The present work on information security in the academic area, aims to analyze the users' perception of IT infrastructure of a public university on the factors involved in information security. Through a quantitative questionnaire online, eight factors related to information security were explored, which were taken from the literature reviewed, with special attention to the qualitative work in the area. They are: 1. Administration's support; 2. Assignment of responsibility;3. Environment of academic freedom; 4. Safety culture; 5. Priority of security; 6. Participation in safety activities; 7. Awareness programs; 8. Communication. After collecting data, total of 122 cases, the method of exploratory factor analysis for multivariate an...
Universities are handle increasingly higher amounts of information in digital format. Therefore, mor...
This study attempts to determine the general information security awareness and culture of users wit...
Many articles within the literature point to the information security policy as one of the most impo...
The present work on information security in the academic area, aims to analyze the users' perceptio...
O presente trabalho sobre segurança da informação no âmbito acadêmico objetiva analisar a percepção ...
The critical issues of information security have gradually increased. Effective information security...
[[abstract]]Information security cognition requires mutual confirmation from factual knowledge and p...
Information security culture plays the crucial role in Higher Learning Institutions, thus cultivati...
Information security programs are instituted by organizations to provide guidance to their users who...
In the era of information, it has become vital for companies to make sure that their information is ...
The aim of this study is by investigating the Information Security Awareness of University Students...
Federal Institutions of Higher Education develop their academic and administrative activities based ...
There are several Information Security measures recommended by international standards and literatu...
Information security (IS) simply implies the protection and preservation of information, with its ce...
This paper analyses the security requirements deriving from the application of the General Data Prot...
Universities are handle increasingly higher amounts of information in digital format. Therefore, mor...
This study attempts to determine the general information security awareness and culture of users wit...
Many articles within the literature point to the information security policy as one of the most impo...
The present work on information security in the academic area, aims to analyze the users' perceptio...
O presente trabalho sobre segurança da informação no âmbito acadêmico objetiva analisar a percepção ...
The critical issues of information security have gradually increased. Effective information security...
[[abstract]]Information security cognition requires mutual confirmation from factual knowledge and p...
Information security culture plays the crucial role in Higher Learning Institutions, thus cultivati...
Information security programs are instituted by organizations to provide guidance to their users who...
In the era of information, it has become vital for companies to make sure that their information is ...
The aim of this study is by investigating the Information Security Awareness of University Students...
Federal Institutions of Higher Education develop their academic and administrative activities based ...
There are several Information Security measures recommended by international standards and literatu...
Information security (IS) simply implies the protection and preservation of information, with its ce...
This paper analyses the security requirements deriving from the application of the General Data Prot...
Universities are handle increasingly higher amounts of information in digital format. Therefore, mor...
This study attempts to determine the general information security awareness and culture of users wit...
Many articles within the literature point to the information security policy as one of the most impo...