2016 3rd International Conference on Computer and Information Sciences (ICCOINS) 2016
DOI: 10.1109/iccoins.2016.7783277
|View full text |Cite
|
Sign up to set email alerts
|

Information security policies: Investigation of compliance in universities

Abstract: Cloud computing faces more security threats, requiring better security measures. This paper examines the various classification and categorization schemes for cloud computing security issues, including the widely known CIA trinity (confidentiality, integrity, and availability), by considering critical aspects of the cloud, such as service models, deployment models, and involved parties. A comprehensive comparison of cloud security classifications constructs an exhaustive taxonomy. ISO27005, NIST SP 800-30, CRA… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
10
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 17 publications
(10 citation statements)
references
References 21 publications
0
10
0
Order By: Relevance
“…As data stewards, universities must implement adequate governance mechanisms, which are, at best, nascent in the university environment (Borgman, 2018). Furthermore, research also shows that diffusion of an adequate information security culture is still incomplete in universities (Hina and Dominic, 2016).…”
Section: Review Of the Literaturementioning
confidence: 99%
“…As data stewards, universities must implement adequate governance mechanisms, which are, at best, nascent in the university environment (Borgman, 2018). Furthermore, research also shows that diffusion of an adequate information security culture is still incomplete in universities (Hina and Dominic, 2016).…”
Section: Review Of the Literaturementioning
confidence: 99%
“…Previous research has consistently stated that self-efficacy significantly influences employees' intention to comply with information security policies [37,40,41]. Self-Efficacy can increase employee awareness in handling security threats [28].…”
Section: Conceptual Frameworkmentioning
confidence: 99%
“…Recent security reports indicate that the number of cyberattacks against numerous organizations, including universities, has increased significantly ( Hakak et al, 2020 ; Lallie et al, 2021 ). Many cybersecurity incidents are caused by employees who disregard security policies due to their initial lack of security awareness ( Hina & Dominic, 2016 ). Due to their role as instructors, who must frequently administer and host online classes on their own, faculty members become the primary actors in higher education.…”
Section: Introductionmentioning
confidence: 99%