e-Development.» November, 13 2005 [Online]

Available from http://papers.ssrn.com/sol3/papers.cfm?abstractid=847184 [accessed 28/04/2013]

Paul Beynon-Davies (2002). Information systems. An introduction to informatics in organisations. Palgrave MacMillan, New York

Ravichandran T. and Chalermsak Lertwongsatien (2005). Effect of IS resources and capabilities on firm perspective: a resource-based perspective. Journal of Management Information system, Vol 21 no 24, pp 237-276

Rosli Mohamad and Noor Azizi Ismail (2009). «Social science research network. Electronic Commerce Adoption in SME: The Trend of Prior Studies, published in Journal of Internet Banking and Commerce, August 2009, vol. 14, no.2. Available from http://papers.ssrn.com/sol3/papers.cfm?abstract id=1521290## [accessed 28/04/2013]

Sheril L. Jackson (2010). Research Methods. A modular approach, 2d edition. Cengage Learning, Boston

Ting-Peng Liang and Jun-Jer You (2011). Resource-based view in IS research: A meta-analysis. Pacifi Asia conference on Information system, Pacis 2009 proceedings

Timothy P. Layton (2007). Information security: Design, implementation, measure, and compliance. Auerbach publications, Floride (USA)

Turban E., King D., Lee J., Viehland D. (2008). Electronic Commerce: A Managerial Perspective. Prentice Hall: New Jersey, USA

Page | 57

7: Appendix

VII.1 List of abbreviation

ACH Automatic clearing house

ATM Automated teller machine

AVS Address verification system

B2B Business-to-business e-commerce

B2C Business-to-consumer e-commerce

C Consumer-to-consumer e-commerce

CEO Chief executive officer

CIA Confidentiality, integrity, availability

COO Chief operation officer

CVN Card verification number

DBMS Database management system

DMZ Demilitarized zone

DOS Denial-of-service

DRC Democratic republic of Congo

E-CASH Electronic cash

E-CHECK Electronic check

E-COMMERCE Electronic commerce

ICT information and communication technologies

IDS Intrusion detection system

IEC International electro technical commission

IS Information systems

ISMS International security management system

ISO International standards organization

ISP Internet service provider

IT Information technology

LAN Local area network

M-payment Mobile payment

PDA Personal device assistant

PSP Processing service provider

VPN Virtual private network

Page | 58

VII.2. List of figures

Figure 1: From of e-commerce

Figure 2: E-commerce framework

Figure 3: Initial structure of IT capabilities

Figure 4: IT infrastructure components

Figure 5: Level of acceptable security for e-commerce

Figure 6: Layered security

Figure 7: DMZ deployment

Figure 8: Processing of card transaction

Figure 9: E-checking processing using Authorize..net

VII.3. List of tables

Table 1: Qualitative vs quantitative research methodologies

Table 2: Types of central tendency measures

Table 3: Repartition of respondents per working experience

Table 4: Repartition of respondents per position

Table 5: E-payment methods reported

Table 6: List of issues faced by e-payment systems

Table 7: Confidentiality elements

Table 8: Score of Integrity check of the firewall configuration

Table 9: Frequency table of integrity check of firewall configuration

Table 10: System integrity result

Table 11: Report of unauthorized attempts to sensitive data

Table 12: Additional physical access control score

Table 13: Frequency distribution of physical access control

Table 14: Availability capabilities

Table 15: Summary of the security capabilities

P a g e | 59

VII.4. Data Collection questionnaire

Brief Overview

The aim of this questionnaire is to assess the security of the e-payment systems in Democratic republic of Congo in accordance to the confidentiality, integrity and availability concepts of the security of an information system. Because it's for an academic dissertation, only a sample of relevant questions has been selected for quantitative analysis purpose.

Select only one response unless otherwise stated A. Generality

Question 1

Are you interested by the result of this assessment?

1: No 2 : Not sure 3 : No opinion 4 : Not applicable 5 : Yes

Question 2: Personal information

Position in the company:

Sex :

Years of experience:

Company name:

Question 3

Are you familiar with electronic payment systems?

1 : No 2 : Not sure 3 : Not applicable 4 : yes 5 : Most familiar

Question 4

Does your organization used or commercialize an e-payment system?

1 : No 2 : Not sure 3 : No opinion 4 : Not applicable 5 : Yes

Question 5 (select all which applied)

Which product are you offering to your clients?

1 : None 2: Not sure 3 : Visa card 4: Mastercard 5 : electronic check

6 : electronic cash 7 : Online banking (e-banking) 8: Mobile payment (M-payment)

9 : Other : (cite) ----------------------------------------------------------------------------------------------------------

Question 6

During the last past twelve months, have you faced some issues related to the use of one of the e-products you are offering to your clients?

