Behaviour of Outsourced Employees as Sources of Information System Security Threats

David Oyebisi, Kennedy Njenga

Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

Abstract

There is an increased need for information systems to be protected against unauthorized access and retrieval, particularly from legitimate ‘insider’ outsourced employees. While most studies have focused on organisations’ employees as threats, only a few have focused on the role the outsourced employees’ play as a potential threat. The study seeks to investigate the insider threat behaviour of an outsourced employee in developing countries as security threats to information systems by virtue of their privileged access. The study is quantitative and adopts social bond and involvement theories for this purpose. The research sample was chosen from organisations in Nigeria and South Africa which are the largest two national economies in Africa. Close-ended questionnaires were used and the data were analysed using factor analysis. The study found that outsourced employees exploit information systems vulnerabilities because they are not actively involved in the organisation and lack moral values and beliefs. The findings of this study will assist organisations in developing countries to mitigate the information security threats posed by outsourced employees.
Original languageEnglish
Title of host publication Financial Cryptography and Data Security
EditorsMatthew Bernhard, Andrea Bracciali, L. Jean Camp, Shin'ichiro Matsuo, Alana Maurushat, Peter B. Rønne, Massimiliano Sala
PublisherSpringer, Cham
Pages137-148
Number of pages12
ISBN (Electronic)9783030544553
ISBN (Print)9783030544546
DOIs
Publication statusPublished - 7 Aug 2020
Externally publishedYes
EventFC 2020 International Workshops, AsiaUSEC, CoDeFi, VOTING, and WTSC - , Malaysia
Duration: 14 Feb 202014 Feb 2020

Publication series

NameLecture Notes in Computer Science
PublisherSpringer
Volume12063
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

ConferenceFC 2020 International Workshops, AsiaUSEC, CoDeFi, VOTING, and WTSC
Country/TerritoryMalaysia
Period14/02/2014/02/20

Fingerprint

Dive into the research topics of 'Behaviour of Outsourced Employees as Sources of Information System Security Threats'. Together they form a unique fingerprint.

Cite this