Unintentional Insider Threats Countermeasure Model (UITCM) in Reducing Internal Threat Environment

Unintentional insider threats (UITs) are one of the biggest issues that can weaken the security defence of the organization. Studies have shown existing technical security countermeasures alone are insufficient especially when it deals with human errors. A total of 311 questionnaires were collect...

Full description

Saved in:
Bibliographic Details
Main Author: Zainab. A. A.Abdelsadeq
Format: Thesis
Language:en_US
Subjects:
Online Access:https://oarep.usim.edu.my/bitstreams/3f632cd3-19ea-4f1e-a21f-ebb14cfcdf1c/download
https://oarep.usim.edu.my/bitstreams/ac2e7178-0ca1-4ad8-8936-16f7fe5db677/download
https://oarep.usim.edu.my/bitstreams/3da45707-10eb-46c8-a400-1e5eeec30f63/download
https://oarep.usim.edu.my/bitstreams/c51978b5-4277-470c-938b-b5dcd09a6126/download
https://oarep.usim.edu.my/bitstreams/edd53c5e-c0be-4391-8c15-6f8d91435ed3/download
https://oarep.usim.edu.my/bitstreams/3f491ce8-555e-4043-90d5-c737c988951c/download
https://oarep.usim.edu.my/bitstreams/3e952c91-a479-439c-b6c2-663a701684c7/download
https://oarep.usim.edu.my/bitstreams/e63c8a78-d98b-4bcd-80e8-d3edbd1e8f64/download
https://oarep.usim.edu.my/bitstreams/345e589c-c9dc-4523-ab22-eb1b61b89277/download
Tags: Add Tag
No Tags, Be the first to tag this record!
id my-usim-ddms-13349
record_format uketd_dc
institution Universiti Sains Islam Malaysia
collection USIM Institutional Repository
language en_US
topic Computer crimes--Prevention
Information technology--Security measures
Computer networks--Access control
Employee crimes--Prevention
spellingShingle Computer crimes--Prevention
Information technology--Security measures
Computer networks--Access control
Employee crimes--Prevention
Zainab. A. A.Abdelsadeq
Unintentional Insider Threats Countermeasure Model (UITCM) in Reducing Internal Threat Environment
description Unintentional insider threats (UITs) are one of the biggest issues that can weaken the security defence of the organization. Studies have shown existing technical security countermeasures alone are insufficient especially when it deals with human errors. A total of 311 questionnaires were collected from Information Technology Executives of the Small Medium Enterprises (SMEs) in Malaysia to determine the contributing factors and the likelihood of UITs. Quantitative data was analyzed using SPSS. The results showed majority of the respondents alleged that their organizations were very likely to have faced threats with 634 (34.2%), 442 (23.9%) believed that their organizations were likely to confront this threats. While 172 (9.3%) were most likely to have faced such threats. Ignorance and negligence (27%), situation awareness (26%) and human error (22%) were the most contributing factors of UIT in Malaysian SMEs. The survey showed that multi layered defensive approaches including policies, procedures, awareness, attention to sociology, psychology aspects together with automated defence tools are important to fight with the “people issue. Single approach of countermeasure can only addresses some aspects of human errors but not all. Thus the objective of this study is to propose a model that consists of mixed approaches that can be used as countermeasures to UITs in Malaysian’s SMEs. The initial version of the proposed model was developed by combining the existing countermeasures that have been suggested in the literatures. In the second stage, the proposed model was evaluated by expert-based judgement through Delphi method to reach acceptable level of experts’ consensus and remove any uncertainty in the model. Five (5) experts with the composition of 3 practitioners and 2 academicians have evaluated the model with two-round questionnaire. Based on the evaluation, the results indicated that the experts have reach mutual consensus with mean scores more than 75% in term of the theoretical validity, usability and readability and understandability of the model. Since countermeasure is a security control used to protect the confidentiality, integrity, and availability of data and information systems and it should be available at every layer of the stack, it is hoped that the model can be used as a guideline by the organizations to improve their existing UIT countermeasures and indirectly strengthen their strategic, operational as well as financial of the organization.
