Assessing organisational information systems security by human insiders in private and public universities in Uganda

dc.contributor.authorBusinge, Phelix Mbabazi
dc.date.accessioned2018-06-18T09:50:17Z
dc.date.available2018-06-18T09:50:17Z
dc.date.issued2015
dc.description.abstractInformation system security management is expected to be a high priority for organizational success, given that Information is critical both as input and output of an organization. Hence, there is need to have a secure information system to conduct any business related activities to ensure six objectives of information security: confidentiality; integrity; availability; legitimate use (identification, authentication, and authorization); auditing or traceability; and non-repudiation of the information. This study identified the objectives of information security, key human insider threats which affect information system security of Business organization and the level of information security policy compliance in organizations. The study was carried out in two Universities one private and another Public University where forty (40) Questionnaires were distributed and the findings showed Institutional data security (protecting company information assets) with mean of 3.79 and Employees (safety, satisfaction, retention) with mean of 3.00 which helps to motivate insider to feel part of organization were given law priority and Respondents also identified Laptops ranked as number 1 (mean =3.91) as frequently used device in the institution to cause threat on institutional data security followed by Mobile phones ranked as Number 2(mean=3.75). The study also further discovered that Policies on cyber security (use of social medias e.g. face book) (mean=2.45) was not implemented, Policies on Bring Your Own Device to be used at the Institution (Mean =2.53) was not implemented and Data destruction policies for your Institutional data materials that contain sensitive information (mean=2.52) was not implemented. The following behaviors were ranked top which need to be worked on; usage of secondary storage devices like flash discs, CD, Hard disks (mean=3.88), Sharing of secondary storage devices like flash discs, CD, Hard disks (Mean=3.48) was also frequent and using of personally owned mobile devices to do office work (mean=3.27) was also ranked among the top behaviors.en_US
dc.identifier.citationBusinge, Phelix Mbabazi (2015). Assessing Organisational Information Systems Security by Human Insiders in Private and Public Universities in Uganda. IMPACT: International Journal of Research in Engineering & Technology, 3(11), 49–60. Retrieved from http://www.impactjournals.us/download.php?fname=2-77-1448629048-7.%20eng-%20Final%20Businge%20Phelix%20Mbabazi%20ASSESSING%20ORGANISATIONAL%20%20-Businge%2CPhelix%20Mbabazi.pdfen_US
dc.identifier.issn23474599 (Online)
dc.identifier.issn23218843 (Print)
dc.identifier.uri
dc.language.isoenen_US
dc.publisherIMPACT: International Journal of Research in Engineering & Technologyen_US
dc.relation.ispartofseriesVol.3;No.11
dc.subjectInformation Securityen_US
dc.subjectHuman Insider Threatsen_US
dc.subjectMobile Devicesen_US
dc.titleAssessing organisational information systems security by human insiders in private and public universities in Ugandaen_US
dc.typeArticleen_US

Files

Original bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
Businge_2015_Article.pdf
Size:
108.9 KB
Format:
Adobe Portable Document Format
Description:
Main article
License bundle
Now showing 1 - 1 of 1
No Thumbnail Available
Name:
license.txt
Size:
1.71 KB
Format:
Item-specific license agreed upon to submission
Description: