Information security issues in educational institutions

被引:0
作者
Imbaquingo Esparza, Daisy Elizabeth [1 ]
Javier Diaz, Francisco [1 ]
Saltos Echeverria, Tatyana Katherine [2 ]
Arciniega Hidrobo, Silvia Rosario [2 ]
Leon Villavicencio, Diego Andres [2 ]
Robayo Ordonez, Adrian [2 ]
机构
[1] Univ Nacl La Plata, Inst Posgrad, La Plata, Argentina
[2] Univ Tecn Norte, Fac Ingn Ciencias Aplicadas, Carrera Ingn Sistemas Computac, Ibarra, Ecuador
来源
2020 15TH IBERIAN CONFERENCE ON INFORMATION SYSTEMS AND TECHNOLOGIES (CISTI'2020) | 2020年
关键词
organizational culture; information security; higher education institutions; AWARENESS; SYSTEMS; GOVERNANCE; IMPACT;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The information is currently constituted as an asset within the institutions, whether public or private, and with the technological advance the security of this information is put at risk, due to the set of threats that are presented on the Internet, many of the institutions have tools to prevent these risks. The present work is a systematic review of literature (SRL) on the problems that arise in information security in Higher Education also security measures used to protect it and the tools that are used to detect and battle informatic attacks. For the effect, 35 scientific articles from the last five years were investigated, analyzed and compiled, extracted from four most relevant libraries, being these: ScienceDirect, Taylor & Francis, Esmerald Group Publishing y AIS eLibrary. These scientific articles answer four questions posed within the bibliographic research that was carried out. With the results obtained, it was possible to identify the security issues, the policies and therefore the existing relationship of these factors with the organizational culture and, in that way safeguard the security of information in HEIs.
引用
收藏
页数:7
相关论文
共 43 条
[1]   A safety/security risk analysis approach of Industrial Control Systems: A cyber bowtie - combining new version of attack tree with bowtie analysis [J].
Abdo, H. ;
Kaouk, M. ;
Flaus, J. -M. ;
Masse, F. .
COMPUTERS & SECURITY, 2018, 72 :175-195
[2]   Improving information security awareness and behaviour through dialogue, participation and collective reflection. An intervention study [J].
Albrechtsen, Eirik ;
Hoyden, Jan .
COMPUTERS & SECURITY, 2010, 29 (04) :432-445
[3]  
Alhogail A. R. E. E. J., 2014, J THEOR APPL INF TEC, V64
[4]   Assessing information security risks in the cloud: A case study of Australian local government authorities [J].
Ali, Omar ;
Shrestha, Anup ;
Chatfield, Akemi ;
Murray, Peter .
GOVERNMENT INFORMATION QUARTERLY, 2020, 37 (01)
[5]  
Angell I. O., 1993, Proceedings of COMPSEC International 1993, P382
[6]  
[Anonymous], 2018, ESET SECURITY REPORT
[7]  
Bair J., 2018, SEEK TRUTH MOB EVID, P283
[8]   Determinants of early conformance with information security policies [J].
Belanger, France ;
Collignon, Stephane ;
Enget, Kathryn ;
Negangard, Eric .
INFORMATION & MANAGEMENT, 2017, 54 (07) :887-901
[9]   Computer security impaired by legitimate users [J].
Besnard, D ;
Arief, B .
COMPUTERS & SECURITY, 2004, 23 (03) :253-264
[10]   An economic modelling approach to information security risk management [J].
Bojanc, Rok ;
Jerman-Blazic, Borka .
INTERNATIONAL JOURNAL OF INFORMATION MANAGEMENT, 2008, 28 (05) :413-422