IDEAS home Printed from https://ideas.repec.org/a/bjc/journl/v11y2024i10p540-546.html
   My bibliography  Save this article

Impediments to Cybersecurity Policy Implementation in Organisations: Case Study of Windhoek, Namibia

Author

Listed:
  • Iyaloo WAIGANJO

    (Faculty of Computing and Informatics Namibia University of Science and Technology (NUST))

  • Jude OSAKWE

    (Faculty of Computing and Informatics Namibia University of Science and Technology (NUST))

  • Ambrose AZETA

    (Faculty of Computing and Informatics Namibia University of Science and Technology (NUST))

Abstract

The increasing dependence on digital infrastructure has exposed organisations to heightened risks of cyber-attacks, necessitating the implementation of comprehensive cybersecurity policies. These policies aim to safeguard organisational data by establishing security requirements, ranging from acceptable use and access controls to incident response and encryption protocols. However, despite the critical importance of these policies, their effective implementation often encounters significant challenges. This study investigates the impediments to cybersecurity policy implementation within Namibian organizations, focusing on the perspectives of IT managers and employees. Using a qualitative research approach, interviews were conducted with 8 IT managers and 12 employees across various organisations to identify the key obstacles faced in adhering to and enforcing these policies. The findings reveal that the major impediments include a lack of executive and leadership support, challenges with compliance and policy adherence by employees, insufficient training and awareness, budget and resource constraints, poor communication, and the influence of human factors. This research underscores the need for a multifaceted approach to overcoming these impediments, emphasizing the importance of strong leadership, continuous and practical training, adequate resource allocation, and transparent communication. Building a cybersecurity culture within organizations is essential to mitigate these challenges and ensure the effective implementation of cybersecurity policies, thereby enhancing organizational resilience against cyber threats. The study recommends that future research should expand the sample size to include a more diverse group of participants from various organizations and sectors across Namibia. This broader representation would provide a more comprehensive understanding of the issues, reveal sector-specific challenges, and ensure that the findings are more generalizable across different industries and contexts.

Suggested Citation

  • Iyaloo WAIGANJO & Jude OSAKWE & Ambrose AZETA, 2024. "Impediments to Cybersecurity Policy Implementation in Organisations: Case Study of Windhoek, Namibia," International Journal of Research and Scientific Innovation, International Journal of Research and Scientific Innovation (IJRSI), vol. 11(10), pages 540-546, October.
  • Handle: RePEc:bjc:journl:v:11:y:2024:i:10:p:540-546
    as

    Download full text from publisher

    File URL: https://www.rsisinternational.org/journals/ijrsi/digital-library/volume-11-issue-10/540-546.pdf
    Download Restriction: no

    File URL: https://rsisinternational.org/journals/ijrsi/articles/impediments-to-cybersecurity-policy-implementation-in-organisations-case-study-of-windhoek-namibia/
    Download Restriction: no
    ---><---

    References listed on IDEAS

    as
    1. Hussain Aldawood & Geoffrey Skinner, 2019. "Reviewing Cyber Security Social Engineering Training and Awareness Programs—Pitfalls and Ongoing Issues," Future Internet, MDPI, vol. 11(3), pages 1-16, March.
    2. Li, Ling & He, Wu & Xu, Li & Ash, Ivan & Anwar, Mohd & Yuan, Xiaohong, 2019. "Investigating the impact of cybersecurity policy awareness on employees’ cybersecurity behavior," International Journal of Information Management, Elsevier, vol. 45(C), pages 13-24.
    Full references (including those not matched with items on IDEAS)

