2019
DOI: 10.1016/j.cose.2019.07.003
|View full text |Cite
|
Sign up to set email alerts
|

The least secure places in the universe? A systematic literature review on information security management in higher education

Abstract: Current research has demonstrated the progressively more strategic role that information security has in modern organisations. Higher education is no exception. The increasing number of security breaches experienced in recent years by higher education institutions epitomises the importance of confidentiality, integrity and availability of information in universities. To synthesise research in this field, this literature review systematically examines papers that have been published in the last thirteen years. … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

1
53
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
4

Relationship

1
8

Authors

Journals

citations
Cited by 56 publications
(54 citation statements)
references
References 35 publications
1
53
0
Order By: Relevance
“…Integration can be done by providing information from academic processes as services, using SOA principles (flexible, sustainable, reusable integration) and instruments to plot academic processes' variables [32]. The integration of SOA with academic processes possibly will pilot the creation and use of new learning settings.…”
Section: C) Analysis Of Soa and Cloud Technologymentioning
confidence: 99%
“…Integration can be done by providing information from academic processes as services, using SOA principles (flexible, sustainable, reusable integration) and instruments to plot academic processes' variables [32]. The integration of SOA with academic processes possibly will pilot the creation and use of new learning settings.…”
Section: C) Analysis Of Soa and Cloud Technologymentioning
confidence: 99%
“…Specifically, in the context of cyber security, most of the research in higher education has been done in risk management frameworks and standards whereas, the least focus is given to the governance and cultural awareness [19]. Due to which cyber security has not been implemented in higher education institutions in its true spirit.…”
Section: Literature Reviewmentioning
confidence: 99%
“…In line with this, [18], highlighted that generally higher education institutions do not have independent central security services due to lack of resources. As a result, they have to out-source these services, which are insufficient for cyber security [19]. The main reason for this inadequacy is the unique nature of educational institutions' security systems, which is radically different from other institutions' security systems [20].…”
Section: Literature Reviewmentioning
confidence: 99%
“…Multiple frameworks are available to assess human intentions towards information security policies, but none of the frameworks can be used as a standard behavioral process model. All the frameworks defined in the extant literature are either specific to a sector (for example, finance, higher education) [25,26] or specific to various theories [18,24,27]. None of the previous studies has made an effort to develop a consolidated information security behavior process which can exhibit the transformation process from noncompliance to compliance.…”
Section: Introductionmentioning
confidence: 99%