USERS' AWARENESS OF AND PERCEPTION ON INFORMATION SECURITY ISSUES: A CASE STUDY OF KULLIYYAH OF ICT POSTGRADUATE STUDENTS

被引:5
作者
Hamid, Habiba [1 ]
Zeki, Akram M. [1 ]
机构
[1] Int Islamic Univ Malaysia, Dept Informat Syst, Kuala Lumpur, Malaysia
来源
3RD INTERNATIONAL CONFERENCE ON ADVANCED COMPUTER SCIENCE APPLICATIONS AND TECHNOLOGIES ACSAT 2014 | 2014年
关键词
Information security; Information security awareness; perception;
D O I
10.1109/ACSAT.2014.31
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Information security (IS) simply implies the protection and preservation of information; with its central purpose being to protect and preserve the confidentiality, integrity, and availability of information. It may also involve protecting and preserving the authenticity and reliability of information and ensuring that entities can be held accountable. Additionally, putting the educational setting such as International Islamic University Malaysia (IIUM) into consideration, information security awareness (ISA) implies educating the campus community about the inherent risks of the confidentiality, integrity, or availability of systems & data, and how all individuals/students can protect their systems & data. The purpose of this research therefore was to examine users' awareness of and perception on IS issues amongst the Kulliyyah of Information and Communication Technology (KICT) post graduate (PG) students of IIUM. To this end, data collection was elicited through the administration of questionnaires and interviews. Data analysis was performed by using the SPSS version 20 on the questionnaire and a qualitative study method that involved breaking the interview into themes was employed for the interview data by determining the commonality among their views.
引用
收藏
页码:139 / 144
页数:6
相关论文
共 30 条
[1]  
[Anonymous], 2008, Educational research planning, conducting, and evaluating quantitative and qualitative research
[2]  
[Anonymous], 2014, ISOIEC27001
[3]  
[Anonymous], 2007, QUAL INQ
[4]  
Apel M., 2009, 5 LCN WORKSH SEC COM
[5]  
Armendariz T., 2013, TOP 5 MALWARE THREAT
[6]  
Babar M A., 2011, TALE MIGRATION CLOUD
[7]  
Berg B.L, 2009, QUALITATIVE RES METH
[8]  
Cate F.H., 2008, Information security breaches: Looking back thinking ahead
[9]  
Daffern P., 2012, MOBILE BANKING IS MO
[10]  
Gil P., 2013, DEFINITION ANTIVIRUS