Should we wear a velvet glove to enforce Information security policies in higher education?

被引:0
|
作者
Kam, Hwee-Joo [1 ]
Kim, Dan J. [2 ]
He, Wu [3 ]
机构
[1] Univ Tampa, Sykes Coll Business, Tampa, FL 33606 USA
[2] Univ North Texas, G Brint Ryan Coll Business, Informat Technol & Decis Sci, Denton, TX 76203 USA
[3] Old Dominion Univ, Strome Coll Business, Dept Informat Technol & Decis Sci, Norfolk, VA USA
关键词
Higher education; information security management; IT governance framework;
D O I
10.1080/0144929X.2021.1917659
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The United States higher education is facing a unique challenge in information security management due to its distinctive characteristics, such as decentralised structure, academic freedom, and shared governance. These characteristics sharply distinguish higher education from traditional corporations. Gradually, this is beginning to pose a challenge for higher education institutions to adopt the appropriate information technology governance framework, which, for traditional corporations, mostly addresses security governance and leadership in a top-down manner. To address this issue, we examine the effect of perceived information security management approaches on perceived security practices. Our results show that the perceived flexible-oriented approach of information security management is more effective to use in implementing security controls in high education institutions. This seems to contradict most of the findings in the literature that suggest that a control-oriented approach is more effective in enforcing information security policies. Research contributions and implications are discussed, accordingly.
引用
收藏
页码:2245 / 2259
页数:15
相关论文
共 15 条
  • [1] Information security policies' compliance: a perspective for higher education institutions
    Hina, Sadaf
    Dominic, P. Dhanapal Durai
    JOURNAL OF COMPUTER INFORMATION SYSTEMS, 2020, 60 (03) : 201 - 211
  • [2] Information Security Issues in Higher Education
    Mantykangas, Arja
    ELEARNING CHALLENGES AND NEW HORIZONS, VOL 4, 2018, : 378 - 381
  • [3] Evaluating the explanatory power of theoretical frameworks on intention to comply with information security policies in higher education
    Rajab, Majed
    Eydgahi, Ali
    COMPUTERS & SECURITY, 2019, 80 : 211 - 223
  • [4] Policies for Higher Education Institutions in Electrical and Information Engineering
    Cojocaru, Dorian
    Popescu, Dorin
    Tanasie, Razvan Tudor
    2013 PROCEEDINGS OF THE 24TH ANNUAL CONFERENCE ON EUROPEAN ASSOCIATION FOR EDUCATION IN ELECTRICAL AND INFORMATION ENGINEERING (EAEEIE), 2013, : 187 - 192
  • [5] Information security awareness in higher education: An exploratory study
    Rezgui, Yacine
    Marks, Adam
    COMPUTERS & SECURITY, 2008, 27 (7-8) : 241 - 253
  • [6] Factor Analysis on Information Security Management in Higher Education Institutions
    Sari, Puspita Kencana
    Nurshabrina, Nadiailhaq
    Candiwan
    2016 4TH INTERNATIONAL CONFERENCE ON CYBER AND IT SERVICE MANAGEMENT, 2016, : 80 - 84
  • [7] Information Security in Virtual Social Networks: A Survey in Higher Education
    Lopes, Isabel Maria
    Pereira, Joao Paulo
    RECENT ADVANCES IN INFORMATION SYSTEMS AND TECHNOLOGIES, VOL 2, 2017, 570 : 774 - 782
  • [9] On the relationship between society and higher education: what path should we take?
    Marquez-Ramos, Laura
    Mourelle, Estefania
    DISTANCE EDUCATION, 2018, 39 (01) : 19 - 36
  • [10] INFORMATION SECURITY AWARNESS IN DIFFERENT HIGHER EDUCATION CONTEXTS A Comparative Study
    Marks, Adam
    Rezgui, Yacine
    ICEIS 2010: PROCEEDINGS OF THE 12TH INTERNATIONAL CONFERENCE ON ENTERPRISE INFORMATION SYSTEMS, VOL 5: HUMAN-COMPUTER INTERACTION, 2010, : 215 - 222