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Agbodoh-Falschau, Kouassi Raymond & Ravaonorohanta, Bako Harinivo, 2023. "Investigating the influence of governance determinants on reporting cybersecurity incidents to police: Evidence from Canadian organizations’ perspectives," Technology in Society, Elsevier, vol. 74(C).
    2. Han, Kookyoung & Choi, Jin Hyuk, 2023. "Implications of false alarms in dynamic games on cyber-security," Chaos, Solitons & Fractals, Elsevier, vol. 169(C).
    3. Naume Sonhera & David Mhlanga, 2022. "Reducing Cyber Incidents through Good Online Behavioral Norms: Lessons from South Africa," Eurasian Journal of Social Sciences, Eurasian Publications, vol. 10(1), pages 37-48.
    4. Bulbul Ahamed & Mohammad Rashed Hasan Polas & Ahmed Imran Kabir & Abu Saleh Md. Sohel-Uz-Zaman & Abdullah Al Fahad & Saima Chowdhury & Mrittika Rani Dey, 2024. "Empowering Students for Cybersecurity Awareness Management in the Emerging Digital Era: The Role of Cybersecurity Attitude in the 4.0 Industrial Revolution Era," SAGE Open, , vol. 14(1), pages 21582440241, February.
    5. Ou, Carol & Zhang, Xiaowei & Angelopoulos, Spyros & Davison, Robert & Janse, Noury, 2022. "Security breaches and organization response strategy : Exploring consumers’ threat and coping appraisals," Other publications TiSEM 9ac0c2eb-87e8-4c1d-a0b0-c, Tilburg University, School of Economics and Management.
    6. Canitgia Tambariki, 2024. "Drivers of banking consumers' cybersecurity behavior: Applying the extended protection motivation theory ," GATR Journals jmmr327, Global Academy of Training and Research (GATR) Enterprise.
    7. Guangxu Wang & Daniel Tse & Yuanshuo Cui & Hantao Jiang, 2022. "An Exploratory Study on Sustaining Cyber Security Protection through SETA Implementation," Sustainability, MDPI, vol. 14(14), pages 1-13, July.
    8. Ahu Ergen & Ahmet Naci Ünal & Mehmet Sıtkı Saygili, 2021. "Is It Possible to Change the Cyber Security Behaviours of Employees? Barriers and Promoters," Academic Journal of Interdisciplinary Studies, Richtmann Publishing Ltd, vol. 10, July.
    9. Saad Alahmari & Karen Renaud & Inah Omoronyia, 2023. "Moving beyond cyber security awareness and training to engendering security knowledge sharing," Information Systems and e-Business Management, Springer, vol. 21(1), pages 123-158, March.
    10. Wing Fung Chong & Runhuan Feng & Hins Hu & Linfeng Zhang, 2022. "Cyber Risk Assessment for Capital Management," Papers 2205.08435, arXiv.org, revised Jan 2025.
    11. Percia David, Dimitri & Maréchal, Loïc & Lacube, William & Gillard, Sébastien & Tsesmelis, Michael & Maillart, Thomas & Mermoud, Alain, 2023. "Measuring security development in information technologies: A scientometric framework using arXiv e-prints," Technological Forecasting and Social Change, Elsevier, vol. 188(C).
    12. Tahereh Hasani & Norman O’Reilly & Ali Dehghantanha & Davar Rezania & Nadège Levallet, 2023. "Evaluating the adoption of cybersecurity and its influence on organizational performance," SN Business & Economics, Springer, vol. 3(5), pages 1-38, May.
    13. Hameed, Irfan & Akram, Umair & Khan, Yamna & Khan, Naveed R. & Hameed, Imran, 2024. "Exploring consumer mobile payment innovations: An investigation into the relationship between coping theory factors, individual motivations, social influence and word of mouth," Journal of Retailing and Consumer Services, Elsevier, vol. 77(C).
    14. Berger, Allen N. & Öztekin, Özde & Roman, Raluca A., 2023. "Geographic deregulation and bank capital structure," Journal of Banking & Finance, Elsevier, vol. 149(C).
    15. Kim, Byung-Jik & Kim, Min-Jik, 2024. "The influence of work overload on cybersecurity behavior: A moderated mediation model of psychological contract breach, burnout, and self-efficacy in AI learning such as ChatGPT," Technology in Society, Elsevier, vol. 77(C).

    More about this item

    Statistics

    Access and download statistics

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:bjc:journl:v:11:y:2024:i:10:p:540-546. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Dr. Renu Malsaria (email available below). General contact details of provider: https://rsisinternational.org/journals/ijrsi/ .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.