format Thesis
author Zainab. A. A.Abdelsadeq
author_facet Zainab. A. A.Abdelsadeq
author_sort Zainab. A. A.Abdelsadeq
title Unintentional Insider Threats Countermeasure Model (UITCM) in Reducing Internal Threat Environment
title_short Unintentional Insider Threats Countermeasure Model (UITCM) in Reducing Internal Threat Environment
title_full Unintentional Insider Threats Countermeasure Model (UITCM) in Reducing Internal Threat Environment
title_fullStr Unintentional Insider Threats Countermeasure Model (UITCM) in Reducing Internal Threat Environment
title_full_unstemmed Unintentional Insider Threats Countermeasure Model (UITCM) in Reducing Internal Threat Environment
title_sort unintentional insider threats countermeasure model (uitcm) in reducing internal threat environment
granting_institution Universiti Sains Islam Malaysia
url https://oarep.usim.edu.my/bitstreams/3f632cd3-19ea-4f1e-a21f-ebb14cfcdf1c/download
https://oarep.usim.edu.my/bitstreams/ac2e7178-0ca1-4ad8-8936-16f7fe5db677/download
https://oarep.usim.edu.my/bitstreams/3da45707-10eb-46c8-a400-1e5eeec30f63/download
https://oarep.usim.edu.my/bitstreams/c51978b5-4277-470c-938b-b5dcd09a6126/download
https://oarep.usim.edu.my/bitstreams/edd53c5e-c0be-4391-8c15-6f8d91435ed3/download
https://oarep.usim.edu.my/bitstreams/3f491ce8-555e-4043-90d5-c737c988951c/download
https://oarep.usim.edu.my/bitstreams/3e952c91-a479-439c-b6c2-663a701684c7/download
https://oarep.usim.edu.my/bitstreams/e63c8a78-d98b-4bcd-80e8-d3edbd1e8f64/download
https://oarep.usim.edu.my/bitstreams/345e589c-c9dc-4523-ab22-eb1b61b89277/download
_version_ 1812444753910824960
spelling my-usim-ddms-133492024-05-29T18:59:07Z Unintentional Insider Threats Countermeasure Model (UITCM) in Reducing Internal Threat Environment Zainab. A. A.Abdelsadeq Unintentional insider threats (UITs) are one of the biggest issues that can weaken the security defence of the organization. Studies have shown existing technical security countermeasures alone are insufficient especially when it deals with human errors. A total of 311 questionnaires were collected from Information Technology Executives of the Small Medium Enterprises (SMEs) in Malaysia to determine the contributing factors and the likelihood of UITs. Quantitative data was analyzed using SPSS. The results showed majority of the respondents alleged that their organizations were very likely to have faced threats with 634 (34.2%), 442 (23.9%) believed that their organizations were likely to confront this threats. While 172 (9.3%) were most likely to have faced such threats. Ignorance and negligence (27%), situation awareness (26%) and human error (22%) were the most contributing factors of UIT in Malaysian SMEs. The survey showed that multi layered defensive approaches including policies, procedures, awareness, attention to sociology, psychology aspects together with automated defence tools are important to fight with the “people issue. Single approach of countermeasure can only addresses some aspects of human errors but not all. Thus the objective of this study is to propose a model that consists of mixed approaches that can be used as countermeasures to UITs in Malaysian’s SMEs. The initial version of the proposed model was developed by combining the existing countermeasures that have been suggested in the literatures. In the second stage, the