Information security awareness: Preliminary studies amongst academicians at Universiti Utara Malaysia

Information security is vital to any organization.It holds the reputation as well as the image carried by the organization.Information security does not come in a package.It takes a culmination of people, process and technology.However, people are often overlooked as part of security components.Focu...

Full description

Saved in:
Bibliographic Details
Main Author: Zakaria, Nur Haryani
Format: Monograph
Language:English
English
Published: Universiti Utara Malaysia 2005
Subjects:
Online Access:http://repo.uum.edu.my/7586/1/Nha.pdf
http://repo.uum.edu.my/7586/4/1.Nur%20Haryani%20Zakaria.pdf
http://repo.uum.edu.my/7586/
http://lintas.uum.edu.my:8080/elmu/index.jsp?module=webopac-l&action=fullDisplayRetriever.jsp&szMaterialNo=0000232773
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Universiti Utara Malaysia
Language: English
English
Description
Summary:Information security is vital to any organization.It holds the reputation as well as the image carried by the organization.Information security does not come in a package.It takes a culmination of people, process and technology.However, people are often overlooked as part of security components.Focus is more given towards implementing the latest technologies and products, such as firewalls, intrusion detection systems and the toughest encryption techniques.Having in mind that all these are able to provide strong protection, leaving people (employees of the organization) behind is not a good idea. There are many researchers who recognized the significance of information security awareness area.However, only few scientific studies have considered this area in depth.It is due to the fact that it falls outside the scope of traditional “hard” computer science.Taking this as a point of departure, this research focused on the human factor as one of the important security component.Current works related to information security awareness are presented together with selected models and frameworks.Survey and interviews was chosen as a method to obtain data and analysis was done from the compilation of the data gathered.Findings of the study revealed an interesting scenario of the perceptions and common practices of respondents in the case study.Conclusions are derived at the end of the research suggests the level of respondents’ awareness towards information security issues.