INFORMATION SECURITY AWARNESS IN DIFFERENT HIGHER EDUCATION CONTEXTS - A Comparative Study

Adam Marks, Yacine Rezgui

2010

Abstract

Higher education in the UAE has advanced significantly in the last decade. Several higher education institutions have been seeking/granted international recognition and accreditation. Yet, the status of IT in UAE higher education has received very limited attention. This study explores and compares the level of IS security awareness of IS users in one of the leading UAE higher education institutions to those of IS users in a classical UK university. In addition, the study looks for possible factors behind any possible variations on the levels of IS security awareness.

References

  1. Abdullah, A., 2004. The Development of Electronic Journals in the United Arab Emirates University (UAEU).
  2. Barrage, G., Majdalani, F., Vayanos, P., and Shehadi, R.,2003. Information Technology in the Middle East: The CEO Agenda. Booz, Allen, and Hamilton.
  3. Bonoma TV., 1985. Case Research in Marketing: Opportunities, Problems, and a Process. Journal of Marketing research. 22:199-208.
  4. Bray TJ., 2002. Security actions during reduction in workforce efforts: what to do when downsizing. Information system security. 11-15.
  5. Cooper, M., 2009. Information Security Training- Lessons Learned Along the Trail. Proceedings of the 36th annual ACM SIGUCCS conference on User services conference. 207-212.
  6. Dlimini, M. T., Eloff, J. H. P., and Eloff, M. M., 2008. Information security: The moving target. Computers & Security.
  7. Denzin, N. K., & Lincoln, Y. S. (Eds.), 2000. The handbook of qualitative research. (2nd ed.). London: SAGE Publishing.
  8. Dunlop, C. &Kling, R. Social Relationship in Electronic Commerce., 1992. Introduction in Computerization and Controversy- Value Conflicts and Social change, (ed. C. Dunlop and R. Kling). Academic Press, New York, USA.
  9. EDUCAUSE center for Applied Research: Information Technology Security: 2003. Governance, strategy, and practice in Higher Education.
  10. Emirates Today. UAE Rank 46th Globally as Originator on Phishing Attacks. Retrieved 22, March, 2007 from http://www.ameinfo.com/56212.html.
  11. Goodman, S.E., 1991. Computing in a less developed country. Communications of the ACM, 34, 12, 25-29.
  12. ISACA. Information Systems Audit and Control Association., 2006. Information Systems Auditing Manual.
  13. ISF- International Security Forum., 2005. The Forum's Standard of Good Practice for IS security. Cited May 18th 2006 from http://www.isfsecuritystandard.com/index_ie.htm.
  14. Joseph, M., 2006. IT in the Middle East: Overview. Proceedings of the 7th conference on Information technology education.
  15. Katz, FH., 2005. The Effect of a University Information Security Survey on Instructing Methods in Information Security. In: Proceedings of the 2nd annual conference on Information security curriculum development. p.43-48.
  16. Kostopoulos, G., 2003. E-Government of the Arabian Gulf: A vision Toward Reality. ACM International Conference Proceeding Series; Vol. 130.
  17. Kovacich GL., 1998. Information system security Officer's Guide: Establishing and Managing an Information Protection Program. USA: Butterworth-Heinemann.
  18. Kruger, H. A. and Kearney, W. D., 2006 A prototype for assessing information security awareness. Computers & Security, 25:1, pp. 289-296.
  19. Mani, J.P. and Barry M. Lunt., 2006. IT in the Middle East: An Overview.
  20. Martin, C.D., 2005. Removing the Veil. Personal Reflection on Educating Women in the Dubai.
  21. McDaniel, G., ed., 1994. IBM Dictionary of Computing. New York, NY: McGraw-Hill, Inc.
  22. Miles MB. and Huberman AM., 1994. Qualitative Data Analysis, An Expanded Source Book. Beverly Hills: Sage.
  23. Mitnick, K. D., & Simon, W. L., 2002. The Art of Deception: Controlling the Human Element of Security, Indianapolis, IN: Wiley.
  24. Myers, M. D., 1997. Qualitative Research in Information Systems. MIS Quarterly, 21(1), 241 - 242.
  25. North Max M, Roy George, North Sarah M., 2006. Computer Security Ethics Awareness in University Environments: A Challenge for Management of Information Systems.
  26. Orlikowski, W.J., 1993. CASE tools as organizational change: Investigating incremental and radical changes in system development. MIS Quarterly, 17(3), 309- 340.
  27. Puhakainen, P., 2006. A Design Theory for Information Security Awareness.
  28. Rezgui Y, Marks A., 2008. Information Security Awareness in Higher Education: An Exploratory Study, Computers & Security.
  29. Siponen, M.T., 2000. A Conceptual Foundation for Organizational Information Security awareness. Information Management & Computer Security, Volume 8, Issue 1.
  30. Stake, R.E., 1995. The Art of Case Study Research, Thousand Oaks: Sage, 1995.
  31. Straub, D.W. and Welke, R.J., 1998. Coping with systems risk: Security planning models for management decision making. MIS Q. 22, 4, 441-469.
  32. University of Salford Web site - home page. Retrieved 02, February, 2006 from www.Salford.ac.uk.
  33. Zayed University., 2006. Self Study Design Prepared for Middle States Commission on Higher Education.
  34. Zayed University., 2004. Self-Assessment Document Prepared for Middle States Commission on Higher Education.
  35. Zayed University Web site - home page. Retrieved 20, June, 2006 from www.zu.ac.ae.
Download


Paper Citation


in Harvard Style

Marks A. and Rezgui Y. (2010). INFORMATION SECURITY AWARNESS IN DIFFERENT HIGHER EDUCATION CONTEXTS - A Comparative Study . In Proceedings of the 12th International Conference on Enterprise Information Systems - Volume 5: ICEIS, ISBN 978-989-8425-08-9, pages 215-222. DOI: 10.5220/0002888102150222


in Bibtex Style

@conference{iceis10,
author={Adam Marks and Yacine Rezgui},
title={INFORMATION SECURITY AWARNESS IN DIFFERENT HIGHER EDUCATION CONTEXTS - A Comparative Study},
booktitle={Proceedings of the 12th International Conference on Enterprise Information Systems - Volume 5: ICEIS,},
year={2010},
pages={215-222},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0002888102150222},
isbn={978-989-8425-08-9},
}


in EndNote Style

TY - CONF
JO - Proceedings of the 12th International Conference on Enterprise Information Systems - Volume 5: ICEIS,
TI - INFORMATION SECURITY AWARNESS IN DIFFERENT HIGHER EDUCATION CONTEXTS - A Comparative Study
SN - 978-989-8425-08-9
AU - Marks A.
AU - Rezgui Y.
PY - 2010
SP - 215
EP - 222
DO - 10.5220/0002888102150222