SciELO - Scientific Electronic Library Online

 
vol.26 número1Active and passive information behaviour of the professoriate: A descriptive comparative pattern analysisThe gap between user perceptions and expectations of students at the main library of the University of KwaZulu-Natal: Pietermaritzburg Campus índice de autoresíndice de assuntospesquisa de artigos
Home Pagelista alfabética de periódicos  

Serviços Personalizados

Artigo

Indicadores

Links relacionados

  • Em processo de indexaçãoCitado por Google
  • Em processo de indexaçãoSimilares em Google

Compartilhar


South African Journal of Information Management

versão On-line ISSN 1560-683X
versão impressa ISSN 2078-1865

Resumo

NTLOEDIBE, Tshepiso; FOKO, Thato  e  SEGOOA, Mmatshuene A.. Cloud leakage in higher education in South Africa: A case of University of Technology. SAJIM (Online) [online]. 2024, vol.26, n.1, pp.1-10. ISSN 1560-683X.  http://dx.doi.org/10.4102/sajim.v26i1.1783.

BACKGROUND: Users with knowledge of an organisation can pose risks to Cloud Computing, including current and past employees and external stakeholders with access to the organisation's cloud. These insiders may engage in intentional or unintentional disruptive behaviors, causing significant harm to the organisation. A study focused on insider threats in South African higher education examined the tactics used by cybersecurity leaders to enforce cybersecurity policies OBJECTIVES: The goal of this study was to develop a comprehensive insider mitigation framework for cloud leakage in a South African University METHOD: The study employed qualitative methodologies and a case study approach. Open-ended interviews were conducted to collect data from the participants. The collected data was coded and analysed using ATLAS.ti 22 RESULTS: The study's findings revealed that some of the major sources of cloud leakage are a lack of effective training, ineffective information security (IS) policy regulation, and the implementation of information security awareness workshops that provided advice on how information security should be managed in the university CONCLUSION: Insider threats pose a serious risk to organisations. To mitigate this threat, it is crucial for organisations to establish strong security policies and closely monitor employee activities. By conducting a thorough assessment of insider threats, organisations can enhance their understanding of this dynamic threat and strengthen their defenses CONTRIBUTION: Although every employee is ultimately responsible for an organisation's security, the most effective IS programmes demonstrate strong top-level leadership by setting a 'tone at the top' and promoting the benefits of IS through careful policy and guidance

Palavras-chave : cloud computing; data leakage; insider threat; information security; information systems security policies.

        · texto em Inglês     · Inglês ( pdf )

 

Creative Commons License Todo o conteúdo deste periódico, exceto onde está identificado, está licenciado sob uma Licença Creative Commons