proposed model was evaluated by expert-based judgement through Delphi method to reach acceptable level of experts’ consensus and remove any uncertainty in the model. Five (5) experts with the composition of 3 practitioners and 2 academicians have evaluated the model with two-round questionnaire. Based on the evaluation, the results indicated that the experts have reach mutual consensus with mean scores more than 75% in term of the theoretical validity, usability and readability and understandability of the model. Since countermeasure is a security control used to protect the confidentiality, integrity, and availability of data and information systems and it should be available at every layer of the stack, it is hoped that the model can be used as a guideline by the organizations to improve their existing UIT countermeasures and indirectly strengthen their strategic, operational as well as financial of the organization. Universiti Sains Islam Malaysia 2023-03 Thesis en_US https://oarep.usim.edu.my/handle/123456789/13349 https://oarep.usim.edu.my/bitstreams/729006ef-314a-41b2-958b-f60ddd44ad1a/download 68b329da9893e34099c7d8ad5cb9c940 https://oarep.usim.edu.my/bitstreams/d8a6e754-1e69-4090-b17c-5310cc96559a/download f7dbb4131784e4553a9bf578e2abcb5c https://oarep.usim.edu.my/bitstreams/ce2a5c57-5496-43c0-bc38-6abe8c36a5f2/download bf8a14320bdf7541ee9b56893608892f https://oarep.usim.edu.my/bitstreams/bd9c0809-640e-45ed-b692-e6e1aabc4bf3/download 2837322646c4b70e1135e92dfa1fe188 https://oarep.usim.edu.my/bitstreams/20611a5b-9789-49ed-bddf-94c53a323c34/download 0d1f1de7836ebffef23492f30b405a93 https://oarep.usim.edu.my/bitstreams/71b5029a-b41c-4e0b-b00e-b4b8b21778e0/download 698f01e219427aadfddf28bc493e9a65 https://oarep.usim.edu.my/bitstreams/172c2575-ff2e-4c9c-97b8-003c2ed2e3cf/download 5718b8baa1d4157d314302b3cb9e27e9 https://oarep.usim.edu.my/bitstreams/c23922a9-18f8-4335-9533-5bbe735fa573/download 3e2864bf82a245eb60a69400200dbb04 https://oarep.usim.edu.my/bitstreams/e6faf7f7-d6ff-48cc-a3c1-72443e9ccd91/download 21eb1f01b217b2232d21531a42493aa9 https://oarep.usim.edu.my/bitstreams/3f632cd3-19ea-4f1e-a21f-ebb14cfcdf1c/download 52e6b2ac3e5d04af73af27907f872ea6 https://oarep.usim.edu.my/bitstreams/ac2e7178-0ca1-4ad8-8936-16f7fe5db677/download e512e6182c1770ecea7347c51d009975 https://oarep.usim.edu.my/bitstreams/3da45707-10eb-46c8-a400-1e5eeec30f63/download fb653d7a1b9b979a925f3f1250559b26 https://oarep.usim.edu.my/bitstreams/c51978b5-4277-470c-938b-b5dcd09a6126/download 3a7c1163b5ec75d12514df2835b0a346 https://oarep.usim.edu.my/bitstreams/edd53c5e-c0be-4391-8c15-6f8d91435ed3/download 822ec831b9bf27ee944bfd669560c1aa https://oarep.usim.edu.my/bitstreams/3f491ce8-555e-4043-90d5-c737c988951c/download bff59639d84756492d577eae25ffa539 https://oarep.usim.edu.my/bitstreams/3e952c91-a479-439c-b6c2-663a701684c7/download cf5f1e26c681d3fdfa5623c94155baa5 https://oarep.usim.edu.my/bitstreams/e63c8a78-d98b-4bcd-80e8-d3edbd1e8f64/download c3527524682b8aa1332234332bdad7e5 https://oarep.usim.edu.my/bitstreams/345e589c-c9dc-4523-ab22-eb1b61b89277/download 2061652f50f7c7402663bd077f9207f4 https://oarep.usim.edu.my/bitstreams/da108195-5045-4f21-b92b-f13d0ddacf43/download 8a4605be74aa9ea9d79846c1fba20a33 Computer crimes--Prevention Information technology--Security measures Computer networks--Access control Employee crimes--Prevention