SciELO - Scientific Electronic Library Online

 
vol.24 número1A review of knowledge transfer tools in knowledge-intensive organisationsModelling the intended use of Facebook privacy settings índice de autoresíndice de assuntospesquisa de artigos
Home Pagelista alfabética de periódicos  

Serviços Personalizados

Artigo

Indicadores

Links relacionados

  • Em processo de indexaçãoCitado por Google
  • Em processo de indexaçãoSimilares em Google

Compartilhar


South African Journal of Information Management

versão On-line ISSN 1560-683X
versão impressa ISSN 2078-1865

Resumo

SILAULE, Carol B.; MAKHUBELE, Lean M.  e  MAMOROBELA, Stevens P.. A model to reduce insider cybersecurity threats in a South African telecommunications company. SAJIM (Online) [online]. 2022, vol.24, n.1, pp.1-8. ISSN 1560-683X.  http://dx.doi.org/10.4102/sajim.v24i1.1573.

BACKGROUND: Cybersecurity breaches have become a growing challenge in today's digital economy. Organisations are faced with the responsibility of protecting their information resources from cybersecurity threats, and insider threats are one of them. Organisations have sophisticated technologies to protect themselves against these attacks, and their employees are often less guarded when it comes to protecting valuable company information systems. OBJECTIVES: This research was aimed to develop and conceptualise a model to reduce cybersecurity insider threats in a South African telecommunication organisation. METHOD: This study was conducted using a survey research approach, where close-ended questionnaires were utilised to collect data from respondents. The collected data was then analysed using IBM Statistical Package for Social Science (SPSS) RESULTS: The findings of the study indicated that personal norms in the domain of cybersecurity have a positive influence on individuals' attitude towards engaging in cybersecurity misbehaviour, and this has a significant relationship with their reduction of insider threats (RIT CONCLUSION: This study suggests that management should give close and thoughtful attention to factors that encourage their employees to engage in cybersecurity misbehaviour. As an efficient and effective approach to mitigate the risk of cybersecurity insider threats, identification and classification of these factors should be followed by proper planning with a goal of reducing their negative effect on employees' behaviour.

Palavras-chave : cyberspace; cybersecurity; cyberthreats; insider threats; cybersecurity misbehaviour; information resources; telecommunications.

        · texto em Inglês     · Inglês ( pdf )

 

Creative Commons License Todo o conteúdo deste periódico, exceto onde está identificado, está licenciado sob uma Licença Creative Commons