Botho University Repository

Study on Employee Information Security: Human Issue: Gaborone University College of Law and Professional Studies (GUC)

Show simple item record

dc.contributor.author Haingura, Thimbonde
dc.date.accessioned 2021-03-31T10:30:20Z
dc.date.available 2021-03-31T10:30:20Z
dc.date.issued 2019-07
dc.identifier.citation Haingura, T(2019)Study on Employee Information Security: Human Issue: Gaborone University College of Law and Professional Studies (GUC), Botho University , Botswana en_US
dc.identifier.uri http://repository.bothouniversity.ac.bw:8080/buir/handle/123456789/108
dc.description.abstract The purpose of the study was to establish the level Information Security among End User in order to address the Human issue and its impacts on Information Security (IS) in organizations. Human errors likely to result into excessive security breaches than technical vulnerabilities (Hinson, 2003). Notable human errors include, deleting wrong file by mistake, entering wrong value, pull out the wrong plug by mistake and configuration mistakes can leave the network ports open, firewall vulnerable and system completely unprotected (Hinson, 2003). Employee errors impact negatively on security controls such as firewalls and data protection policies adopted by the organization (Hadlington, 2018). Human issues are the major hindrance in achieving security goals such as maintaining confidentiality, insuring integrity, and assuring availability of information in an organization (Cherdentseva and Hilton 2013). It is also notable that employees who either work inside or outside the organization can compromise the essential characteristics of information such as Confidentiality, Integrity and Availability (CIA). Despite intense technical and physical security controls adopted by the organization, the availability of malicious and none malicious employee in an organization hinders the effectiveness of counter measures adopted to protect information (Greitzer and Hohimer, 2011). A none malicious employee is an employee who is not aware of security controls adopted by the organization and lack efficiency to protect data from threats but instead create security loopholes which can exploited by an attacker. A malicious employee has the motive to disrupt, steal information, bypass processes and procedures. However, none technical security counter measures such as security awareness, training and organizational policy implementation can be used to mitigate internal threats (Cherdentseva and Hilton 2013). In order to understand the human issue information security, the research study adopted theoretical research models such as Protection Motivation Theory (PMT), Technology Acceptance Model (TAM) and Theory of Planned Behavior (TPB) Shenbagaraman 2016). The research population included Lectures and Administrative personnel in the organization. The independent variable included employee behavior, attitude and knowledge which were measured against dependent variables such as password usage, email usage, knowledge on malicious protection and security controls in the organization. Quantitative research methodology was adopted because data collected was translated into figures for further analysis. A questionnaire of 33 questions were distributed to 32 participants to collect data. The survey found out that some employee engages in risk behavior such as sharing password, using the same password to log in different systems or applications. Some employee in the organization also lack knowledge on threat to information security and are not security conscious to online cyber scams. en_US
dc.publisher Botho University en_US
dc.subject Information Security en_US
dc.subject Information Systems Awareness, en_US
dc.subject Social Engineering, en_US
dc.subject outsider threat en_US
dc.title Study on Employee Information Security: Human Issue: Gaborone University College of Law and Professional Studies (GUC) en_US
dc.type Thesis en_US


Files in this item

This item appears in the following Collection(s)

Show simple item record

Search BU Repository


Advanced Search

Browse

My Account