全部 标题 作者
关键词 摘要

OALib Journal期刊
ISSN: 2333-9721
费用:99美元

查看量下载量

Unveiling Insider Threats: Examining Vulnerabilities in an Organizational?Structure: A Case Study of NamPost

DOI: 10.4236/oalib.1112797, PP. 1-10

Subject Areas: Information and Communication: Security, Privacy, and Trust, Computer and Network Security

Keywords: Insider Threats, Cybersecurity Risks, Organizational Vulnerabilities, Access Control

Full-Text   Cite this paper   Add to My Lib

Abstract

Insider threats pose significant risks to organizations, particularly in cybersecurity, where individuals with authorized access can misuse their privileges to cause data breaches, financial losses, or operational disruptions. This study explores the vulnerabilities within NamPost’s organizational structure that could be exploited by insider threats, aiming to develop a tailored detection and prevention model. A qualitative research approach was employed, involving semi-structured interviews with 10 participants from NamPost’s ICT department. The findings reveal that high stress, job dissatisfaction, inadequate access controls, and insufficient employee training contribute to insider threats. Participants emphasized the need to foster a supportive organizational culture and implement robust access control measures to mitigate risks. This article discusses these findings, situates them within broader literature, and provides actionable recommendations to strengthen NamPost’s resilience against insider threats.

Cite this paper

Waiganjo, I. N. and Nandjenda, L. S. (2025). Unveiling Insider Threats: Examining Vulnerabilities in an Organizational?Structure: A Case Study of NamPost. Open Access Library Journal, 12, e2797. doi: http://dx.doi.org/10.4236/oalib.1112797.

