Skip to main content

Inclination of Insider Threats’ Mitigation and Implementation: Concurrence View from Malaysian Employees

  • Conference paper
  • First Online:
Knowledge Management in Organizations (KMO 2018)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 877))

Included in the following conference series:

  • 2820 Accesses

Abstract

The aim of this paper is to discuss on the insider threat risks and challenges which have been the biggest problem to most organisations. The survey has gauged the employees’ agreements level of recommended practices derived from the “Common Sense Guide to Mitigating Insider Threats” produced by the Software Engineering Institute, Carnegie Mellon University (SEI-CMU). The available research works by Computer Emergency Response Team at Carnegie-Mellon University (CERT) offered an effective and possible approach towards identifying the insider threats risk and challenges by identifying feasible activity for implementation as part of a review process within organisation. The respondents indicate that majority of the companies in Malaysia who participated in the survey are basically agreeable to it and currently implementing the recommended practices. The results suggested that most companies are aware of the threats and ready for effective countermeasures. Three factors i.e. motive, method and opportunity must be recognised, identified and suppressed within the organization boundary. As a conclusion, this research could assist organization to understand the general acceptance of the respondents towards suggested practices and it could be some important facts that finding effective way to implement best practices are the demand for further research.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Cappelli, D., Moore, A., Trzeciak, R., Shimeall, T.J.: Common Sense Guide to Prevention and Detection of Insider Threats. CERT, January 2009. http://www.cert.org/archive/pdf/CSG-V3.pdf. Accessed 20 June 2011

  2. Bishop, M.: Position: Insider is Relative. University of California at Davis. http://www.nspw.org/papers/2005/nspw2005-bishop-pos.pdf. Accessed 01 Sept 2013

  3. Bishop, M., Gates, C.: Defining the Insider Threat. University of California at Davis, CA Labs

    Google Scholar 

  4. von Roessing, R.M.: The business model for information security. ISACA© 2010

    Google Scholar 

  5. Green, C.H.: Understanding the Trust Equation. http://trustedadvisor.com. Accessed 19 Sept 2013

  6. NSF-OIG: Possible Grant Fraud Indicator Handbook. http://www.cert.org/blogs/insider_threat. Accessed 10 Sept 2013

  7. Lee, A.J., Yu, T.: Towards a Dynamic and Composite Model of Trust (2009)

    Google Scholar 

  8. Ponemon Institute LLC & Symantec: 2011 Cost of Data Breach Study Report, March 2012

    Google Scholar 

  9. Lynch, D.M.: Securing Against Insider Attacks, November 2006

    Google Scholar 

  10. Randazzo, M.R., Cappelli, D.M., Keeney, M.M., Moore, A.P., Kowalski, E.F.: Insider Threat Study: Illicit Cyber Activity in the Banking and Finance Sector. CERT® Coordination Center National Threat Assessment Center Software Engineering Institute United States Secret Service Carnegie Mellon University, August 2004

    Google Scholar 

  11. CISCO System: Data Leakage Worldwide: The High Cost of Insider Threats (2006)

    Google Scholar 

  12. Hong, J., Kim, J.: The Trend of the Security Research for Insider Cyber Threat, June 2010

    Google Scholar 

  13. Pfleeger, S.L., Predd, J.B., Hunker, J., Bulford, C.: Insiders Behaving Badly: Addressing Bad Actors and Their Actions, March 2010

    Google Scholar 

  14. Covey, S.M.R.: The Speed of Trust, p. 13 (2006)

    Google Scholar 

Download references

Acknowledgment

This research funded by Ministry of Higher Education under Transdisciplinary Research Grant Scheme TRGS/1/2016/PBPI-CTED/02 and support by Universiti Teknikal Malaysia Melaka.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mohd Nazer Apau .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Apau, M.N., Sedek, M., Ahmad, R. (2018). Inclination of Insider Threats’ Mitigation and Implementation: Concurrence View from Malaysian Employees. In: Uden, L., Hadzima, B., Ting, IH. (eds) Knowledge Management in Organizations. KMO 2018. Communications in Computer and Information Science, vol 877. Springer, Cham. https://doi.org/10.1007/978-3-319-95204-8_29

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-95204-8_29

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-95203-1

  • Online ISBN: 978-3-319-95204-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics