Deterrence and Prevention-based Model to Mitigate Information Security Insider Threats in Organisations

03/15/2019
by   Nader Sohrabi Safa, et al.
0

Previous studies show that information security breaches and privacy violations are important issues for organisations and people. It is acknowledged that decreasing the risk in this domain requires consideration of the technological aspects of information security alongside human aspects. Employees intentionally or unintentionally account for a significant portion of the threats to information assets in organisations. This research presents a novel conceptual framework to mitigate the risk of insiders using deterrence and prevention approaches. Deterrence factors discourage employees from engaging in information security misbehaviour in organisations, and situational crime prevention factors encourage them to prevent information security misconduct. Our findings show that perceived sanctions certainty and severity significantly influence individuals' attitudes and deter them from information security misconduct. In addition, the output revealed that increasing the effort, risk and reducing the reward (benefits of crime) influence the employees' attitudes towards prevent information security misbehaviour. However, removing excuses and reducing provocations do not significantly influence individuals' attitudes towards prevent information security misconduct. Finally, the output of the data analysis also showed that subjective norms, perceived behavioural control and attitude influence individuals' intentions, and, ultimately, their behaviour towards avoiding information security misbehaviour.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
04/16/2019

On the Impact of Perceived Vulnerability in the Adoption of Information Systems Security Innovations

A number of determinants predict the adoption of Information Systems (IS...
research
01/18/2021

Panel: Humans and Technology for Inclusive Privacy and Security

Computer security and user privacy are critical issues and concerns in t...
research
12/13/2021

SoK: A Framework for Unifying At-Risk User Research

At-risk users are people who experience elevated digital security, priva...
research
08/19/2021

5G System Security Analysis

Fifth generation mobile networks (5G) are currently being deployed by mo...
research
08/23/2021

Factors that Determine Continuous Intention to Use Mobile Payments in Malawi

The proliferation of mobile phones has made mobile payments to be widely...
research
07/16/2018

The Perfect Storm: The Privacy Paradox and the Internet-of-Things

Privacy is a concept found throughout human history and opinion polls su...

Please sign up or login with your details

Forgot password? Click here to reset