ASSESSING ORGANISATIONAL INFORMATION SYSTEMS SECURITY BY HUMAN INSIDERS N PRIVATE AND PUBLIC UNVERSITIES IN UGANDA
Journal: IMPACT : International Journal of Research in Engineering & Technology ( IMPACT : IJRET ) (Vol.3, No. 11)Publication Date: 2015-11-22
Authors : BUSINGE PHELIX MBABAZI;
Page : 49-60
Keywords : Information Security; Human Insider Threats; Mobile Devices;
Abstract
Information system security management is expected to be a high priority for organizational success, given that Information is critical both as input and output of an organization. Hence, there is need to have a secure information system to conduct any business related activities to ensure six objectives of information security: confidentiality; integrity; availability; legitimate use (identification, authentication, and authorization); auditing or traceability; and non-repudiation of the information. This study identified the objectives of information security, key human insider threats which affect information system security of Business organization and the level of information security policy compliance in organizations. The study was carried out in two Universities one private and another Public University where forty (40) Questionnaires were distributed and the findings showed Institutional data security (protecting company information assets) with mean of 3.79 and Employees (safety, satisfaction, retention) with mean of 3.00 which helps to motivate insider to feel part of organization were given law priority and Respondents also indentified Laptops ranked as number 1 (mean =3.91) as frequently used device in the institution to cause threat on institutional data security followed by Mobile phones ranked as Number 2(mean=3.75). The study also further discovered that Policies on cyber security (use of social medias e.g. face book) (mean=2.45) was not implemented, Policies on Bring Your Own Device to be used at the Institution (Mean =2.53) was not implemented and Data destruction policies for your Institutional data materials that contain sensitive information (mean=2.52) was not implemented. The following behaviors were ranked top which need to be worked on; usage of secondary storage devices like flash discs, CD, Hard disks (mean=3.88), Sharing of secondary storage devices like flash discs, CD, Hard disks (Mean=3.48) was also frequent and using of personally owned mobile devices to do office work (mean=3.27) was also ranked among the top behaviors
Other Latest Articles
- INTELLIGENT VEHICLE CONTROL USING WIRELESS IN TRANSPORTATION SYSTEM
- SUSTAINABILITY FACTORS AFFECTING MAINTENANCE OF RESIDENTIAL BUILDINGS
- Design, development and In vitro characterization of Felodipine Mucoadhesive buccal tablets
- Formulation and Evaluation of Fast Dissolving Tablets of Ranitidine Hydrochloride
- Synthesis and Biological Activity of Novel Acyl Hydrazone Derivatives of 3-(4,5-diphenyl-1,3-oxazol-2-yl) propanoic acid as Anticancer, Analgesic and Anti-inflammatory Agents
Last modified: 2015-12-11 20:12:25