Author:
Al-Harrasi Abir,Shaikh Abdul Khalique,Al-Badi Ali
Abstract
Purpose
One of the most important Information Security (IS) concerns nowadays is data theft or data leakage. To mitigate this type of risk, organisations use a solid infrastructure and deploy multiple layers of security protection technology and protocols such as firewalls, VPNs and IPsec VPN. However, these technologies do not guarantee data protection, and especially from insiders. Insider threat is a critical risk that can cause harm to the organisation through data theft. The main purpose of this study was to investigate and identify the threats related to data theft caused by insiders in organisations and explore the efforts made by them to control data leakage.
Design/methodology/approach
The study proposed a conceptual model to protect organisations’ data by preventing data theft by malicious insiders. The researchers conducted a comprehensive literature review to achieve the objectives of this study. The collection of the data for this study is based on earlier studies conducted by several researchers from January 2011 to December 2020. All the selected literature is from journal articles, conference articles and conference proceedings using various databases.
Findings
The study revealed three main findings: first, the main risks inherent in data theft are financial fraud, intellectual property theft, and sabotage of IT infrastructure. Second, there are still some organisations that are not considering data theft by insiders as being a severe risk that should be well controlled. Lastly, the main factors motivating the insiders to perform data leakage activities are financial gain, lack of fairness and justice in the workplace, the psychology or characteristics of the insiders, new technologies, lack of education and awareness and lack of management tools for understanding insider threats.
Originality/value
The study provides a holistic view of data theft by insiders, focusing on the problem from an organisational point of view. Organisations can therefore take into consideration our recommendations to reduce the risks of data leakage by their employees.
Subject
Organizational Behavior and Human Resource Management,Strategy and Management
Reference35 articles.
1. Cyber risk assessment in cloud provider environments: current models and future needs;Computers and Security,2019
2. A secret-key image steganography technique using random chain codes;International Journal of Technology,2019
3. Data theft? Cybercrime and the increasing criminalization of access to data”, In;Criminal Law Forum,2011
4. On data leakage from non-production systems;Information and Computer Security,2017
5. Perceived contract violation and job satisfaction: buffering roles of emotion regulation skills and work-related self-efficacy;International Journal of Organizational Analysis,2020
Cited by
18 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献