The purpose of this study is to explore students’ perceived information security and privacy (IS&P) threats and to classify them in a way that helps in analyzing the problem, creating awareness measures and further improving students’ IS&P education. Using a qualitative research approach, a group of forty two Master’s degree IT students identified seventy five IS&P threats related to them. The identified threats were classified into fourteen categories. Further, using the affinity diagraming technique, the categories were grouped into four domains - Personnel, Devices, Intranet and Internet. In this way, we present a taxonomy of students’ perceived IS&P threats as well as a model that highlights the domains where students consider themse...
This study attempts to determine the general information security awareness and culture of users wit...
Between January 2017 and March 2018, it is estimated that more than 1.9 billion personal and sensiti...
Internet security threats have grown from just simple viruses to various forms of computer hacking, ...
Information security (IS) simply implies the protection and preservation of information, with its ce...
Information security (IS) simply implies the protection and preservation of information, with its ce...
In the era of information, it has become vital for companies to make sure that their information is ...
Most of web users today are university students. They become more familiar with Information Security...
Most of web users today are university students. They become more familiar with Information Security...
Cybersecurity has become an essential topic in introductory information systems (IS) core courses. A...
Information security threat has been reported to be on the increase among users of internet technolo...
Due to the widespread integration of ICT in education, both the participants in the teaching-learnin...
M.Com. (Computer Auditing)Abstract: This research investigated the different information technology ...
The threat of universities being attacked by hackers has increased steadily in recent years. Since u...
Cybersecurity has become an essential topic in introductory information systems (IS) core courses. A...
Part 2: Information Security Training and AwarenessInternational audienceThe human aspect is one of ...
This study attempts to determine the general information security awareness and culture of users wit...
Between January 2017 and March 2018, it is estimated that more than 1.9 billion personal and sensiti...
Internet security threats have grown from just simple viruses to various forms of computer hacking, ...
Information security (IS) simply implies the protection and preservation of information, with its ce...
Information security (IS) simply implies the protection and preservation of information, with its ce...
In the era of information, it has become vital for companies to make sure that their information is ...
Most of web users today are university students. They become more familiar with Information Security...
Most of web users today are university students. They become more familiar with Information Security...
Cybersecurity has become an essential topic in introductory information systems (IS) core courses. A...
Information security threat has been reported to be on the increase among users of internet technolo...
Due to the widespread integration of ICT in education, both the participants in the teaching-learnin...
M.Com. (Computer Auditing)Abstract: This research investigated the different information technology ...
The threat of universities being attacked by hackers has increased steadily in recent years. Since u...
Cybersecurity has become an essential topic in introductory information systems (IS) core courses. A...
Part 2: Information Security Training and AwarenessInternational audienceThe human aspect is one of ...
This study attempts to determine the general information security awareness and culture of users wit...
Between January 2017 and March 2018, it is estimated that more than 1.9 billion personal and sensiti...
Internet security threats have grown from just simple viruses to various forms of computer hacking, ...