Between January 2017 and March 2018, it is estimated that more than 1.9 billion personal and sensitive data records were compromised online. The average cost of a data breach in 2018 was reported to be in the region of US$3.62 million. These figures alone highlight the need for computer users to have a high level of information security awareness (ISA). This research was conducted to establish the ISA of students in a university. There were three aspects to this piece of research. The first was to review and analyse the security habits of students in terms of their own personal device and examine their password habits, including their student account and their own personal accounts. The second was to assess and evaluate each student on a va...
The content of Chapter 4 including the experimental work and the results have been published. Moreov...
The need to protect information systems as much as possible from security threats and risks has rise...
The critical issues of information security have gradually increased. Effective information security...
Most of web users today are university students. They become more familiar with Information Security...
Information security (IS) simply implies the protection and preservation of information, with its ce...
Due to the widespread integration of ICT in education, both the participants in the teaching-learnin...
In the era of information, it has become vital for companies to make sure that their information is ...
Information security is vital to any organization.It holds the reputation as well as the image carri...
Information security (IS) simply implies the protection and preservation of information, with its ce...
Information security awareness (ISA) is referred to as a state of consciousness where user ideally c...
This study reports the early results of a study aimed to investigate student awareness and attitudes...
The threat of universities being attacked by hackers has increased steadily in recent years. Since u...
A mixed-methods study, conducted in 2007-2008, designed to quantify and assess behaviors that either...
One of the major challenges in information systems is securing information against unauthorized acce...
The ever-increasing number and severity of cybersecurity breaches makes it vital to understand the f...
The content of Chapter 4 including the experimental work and the results have been published. Moreov...
The need to protect information systems as much as possible from security threats and risks has rise...
The critical issues of information security have gradually increased. Effective information security...
Most of web users today are university students. They become more familiar with Information Security...
Information security (IS) simply implies the protection and preservation of information, with its ce...
Due to the widespread integration of ICT in education, both the participants in the teaching-learnin...
In the era of information, it has become vital for companies to make sure that their information is ...
Information security is vital to any organization.It holds the reputation as well as the image carri...
Information security (IS) simply implies the protection and preservation of information, with its ce...
Information security awareness (ISA) is referred to as a state of consciousness where user ideally c...
This study reports the early results of a study aimed to investigate student awareness and attitudes...
The threat of universities being attacked by hackers has increased steadily in recent years. Since u...
A mixed-methods study, conducted in 2007-2008, designed to quantify and assess behaviors that either...
One of the major challenges in information systems is securing information against unauthorized acce...
The ever-increasing number and severity of cybersecurity breaches makes it vital to understand the f...
The content of Chapter 4 including the experimental work and the results have been published. Moreov...
The need to protect information systems as much as possible from security threats and risks has rise...
The critical issues of information security have gradually increased. Effective information security...