2019
DOI: 10.1108/ics-12-2018-0142
|View full text |Cite
|
Sign up to set email alerts
|

Assessing the current state of information security policies in academic organizations

Abstract: Purpose Colleges and universities across the USA have seen data breaches and intellectual property theft rise at a heightened rate over the past several years. An integral step in the first line of defense against various forms of attacks are (written) security policies designed to prescribe the construction and function of a technical system, while simultaneously guiding the actions of individuals operating within said system. Unfortunately, policy analysis is an insufficiently discussed topic in many academi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
4
1
1

Relationship

1
5

Authors

Journals

citations
Cited by 6 publications
(3 citation statements)
references
References 21 publications
0
3
0
Order By: Relevance
“…With sufficient effort, institutions can indeed implement humane and transparent ways of dealing with cheating and deception issues. Coherent policies on the part of higher education institutions about the kinds and extents of cheatingdetection efforts are often lacking, a situation that is comparable to other high tech and software concerns such as information security (Slade et al, 2019;Weidman & Grossklags, 2018).…”
Section: Resistance To Cheating Detection Systemsmentioning
confidence: 99%
“…With sufficient effort, institutions can indeed implement humane and transparent ways of dealing with cheating and deception issues. Coherent policies on the part of higher education institutions about the kinds and extents of cheatingdetection efforts are often lacking, a situation that is comparable to other high tech and software concerns such as information security (Slade et al, 2019;Weidman & Grossklags, 2018).…”
Section: Resistance To Cheating Detection Systemsmentioning
confidence: 99%
“…The University of Namibia has put in place an ICT policy to guide its resources users. Security policy is considered important for managing the security of information systems [15]. Exploration and analysis of the current state of information security policies in academic institutions illuminate the need to upscale and adopt the latest security solutions [16].…”
Section: Analysis Of Information Security Mechanisms and Ict Policy I...mentioning
confidence: 99%
“…The Internet giants pay higher attention to data security than other companies as all of them not only explain the techniques and management skills taken to protect data but also establish a disaster response mechanism. Please note that all companies likely have internal security policies with further details (see, e.g., [59]).…”
Section: Securitymentioning
confidence: 99%