Higher education institutions (HEIs) are increasingly relying on digital technologies for classroom and organizational management, but this puts them at higher risk for information and communication (ICT security attacks. Recent studies show that HEIs have experienced more security breaches in ICT security composed of both cybersecurity an information security. A literature review was conducted to identify common ICT security practices in HEIs over the last decade. 11 journal articles were profiled and analyzed, revealing threats to HEIs’ security and protective measures in terms of organizational security, technological security, physical security, and standards and frameworks. Security tools and techniques were grouped into categories wit...
An overview of academic articles focused on information security management (ISM) in higher educatio...
Due to the large volume of data they manage, Higher Education Institutions (HEIs) are perfect target...
The growing use of eLearning systems has been documented by numerous studies and with enormous growt...
Effective information security management (ISM) practices to protect the information assets of organ...
Effective information security management (ISM) practices to protect the information assets of organ...
Cyber security has emerged as a critical concern in today's digital age, affecting various sectors a...
Cybersecurity is defined as the protection of networks, data and systems in the cyberspace. It shou...
The demands for information security in higher education will continue to increase. Serious data bre...
The demands for information security in higher education will continue to increase. Serious data bre...
The use of technical information system security measures may prove insufficient in protecting infor...
The use of technical information system security measures may prove insufficient in protecting infor...
This paper provides a systematic literature review in the information security policies’ compliance ...
This paper provides a systematic literature review in the information security policies’ compliance ...
This paper provides a systematic literature review in the information security policies’ compliance ...
This paper provides a systematic literature review in the information security policies’ compliance ...
An overview of academic articles focused on information security management (ISM) in higher educatio...
Due to the large volume of data they manage, Higher Education Institutions (HEIs) are perfect target...
The growing use of eLearning systems has been documented by numerous studies and with enormous growt...
Effective information security management (ISM) practices to protect the information assets of organ...
Effective information security management (ISM) practices to protect the information assets of organ...
Cyber security has emerged as a critical concern in today's digital age, affecting various sectors a...
Cybersecurity is defined as the protection of networks, data and systems in the cyberspace. It shou...
The demands for information security in higher education will continue to increase. Serious data bre...
The demands for information security in higher education will continue to increase. Serious data bre...
The use of technical information system security measures may prove insufficient in protecting infor...
The use of technical information system security measures may prove insufficient in protecting infor...
This paper provides a systematic literature review in the information security policies’ compliance ...
This paper provides a systematic literature review in the information security policies’ compliance ...
This paper provides a systematic literature review in the information security policies’ compliance ...
This paper provides a systematic literature review in the information security policies’ compliance ...
An overview of academic articles focused on information security management (ISM) in higher educatio...
Due to the large volume of data they manage, Higher Education Institutions (HEIs) are perfect target...
The growing use of eLearning systems has been documented by numerous studies and with enormous growt...