Impact of Excessive Access Permissions and Insider Threat Opportunity in the Financial Industry: A Qualitative Study

Impact of Excessive Access Permissions and Insider Threat Opportunity in the Financial Industry: A Qualitative Study

Azucena Quispe
Copyright: © 2018 |Volume: 9 |Issue: 3 |Pages: 27
ISSN: 1947-3095|EISSN: 1947-3109|EISBN13: 9781522545309|DOI: 10.4018/IJSITA.2018070103
Cite Article Cite Article

MLA

Quispe, Azucena. "Impact of Excessive Access Permissions and Insider Threat Opportunity in the Financial Industry: A Qualitative Study." IJSITA vol.9, no.3 2018: pp.32-58. http://doi.org/10.4018/IJSITA.2018070103

APA

Quispe, A. (2018). Impact of Excessive Access Permissions and Insider Threat Opportunity in the Financial Industry: A Qualitative Study. International Journal of Strategic Information Technology and Applications (IJSITA), 9(3), 32-58. http://doi.org/10.4018/IJSITA.2018070103

Chicago

Quispe, Azucena. "Impact of Excessive Access Permissions and Insider Threat Opportunity in the Financial Industry: A Qualitative Study," International Journal of Strategic Information Technology and Applications (IJSITA) 9, no.3: 32-58. http://doi.org/10.4018/IJSITA.2018070103

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

The purpose of this qualitative, exploratory research study was to gain insights into the correlations between: (a) security threats related to the dangers of excessive access permissions in information systems (IS); and (b) the potential risk exposure to insider threat in the financial sector. The study examined the vulnerability risk to insider threats from the view of the possible connection to excessive access permissions which represent a gap in the literature. The central research question of the study was: What are the determinants that influence the applicability of internal security controls such as segregation of duties (SoD), the least privilege principle, the need-to-know concept and the relationship between access permissions and insider threat in IS? A sample of 15 financial sector professionals that included business users, IT personnel, and certified fraud examiners were interviewed to answer the central research question.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.