142 Countermeasures of Unintentional Insider Threats: A Systematic Review Zainab A.A.Abdelsadeq 1 , Nurlida Basir 1 , Syaril Nizam Omar 1 , Nur Fatin Nabila Binti Mohd Rafei Heng 1 1 Information Security & Assurance Department, Faculty of Science and Technology, Universiti Sains Islam Malaysia (USIM), 71800 Nilai, Negeri Sembilan, Malaysia Email: E-mail: zainab_mandalyna@yahoo.com Abstract.The majority of the organizations see technical controls as the solution to their problems around information security. Moreover, it was obviously proved with providing all of these technological techniques that errors of human are not avoidable Unintentional Insider Threats (UIT) are the biggest insider risk of all, which defined as an employee former/current, business partner or contractor who had/ has access authority to the network, system or data of an organization and who, without malicious intent, damages the organization's information or information systems through action or inaction. Thus the objective of this paper is to; determine the countermeasures of UITs have been reported in the literature. This paper achieves a structured literature review of a wide collection of existing literature on UITs countermeasures. The review of literature identified a group of significant countermeasures against UITs which Can be used for improve organizations’ security policy for reducing and minimizing reducing the risks connected to UITs. Keyword: Unintentional Insider Threats Countermeasures; Human Errors Mitigation. Introduction Many people still believe that handling the management of information security is a technology matter [1]. [2] Stated that 80 per cent of violations of information security are caused by error of human. The study of [3] revealed that the entry of bad data by employees, accidental loss of data, and viruses of computer, were the major threats in the environment of microcomputer. Moreover, employees' unauthorized access to system and data by the unintentional entry of bad data and poor duties segregation were considered as the main threats to the mid range the environment of computer and the errors of human as the top ranked security threats [4], [5].The aim of this work is to; determine the countermeasures of UITs have been reported in the literature. Material and methods The study adopted the desk research. A critical review of a wide collection of existing literature for the past years (2002 to 2020) on UIT countermeasures was conducted. Data for this study was collected from the Internet. To achieve this review of literature the proposed approach by [6] were utilized and it was achieved as proposed by [7] through retrieving, determining and classifying the literature published on the UIT countermeasures. The guidelines suggested by [8], [9] were used in process and synthesis techniques. A conceptual analysis and systematic review of the previous literature was carried out to identify an area of research concerning UIT countermeasures. Further, it was possible to identify specific mitigation techniques to generating a variety of possible solutions to reduce the risks of UIT. Results and discussions This study concluded a set of techniques, methods, and tools used to mitigate the risks of UIT which are listed as the following: Automation