Securing information is essential for safeguarding the organization business operations as information is a business asset to any organization including education sector. One of the most imperative information security (InfoSec) controls identified is InfoSec policy. The purpose of this study is to gauge the level of enforcement and effectiveness of Universiti Teknologi Malaysia's (UTM) InfoSec policy from the users perspective. This study involved three phases of data collection, namely preliminary study, interview and survey. The preliminary study allows an exploratory activity in understanding the information technology (IT) arrangement and organizational structural practices in UTM environment. Next, an interview with an IT-expert aimed...
There is worldwide recognition of the problems associated with insider threats, intentional and unin...
In today’s interconnected world, universities recognize the importance of protecting their informati...
Many articles within the literature point to the information security policy as one of the most impo...
Securing information is essential for safeguarding the organization business operations as informati...
Information security awareness (ISA) is signified as a state of consciousness and acquaintance about...
The critical issues of information security have gradually increased. Effective information security...
Information security for organizations such as educational sectors is gaining more importance as the...
Ensuring information systems security policy compliance is an integral part of the security program ...
Information security culture plays the crucial role in Higher Learning Institutions, thus cultivati...
Information Technology transformed the way people executed their tasks at work. With the information...
Without a doubt, the whole world faces many challenges regarding hacker or cracker exploitation; and...
Organisations throughout the world face threats to the security of their information. In most organi...
Information security (IS) simply implies the protection and preservation of information, with its ce...
This paper aims to recognise Information Security Policies (ISP) and their relationship with the eff...
Information security is vital to any organization.It holds the reputation as well as the image carri...
There is worldwide recognition of the problems associated with insider threats, intentional and unin...
In today’s interconnected world, universities recognize the importance of protecting their informati...
Many articles within the literature point to the information security policy as one of the most impo...
Securing information is essential for safeguarding the organization business operations as informati...
Information security awareness (ISA) is signified as a state of consciousness and acquaintance about...
The critical issues of information security have gradually increased. Effective information security...
Information security for organizations such as educational sectors is gaining more importance as the...
Ensuring information systems security policy compliance is an integral part of the security program ...
Information security culture plays the crucial role in Higher Learning Institutions, thus cultivati...
Information Technology transformed the way people executed their tasks at work. With the information...
Without a doubt, the whole world faces many challenges regarding hacker or cracker exploitation; and...
Organisations throughout the world face threats to the security of their information. In most organi...
Information security (IS) simply implies the protection and preservation of information, with its ce...
This paper aims to recognise Information Security Policies (ISP) and their relationship with the eff...
Information security is vital to any organization.It holds the reputation as well as the image carri...
There is worldwide recognition of the problems associated with insider threats, intentional and unin...
In today’s interconnected world, universities recognize the importance of protecting their informati...
Many articles within the literature point to the information security policy as one of the most impo...