Assessing organisational information systems security by human insiders in private and public universities in Uganda
Loading...
Date
2015
Authors
Journal Title
Journal ISSN
Volume Title
Publisher
IMPACT: International Journal of Research in Engineering & Technology
Abstract
Information system security management is expected to be a high priority for organizational success, given that Information is critical both as input and output of an organization. Hence, there is need to have a secure information system to conduct any business related activities to ensure six objectives of information security: confidentiality; integrity; availability; legitimate use (identification, authentication, and authorization); auditing or traceability; and non-repudiation of the information. This study identified the objectives of information security, key human insider threats which affect information system security of Business organization and the level of information security policy compliance in organizations.
The study was carried out in two Universities one private and another Public University where forty (40) Questionnaires were distributed and the findings showed Institutional data security (protecting company information assets) with mean of 3.79 and Employees (safety, satisfaction, retention) with mean of 3.00 which helps to motivate insider to feel part of organization were given law priority and Respondents also identified Laptops ranked as number 1 (mean =3.91) as frequently used device in the institution to cause threat on institutional data security followed by Mobile phones ranked as Number 2(mean=3.75).
The study also further discovered that Policies on cyber security (use of social medias e.g. face book) (mean=2.45) was not implemented, Policies on Bring Your Own Device to be used at the Institution (Mean =2.53) was not implemented and Data destruction policies for your Institutional data materials that contain sensitive information (mean=2.52) was not implemented.
The following behaviors were ranked top which need to be worked on; usage of secondary storage devices like flash discs, CD, Hard disks (mean=3.88), Sharing of secondary storage devices like flash discs, CD, Hard disks (Mean=3.48) was also frequent and using of personally owned mobile devices to do office work (mean=3.27) was also ranked among the top behaviors.
Description
Keywords
Information Security, Human Insider Threats, Mobile Devices
Citation
Businge, Phelix Mbabazi (2015). Assessing Organisational Information Systems Security by Human Insiders in Private and Public Universities in Uganda. IMPACT: International Journal of Research in Engineering & Technology, 3(11), 49–60. Retrieved from http://www.impactjournals.us/download.php?fname=2-77-1448629048-7.%20eng-%20Final%20Businge%20Phelix%20Mbabazi%20ASSESSING%20ORGANISATIONAL%20%20-Businge%2CPhelix%20Mbabazi.pdf