Documente Academic
Documente Profesional
Documente Cultură
Gemma F. Lamsen
Journal of Innovative Research in Science, Engineering and Technology, March 2014, Vol. 3, Special Issue
3.
For the research methodology, the study used the survey method in collecting the needed data.
The study has two types of data collected in line with the purpose of the study. The primary data was
collected from the bank officials working with the information systems in the state of Uttarakhand,
India. The secondary data was collected from various published reports of cyber-attacks available
nationally and internationally. In the research, sample size was randomly selected on the basis of the
number of banks operating in Uttarakhand constituting to a sample of fifty (50) bank officials dealing
Although the testing instrument was not presented in the journal, the researcher has presented
one of the objectives of the study through cross sectional tabulation highlighting the computed Chi-
square and Pearson coefficient of correlation. In the study, two tables were presented. One showed
the relationship of cyber-attacks and proper display of information from data warehouse. The other
showed the relationship between cyber-attacks and the ability of the data warehouse to defend itself
The findings showed that the variables OIT (Online Identity Theft), CAT (Credit Card Frauds),
MCO (Malicious code attack), PVS (Phishing/Vishing/Spoofing) are positively correlated with proper
display of information from CDW (data warehouse) while the variables HCK (Hacking) and DOS (DOS
Attack) are negatively correlated with CDW. In the other table, the variables OIT (Online Identity Theft),
MCO (Malicious code attack), PVS (Phishing/Vishing/Spoofing) are positively correlated with the DWD or
role of data warehouse to defend systems from cyber threat, while the HCK (Hacking) and DOS (DOS
Attack) and CAT (Credit Card ATM Frauds) are negatively correlated with DWD. Therefore the
researchers have concluded that there is no significant association between database management of
While the study has merit, methodology of the study needs to be re-evaluated. A larger sample
size could have been used to prove the researcher’s objectives. It could have also been better if the
study was conducted in one of the major cities of India where electronic banking is widely used
therefore the results will attain significant relationship between the Central data warehouse defense