Purpose – This research is to identify the security awareness of the students of UTM. The results from this study can also be used as additional information when improving or integrating their security system. Recommendations for improving the security will also be mentioned. Design/methodology/approach – This study will be focusing on the security awareness and opinions from the students and the issues concerning the safety level of security. What does the UTM security control lacks from the students point of view will be studied also other than their involvement concerning security issues? Findings – What has this study identified is that most of the students are not fully aware of the security provided from the management. Even though so...
Masters Degree. University of KwaZulu-Natal, Durban.University institutions are already overwhelmed...
The use of technical information system security measures may prove insufficient in protecting infor...
The use of technical information system security measures may prove insufficient in protecting infor...
In the era of information, it has become vital for companies to make sure that their information is ...
A student has the right to feel safe when living in a campus, and it is the responsibility of the ca...
This aims of this study is to study the perceptions of Universiti Utara Malaysia (UUM) students towa...
The advancement of computer and Internet technologies have brought teaching and learning activities ...
Cybersecurity, as a security management requirement, is essential to understanding data security in ...
Cybersecurity, as a security management requirement, is essential to understanding data security in ...
Information security (IS) simply implies the protection and preservation of information, with its ce...
Information security is vital to any organization.It holds the reputation as well as the image carri...
The threat of universities being attacked by hackers has increased steadily in recent years. Since u...
The study focused on safety and security measures employed at institutions of higher learning. The p...
The study focused on safety and security measures employed at institutions of higher learning. The p...
Masters Degree. University of KwaZulu-Natal, Durban.University institutions are already overwhelmed ...
Masters Degree. University of KwaZulu-Natal, Durban.University institutions are already overwhelmed...
The use of technical information system security measures may prove insufficient in protecting infor...
The use of technical information system security measures may prove insufficient in protecting infor...
In the era of information, it has become vital for companies to make sure that their information is ...
A student has the right to feel safe when living in a campus, and it is the responsibility of the ca...
This aims of this study is to study the perceptions of Universiti Utara Malaysia (UUM) students towa...
The advancement of computer and Internet technologies have brought teaching and learning activities ...
Cybersecurity, as a security management requirement, is essential to understanding data security in ...
Cybersecurity, as a security management requirement, is essential to understanding data security in ...
Information security (IS) simply implies the protection and preservation of information, with its ce...
Information security is vital to any organization.It holds the reputation as well as the image carri...
The threat of universities being attacked by hackers has increased steadily in recent years. Since u...
The study focused on safety and security measures employed at institutions of higher learning. The p...
The study focused on safety and security measures employed at institutions of higher learning. The p...
Masters Degree. University of KwaZulu-Natal, Durban.University institutions are already overwhelmed ...
Masters Degree. University of KwaZulu-Natal, Durban.University institutions are already overwhelmed...
The use of technical information system security measures may prove insufficient in protecting infor...
The use of technical information system security measures may prove insufficient in protecting infor...