1 : No 2 : Not sure 3 : No opinion 4 : Not applicable 5 : Yes

Question 7 (select all which applied)

Please select which issue have you encountered

1 : Fraud 2 : Not sure 3:Theft 4 : service unavailability

5 : disclosure of confidential information 6 : misuse of information 7 : falsification

8 : Other (cite) ------------------------------------------------------------------------------------------------------

Page | 60

Question 8

Does any written security policy exist related to electronic transaction?

1 : No 2 : Not sure 3 : No opinion 4 : Not applicable 5 : Yes

Question 9

Is the written security policy shared to your clients?

1 : No 2 : Not sure 3 : No opinion 4 : Not applicable 5 : Yes

B. Confidentiality

Question 10

Are all connections between the organization's networks and external third party or public wide area IP networks made via a formally authorized firewall (or have equivalent approved controls over the data and protocols which are allowed through)?

1 : No 2 : Not sure 3:No firewall used 4 : Not applicable 5 : No external connection
6 : yes

Question 11

Does your main internet connection use a router?

1 : No 2 : Not sure 3 : Not applicable 4 : No internet connection 5 : yes

Question 12

Is remote access to the management port of the router or firewall strictly restricted?

1: No 2 : Not sure 3 : No opinion 4 : Not applicable 5 : Yes

Question 13

How often is the router or firewall configuration checked for integrity?

1 : Never 2: Not sure 3 : monthly 4 : weekly 5 : Not applicable 6 : Daily

Question 14

Are the firewalls configured to default to reject everything, only accepting those protocols that are explicitly required, to those IP addresses which specifically require them?

1 : No 2 : Not sure 3 : No opinion 4 : Not applicable 5 : Yes

Question 15

Is the logical access to firewalls (admin user logons, etc) subject to tight restrictions and authentication... and is this regularly reviewed?

1 : No 2 : not sure 3 : No opinion 4 : partially 5 : Yes

Page | 61

Question 16

How is encryption being applied on your network infrastructure?

1 : No encryption 2 : Not sure 3 : LAN and PC resident program

4 : Hardware Cryptographic Device 5 : hardware cryptographic device and software resident
program

C. Integrity

Question 17

Is there any digital certificate system in the Network infrastructure?

1 : No 2 : Not sure 3 : distribution only 4 : Not applicable 5 : Yes

Question 18

Is access to data files and programs restricted or controlled in any way?

1 : No 2 : Not sure 3 : No opinion 4 : Not applicable 5 : Yes

Question 19

Is there a facility to detect and report unauthorized attempts to access ALL sensitive data?

1 : No 2 : Not sure 3 : No opinion 4 : Not applicable 5 : Yes

Question 20

In addition to logical access controls, are there any physical access controls for computers holding very sensitive data (e.g. PC key/lock, stored in locked cabinet, etc.)?

1 : No 2 : Not sure 3 : No opinion 4 : Not applicable 5 : Yes

Question 21

Are laptops computers carrying sensitive data used offsite (home, public network,...)?

1 : No 2 : Not sure 3 : No opinion 4 : Not applicable 5 : Yes

Question 22

Is there a mechanism in place to detect and prevent virus infection?

1: No 2: Not sure 3: Planned 4: Not applicable 5: Yes

Question 23

Are all virus incidents managed in a secure manner, in that they are cleaned up, investigated, reported to management, and properly documented?

1: No 2: Not sure 3: Only reported 4: investigated
5: reported and documented 6: investigated, reported and documented

Page | 62

D. Availability

Question 25

Do critical network and e-payment system hardware components operate from an uninterruptable power supply system?

1 : No 2 : Not sure 3 : No opinion 4 : Some of them 5 : Yes

Question 26

Is the recovery of the e-payment system included in a formal contingency/business resumption plan? (Business continuity plan)?

1 : No 2 : Not sure 3 : No opinion 4 : plan in development 5 : Yes

Question 27

Are any back-up facilities, features or practices in place for the DATA and SOFTWARE held on the system being reviewed?

1 : No 2 : Not sure 3 : No opinion 4 : Not applicable 5 : Yes

Question 28

What type of backup is performed?

1: Incremental 2 : Not sure 3 : No opinion 4 : periodic full and incremental
5: always full backup

Question 29

How many copies of backup are taken?

1: one copy 2 : not sure 3 : not applicable 4 : two copies 5 : more than two copies






Bitcoin is a swarm of cyber hornets serving the goddess of wisdom, feeding on the fire of truth, exponentially growing ever smarter, faster, and stronger behind a wall of encrypted energy








"Ceux qui vivent sont ceux qui luttent"   Victor Hugo