CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

The Need for Effective Information Security Awareness in Private Financial Company: Case from Libya

by Salima Benqdara
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 184 - Number 51
Year of Publication: 2023
Authors: Salima Benqdara
10.5120/ijca2023922640

Salima Benqdara . The Need for Effective Information Security Awareness in Private Financial Company: Case from Libya. International Journal of Computer Applications. 184, 51 ( Mar 2023), 29-37. DOI=10.5120/ijca2023922640

@article{ 10.5120/ijca2023922640,
author = { Salima Benqdara },
title = { The Need for Effective Information Security Awareness in Private Financial Company: Case from Libya },
journal = { International Journal of Computer Applications },
issue_date = { Mar 2023 },
volume = { 184 },
number = { 51 },
month = { Mar },
year = { 2023 },
issn = { 0975-8887 },
pages = { 29-37 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume184/number51/32653-2023922640/ },
doi = { 10.5120/ijca2023922640 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T01:24:36.606712+05:30
%A Salima Benqdara
%T The Need for Effective Information Security Awareness in Private Financial Company: Case from Libya
%J International Journal of Computer Applications
%@ 0975-8887
%V 184
%N 51
%P 29-37
%D 2023
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The increase in cyber-attacks causes individuals and businesses to face financial loss and reputation damage. Most studies in information security ignore human factors and focus only on information security technological countermeasures, while the security culture of employees is vital for financial organizations. Financial organizations need to ensure that the interaction between employees and the information security system, contributes to the protection of information assets. The purpose of this study is to assess the security gap between how far technology has advanced and how much employees are aware of it. The study indicated that there is a serious problem with information security awareness in private financial organizations. The study concluded that the overall information security awareness of private financial organizations is not favorable to the protection of information assets. There is no appropriate foundation for defining how information security should manage in private financial organizations and the risk identification process. The study recommended that private financial organizations should implement information security awareness and training programs and implement a formal information security policy that aids in addressing threats on the technical, process, and people levels.

References
  1. Blythe, J. 2013. Cyber security in the workplace: Understanding and promoting behavior change. In Proceedings of CHItaly Doctoral Consortium, 92-101.
  2. He, W., Ash, I., Anwar, M., Li, L., Yuan, X., Xu, L., and Tian, X., 2019. Improving employees’ intellectual capacity for cybersecurity through evidence-based malware training. Journal of Intellectual Capital.
  3. Bulgurcu, B., Cavusoglu, H., and Benbasat, I.2010. Information Security Policy Compliance: An Empirical Study of Rationality-Based Beliefs and Information Security Awareness. MIS Quarterly. 34(3), 523-548.
  4. Watters, P. A., and Ziegler, J.2016. Controlling information behavior: the case for access control. Behavior & Information Technology. 35(4), 268-276.
  5. Hina, S., and Dominic, D. D.2018. Information security policies’ compliance: a perspective for higher education institutions. Journal of Computer Information Systems. 60(3), 1-11.
  6. Johnson, M. E., and Goetz, E. 2007. Embedding information security into the organization. IEEE Security & Privacy, 5(3).
  7. Li, L., He, W., Xu, L., Ash, I., Anwar, M., and Yuan, X. 2019. Investigating the impact of cybersecurity policy awareness on employees’ cybersecurity behavior. International Journal of Information Management.Vol 45, 13- 24.
  8. Accenture. 2019. Cost of Cybercrime, Study. https://www.accenture.com/us-en/insights/security/costcybercrime-study
  9. Adam, A., Catherine, G., Edison, W. 2023. Factors Affecting the Security of Information Systems: A Literature Review. The International Journal of Engineering and Science (IJES). Vol10 (1), 57-65.
  10. Salima, B., Almabruk, S., and Awad,E . 2020. Assessment of Security Issues in Banking Sector of Libya. International Journal of Computer Applications. Vol 176 (13), 975 – 8887.
  11. Salima, B., and Abdelfattah, M.2019. Wireless Security in Libya: A Survey Paper. International Journal of Computer Applications. 181(35),26-31.
  12. Shanfari, A.l., Warusia, Y., Nasser, T., Roesnita, I. and Anuar, I.2022. Determinants of Information Security Awareness and Behavior Strategies in Public Sector Organizations among Employees. (IJACSA) International Journal of Advanced Computer Science and Applications. Vol. 13(8).
  13. Emad, S. 2022.Vulnerability of Saudi Private Sector Organizations to Cyber Threats and Methods to Reduce the Vulnerability. Pertanika J. Sci. & Technol. 30 (3): 1909 - 1926.
Index Terms

Computer Science
Information Sciences

Keywords

Information security Information security awareness Information systems Information security management.