References

[1]  Cappelli, D.M., Moore, A.P. and Trzeciak, R.F. (2020) The CERT Guide to Insider Threats: How to Prevent, Detect, and Re-spond to Information Technology Crimes. 2nd Edition, Addison-Wesley Professional.
[2]  Nassir, N.F.M., Rauf, U.F.A., Zainol, Z. and Ghani, K.A. (2024). Revealing the Multi-Perspective Factors Behind Insider Threats in Cybersecurity. Journal of Media and Information Warfare, 17, 65-82.
[3]  Homoliak, I., Toffalini, F., Guarnizo, J., Elovici, Y. and Ochoa, M. (2019) Insight into Insiders and It. ACM Computing Surveys, 52, 1-40. https://doi.org/10.1145/3303771
[4]  Greitzer, F.L., Strozer, J.R., Cohen, S.L., Moore, A.P., Mundie, D. and Cowley, J. (2019) Analysis of Internal and External Threat Awareness in Organizational Cybersecurity. Cybersecurity Studies Quarterly, 11, 118-135.
[5]  Liu, X. and Cheng, T. (2020) Factors Contributing to the Insider Threat. Journal of Organizational Security, 12, 179-198.
[6]  Mills, D., Zaffar, F. and Parveen, T. (2021) Challenges in Detecting Insider Threats. Cybersecurity Challenges Journal, 6, 120-134.
[7]  Pfleeger, S.L. and Caputo, D.D. (2020) Insider Threats: Mitigation Strategies and Lessons Learned. Computer Security Review, 19, 223-238.
[8]  Chang, W. and Yeh, M. (2019) The Financial Impact of Data Breaches and Cyberattacks. Financial Manage-ment Journal, 45, 102-118.
[9]  Inayat, U., Farzan, M., Mahmood, S., Zia, M.F., Hussain, S. and Pallonetto, F. (2024) Insid-er Threat Mitigation: Systematic Literature Review. Ain Shams Engineering Journal, 15, Article 103068. https://doi.org/10.1016/j.asej.2024.103068
[10]  Kim, A., Oh, J., Ryu, J. and Lee, K. (2020) A Review of Insider Threat Detection Approaches with IoT Perspective. IEEE Access, 8, 78847-78867. https://doi.org/10.1109/access.2020.2990195
[11]  Naeem, M., Ozuem, W., Howell, K. and Ranfagni, S. (2024) Demysti-fication and Actualisation of Data Saturation in Qualitative Research through Thematic Analysis. International Journal of Qualitative Methods, 23, Article 16094069241229777. https://doi.org/10.1177/16094069241229777
[12]  Greitzer, F.L., Kangas, L.J., Noonan, C.F., Dalton, A.C. and Hohimer, R.E. (2012) Identifying At-Risk Employees: Modeling Psychosocial Precursors of Potential Insider Threats. 2012 45th Hawaii International Conference on System Sciences, Maui, 4-7 January 2012, 2392-2401. https://doi.org/10.1109/hicss.2012.309
[13]  Sultanov, A.B. and Kogos, K. (2020) Insider Threat De-tection Based on Stress Recognition Using Keystroke Dynamics.
[14]  Sergiu, E. (2020) Insider Threats and Thermal Stress in the Working Environment. Scientific Bulletin of Naval Academy, 24, 271-276. https://doi.org/10.21279/1454-864x-20-i1-038
[15]  Moore, A.P., Perl, S.J., Cowley, J., Collins, M.L., Cassidy, T.M., VanHoudnos, N. and Rousseau, D.M. (2016) The Critical Role of Positive Incentives for Reducing Insider Threats. SEI Tech-nical Report CMU/SEI-2016-TR-014.
[16]  Dinev, T., Goo, J., Hu, Q. and Nam, K. (2009) User Behaviour Towards Protective Information Technologies: The Role of National Cultural Differences. Information Systems Journal, 19, 391-412. https://doi.org/10.1111/j.1365-2575.2007.00289.x
[17]  Collier, H., Morton, C., Alharthi, D. and Kleiner, J. (2023) Cul-tural Influences on Information Security. European Conference on Cyber Warfare and Security, 22, 143-150. https://doi.org/10.34190/eccws.22.1.1127
[18]  Waiganjo, I., Osakwe, J. and Azeta, A. (2024) Impediments to Cyberse-curity Policy Implementation in Organisations: Case Study of Windhoek, Namibia. International Journal of Research and Scientific Innovation, 11, 540-546. https://doi.org/10.51244/ijrsi.2024.1110046
[19]  McCormick, M. (2008) Data Theft: A Prototypical Insider Threat. In: Advances in Information Security, Springer, 53-68. https://doi.org/10.1007/978-0-387-77322-3_4
[20]  Warkentin, M. and Willison, R. (2009) Behavioral and Policy Issues in Information Systems Security: The Insider Threat. European Journal of Information Systems, 18, 101-105. https://doi.org/10.1057/ejis.2009.12
[21]  Shaw, T., Chen, C., Harris, A. and Huang, H. (2018) Examining the Anteced-ents of Insider Threats on Organizations: The Impact of Job Satisfaction, Stress, and Organizational Commitment. Infor-mation & Computer Security, 26, 1-16. https://doi.org/10.1108/ICS-03-2017-0013
[22]  Whitty, M.T. (2015) Mass-Marketing Fraud: A Growing Concern. IEEE Security & Privacy, 13, 84-87. https://doi.org/10.1109/msp.2015.85
[23]  Mourad, A., Soeanu, A., Laverdière, M. and Debbabi, M. (2009) New As-pect-Oriented Constructs for Security Hardening Concerns. Computers & Security, 28, 341-358. https://doi.org/10.1016/j.cose.2009.02.003
[24]  D’Arcy, J. and Greene, G. (2014) Security Culture and the Employment Relationship as Drivers of Employees’ Security Compliance. Information Management & Computer Security, 22, 474-489. https://doi.org/10.1108/imcs-08-2013-0057
[25]  Ahmed, M., Pathan, A.-S.K. and Ullah, S. (2020) Security Challenges in Modern Cyber Systems. Springer.
[26]  Parsons, K., McCormac, A., Pattinson, M., Butavicius, M. and Jerram, C. (2014) A Study of Information Security Awareness in Australian Government Organizations. Information Management & Computer Security, 22, 334-345. https://doi.org/10.1108/imcs-10-2013-0078
[27]  Ngoqo, B. and Flowerday, S. (2015) Employee Perceptions of Insider Threats to Information Security: A Case Study. South African Journal of Information Management, 17, 1-9. https://doi.org/10.4102/sajim.v17i1.632

Full-Text


Contact Us

service@oalib.com

QQ:3279437679

WhatsApp +8615387084133