2021
DOI: 10.1016/j.jjimei.2021.100015
|View full text |Cite
|
Sign up to set email alerts
|

An exploratory prioritization of factors affecting current state of information security in Pakistani university libraries

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
8
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 20 publications
(8 citation statements)
references
References 25 publications
0
8
0
Order By: Relevance
“…Doing this allows capturing different socioeconomic classes in the country. This study gauges the cybersecurity behavior of the students in a broader context of computer and smartphone security as a whole hence extending the work of Khan et al ( 2021 ) in which only computer security was measured.…”
Section: Theoretical Backgroundmentioning
confidence: 71%
See 3 more Smart Citations
“…Doing this allows capturing different socioeconomic classes in the country. This study gauges the cybersecurity behavior of the students in a broader context of computer and smartphone security as a whole hence extending the work of Khan et al ( 2021 ) in which only computer security was measured.…”
Section: Theoretical Backgroundmentioning
confidence: 71%
“…Thirdly, there is a lack of a national representative sample in Pakistan (Khan et al 2021 ) to study the cybersecurity phenomenon which hinders the generalizability of results. Fourthly, the online surveys are problematic considering digital divide variables as they miss out on the representativeness of digitally less connected and lack correlative coverage (Robinson et al 2015 ).…”
Section: Theoretical Backgroundmentioning
confidence: 99%
See 2 more Smart Citations
“…Given the high prices and limited licences, a hacker may want to gain access to these sources of information (Thomson, 2006). Digital repositories of the university libraries include intellectual resources of the university not only student-authored research but also academic staff research projects and reports (Khan et al, 2021). This could be a hacker who only wants to access a library resource from home computer or a cyber-criminal who wants to steal above-mentioned intellectual property.…”
Section: Introductionmentioning
confidence: 99%