SciELO - Scientific Electronic Library Online

 
vol.24 número1A review of knowledge transfer tools in knowledge-intensive organisationsModelling the intended use of Facebook privacy settings índice de autoresíndice de materiabúsqueda de artículos
Home Pagelista alfabética de revistas  

Servicios Personalizados

Articulo

Indicadores

Links relacionados

  • En proceso de indezaciónCitado por Google
  • En proceso de indezaciónSimilares en Google

Compartir


South African Journal of Information Management

versión On-line ISSN 1560-683X
versión impresa ISSN 2078-1865

Resumen

SILAULE, Carol B.; MAKHUBELE, Lean M.  y  MAMOROBELA, Stevens P.. A model to reduce insider cybersecurity threats in a South African telecommunications company. SAJIM (Online) [online]. 2022, vol.24, n.1, pp.1-8. ISSN 1560-683X.  http://dx.doi.org/10.4102/sajim.v24i1.1573.

BACKGROUND: Cybersecurity breaches have become a growing challenge in today's digital economy. Organisations are faced with the responsibility of protecting their information resources from cybersecurity threats, and insider threats are one of them. Organisations have sophisticated technologies to protect themselves against these attacks, and their employees are often less guarded when it comes to protecting valuable company information systems. OBJECTIVES: This research was aimed to develop and conceptualise a model to reduce cybersecurity insider threats in a South African telecommunication organisation. METHOD: This study was conducted using a survey research approach, where close-ended questionnaires were utilised to collect data from respondents. The collected data was then analysed using IBM Statistical Package for Social Science (SPSS) RESULTS: The findings of the study indicated that personal norms in the domain of cybersecurity have a positive influence on individuals' attitude towards engaging in cybersecurity misbehaviour, and this has a significant relationship with their reduction of insider threats (RIT CONCLUSION: This study suggests that management should give close and thoughtful attention to factors that encourage their employees to engage in cybersecurity misbehaviour. As an efficient and effective approach to mitigate the risk of cybersecurity insider threats, identification and classification of these factors should be followed by proper planning with a goal of reducing their negative effect on employees' behaviour.

Palabras clave : cyberspace; cybersecurity; cyberthreats; insider threats; cybersecurity misbehaviour; information resources; telecommunications.

        · texto en Inglés     · Inglés ( pdf )

 

Creative Commons License Todo el contenido de esta revista, excepto dónde está identificado, está bajo una Licencia Creative Commons