Zainab Abdelsadeq - Academia.edu (original) (raw)

Zainab Abdelsadeq

Related Authors

Andrew Moore

Andrew Moore

University of Pittsburgh/Carnegie Mellon Univeristy

Ivan Homoliak

CUT mmuhonde

Mathew Nicho

Frank Greitzer

Uploads

Papers by Zainab Abdelsadeq

Research paper thumbnail of Countermeasures of Unintentional Insider Threats: A Systematic Review

The majority of the organizations see technical controls as the solution to their problems around... more The majority of the organizations see technical controls as the solution to their problems around information security. Moreover, it was obviously proved with providing all of these technological techniques that errors of human are not avoidable Unintentional Insider Threats (UIT) are the biggest insider risk of all, which defined as an employee former/current, business partner or contractor who had/ has access authority to the network, system or data of an organization and who, without malicious intent, damages the organization's information or information systems through action or inaction. Thus the objective of this paper is to; determine the countermeasures of UITs have been reported in the literature. This paper achieves a structured literature review of a wide collection of existing literature on UITs countermeasures. The review of literature identified a group of significant countermeasures against UITs which Can be used for improve organizations’ security policy for redu...

Research paper thumbnail of Unintentional Insider Threats Countermeasures Model (UITCM)

2019 International Conference on Cybersecurity (ICoCSec), 2019

Most organisations see technological controls as the solution to their information security probl... more Most organisations see technological controls as the solution to their information security problems. However, with all these technologies, it was evidently investigated that human errors are unavoidable.Unintentional insider is the biggest insider threat of all.Thus the objective of this paper is to propose a conceptual model as a countermeasure towards unintentional insider threats The proposed model in this research was adapted from (Generic Mitigation Strategies for Information Leaks) developed by Wan (2018) and (2019), It was expanded by combining it with UIT Mitigation Strategies and Countermeasures recommendations mentioned by previous studies.

Research paper thumbnail of Study of the Availability and Awareness of E-services in Higher Education in Libya

ABSTRACT A survey was conducted to examine Libyan student's adoption and use of the natio... more ABSTRACT A survey was conducted to examine Libyan student's adoption and use of the national Libyan e -services in higher education. Accordingly, the findings obtained from the data analysis were discussed .The reliability test was confirmed a Cronbach's alpha above (0.90). Findings from descriptive statistics showed that all the study factors were related strongly. This study concluded that the respondents reported high percent of 'agree' answers to the factors included in the study to examine the adoption of the e –services. Estimation of the demographic differences employing the Pearson chi-square test revealed that the e-services adopters in higher education in Libya differ significantly in terms of gender, professional background and education level and the correlation was very high between them. This study confirmed that a significant number of participants (84.1%) proved to be aware of e-government services. Only (42%) of participants' answers agreed that there is a necessity services introduced by e-government. Meanwhile, a significant number of the participants (603 of participants' answers) think that the e-government does not introduce a necessity service via its website.

Research paper thumbnail of Bait and (S)witch

Research paper thumbnail of Countermeasures of Unintentional Insider Threats: A Systematic Review

The majority of the organizations see technical controls as the solution to their problems around... more The majority of the organizations see technical controls as the solution to their problems around information security. Moreover, it was obviously proved with providing all of these technological techniques that errors of human are not avoidable Unintentional Insider Threats (UIT) are the biggest insider risk of all, which defined as an employee former/current, business partner or contractor who had/ has access authority to the network, system or data of an organization and who, without malicious intent, damages the organization's information or information systems through action or inaction. Thus the objective of this paper is to; determine the countermeasures of UITs have been reported in the literature. This paper achieves a structured literature review of a wide collection of existing literature on UITs countermeasures. The review of literature identified a group of significant countermeasures against UITs which Can be used for improve organizations’ security policy for redu...

Research paper thumbnail of Unintentional Insider Threats Countermeasures Model (UITCM)

2019 International Conference on Cybersecurity (ICoCSec), 2019

Most organisations see technological controls as the solution to their information security probl... more Most organisations see technological controls as the solution to their information security problems. However, with all these technologies, it was evidently investigated that human errors are unavoidable.Unintentional insider is the biggest insider threat of all.Thus the objective of this paper is to propose a conceptual model as a countermeasure towards unintentional insider threats The proposed model in this research was adapted from (Generic Mitigation Strategies for Information Leaks) developed by Wan (2018) and (2019), It was expanded by combining it with UIT Mitigation Strategies and Countermeasures recommendations mentioned by previous studies.

Research paper thumbnail of Study of the Availability and Awareness of E-services in Higher Education in Libya

ABSTRACT A survey was conducted to examine Libyan student's adoption and use of the natio... more ABSTRACT A survey was conducted to examine Libyan student's adoption and use of the national Libyan e -services in higher education. Accordingly, the findings obtained from the data analysis were discussed .The reliability test was confirmed a Cronbach's alpha above (0.90). Findings from descriptive statistics showed that all the study factors were related strongly. This study concluded that the respondents reported high percent of 'agree' answers to the factors included in the study to examine the adoption of the e –services. Estimation of the demographic differences employing the Pearson chi-square test revealed that the e-services adopters in higher education in Libya differ significantly in terms of gender, professional background and education level and the correlation was very high between them. This study confirmed that a significant number of participants (84.1%) proved to be aware of e-government services. Only (42%) of participants' answers agreed that there is a necessity services introduced by e-government. Meanwhile, a significant number of the participants (603 of participants' answers) think that the e-government does not introduce a necessity service via its website.

Research paper thumbnail of Bait and (S)witch

Log In