108 research outputs found

    Security by Compliance? A Study of Insider Threat Implications for Nigerian Banks

    Get PDF

    Traffic Forensics for IPv6-Based Wireless Sensor Networks and the Internet of Things

    Get PDF

    A Reference Implemenation for RPL Attacks Using Contiki-NG and COOJA

    Get PDF

    Exploration of the Complex Ontology

    Get PDF

    Hacking a bridge:An exploratory study of compliance-based information security management in banking organization

    Get PDF
    This work is approached through the lens of compliant security by drawing on the concepts of neutralization theory, a prominent postulation in the criminology domain and the 'big five' personality construct. This research is conducted based on a case study of ISO/IEC27001 Standard certified banks, to empirically evaluate the link between cybersecurity protocols violation and how employees rationalise security behaviour. We propose that compliance-based security has the propensity for a heightened sense of false security and vulnerability perception; by showing that systemic security violation in compliance-based security models can be explained by the level of linkages from the personality construct and the neutralization theory. Building on the survey responses from banking organization employees and the application of partial least square structural equation modelling (PLS-SME) analysis to test the hypotheses and validate survey samples, we draw a strong inference to support the importance of individual security scenario effect as a vital complementary element of compliance-based security. Based on our initial findings, conceptual principles and practical guidelines for reducing insider threats and improving employees' compliance is presented. We then suggest how information security protocol violations can be addressed in that context
    corecore