Mitigating Insider Threats: Insights from Software Security Experts for Process Improvement and Risk Reduction

  • Dr Azzah Alghamdi
  • , Mahmood Niazi*
  • , Lucas Carvalho Cordeiro
  • , Mamoona Humayun
  • , Andrew Stewart
  • *Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Context: Developing secure environments to mitigate insider threats is gaining popularity across various industrial domains. Organizations are unprepared and unfamiliar with this new genre of insider threats because research on the fundamental security practices required for developing secure environments is lacking.Objective: This study examines how software security experts perceive the effectiveness of best practices for improving the mitigating process of insider threats.Method: A systematic literature review (SLR) and a survey of 76 security practitioners from 74 countries, spanning 13 primary business functions of organizations and four distinct types of industries, were conducted to rate the effectiveness of the practices in mitigating insider threats.Results: Four key knowledge areas of secure environments against insider threats (compliance, top management, human resources (HR), and information technology (IT)) and the associated best practices for each knowledge area were identified. The survey results provide insight into the importance of each practice within the knowledge areas. The findings suggest potential implications of the best practices for improving the mitigating process of insider threats in future software projects.Conclusion: This study provides critical and timely insights into fundamental practices in order to improve the mitigation process of insider threats and educates software engineering professionals and researchers on the challenges and solutions for insider threats.

Original languageEnglish
Title of host publicationProceedings of the 29th International Conference on Evaluation and Assessment in Software Engineering , EASE, 2025 edition, EASE Companion 2025
EditorsMuhammad Ali Babar, Ayse Tosun, Stefan Wagner, Viktoria Stray
PublisherAssociation for Computing Machinery, Inc
Pages41-48
Number of pages8
ISBN (Electronic)9798400718328
DOIs
StatePublished - 23 Dec 2025
Event29th International Conference on Evaluation and Assessment of Software Engineering, EASE 2025 - Istanbul, Turkey
Duration: 17 Jun 202520 Jun 2025

Publication series

NameProceedings of the 29th International Conference on Evaluation and Assessment in Software Engineering , EASE, 2025 edition, EASE Companion 2025

Conference

Conference29th International Conference on Evaluation and Assessment of Software Engineering, EASE 2025
Country/TerritoryTurkey
CityIstanbul
Period17/06/2520/06/25

Bibliographical note

Publisher Copyright:
© 2025 Copyright held by the owner/author(s).

Keywords

  • Best practices
  • Insider threats
  • Knowledge areas
  • Survey
  • Systematic literature review

ASJC Scopus subject areas

  • Software

Fingerprint

Dive into the research topics of 'Mitigating Insider Threats: Insights from Software Security Experts for Process Improvement and Risk Reduction'. Together they form a unique fingerprint.

Cite this