Volume- 2
Issue- 3
Year- 2014
Sham Sul Kamal Wan Fakeh , Mohd Sazili Shahibi, Adnan Jamaludin , Wan Ab Kadir Wan Dollah , Muhammad Khairulnizam Zaini , Yamin Kamis, Ahmad Soufiean Othman
The matrix analysis of the literature review in this study succeeded in producing factors that contribute to information security awareness. Information security awareness plays an important role in the continuity of an organization. Information security refers to the elements of confidentiality, integrity, and availability, of data or information, in an organization. The research began with definitions of information, information security, and information security awareness, as identified by previous publications. The four independent variables established in this study are policy of information security, education of information security, knowledge of IT, and employee’s behaviour towards information security in the workplace. A survey was selected as a research method for the study, and was conducted in order to gain respondent’s feedback on the level of information security awareness. The survey findings showed that the level of information security awareness was considered high, but the relation or contribution factors proposed by this study were only slight correlated.
[1] Ahmad, A.M (2010). Information security governance in Saudi organizations: an empiral studhy. Information Management & Computer Security, 18 (4), 226-276.
[2] Blyth, A., & Kovacich, G. (2006). Information assurance: Security in the information. Cambridge: Spriger.
[3] Burn,R.B.(2000).Introduction to research method.Australia: Longman
[4] Caroll, M.D. (2006). Information security: Examining and managing the insider threat. ACM Proceeding of the 3rd Annual Conference on Information Security Curriculum Development 2006. Kennesaw.
[5] ENISA. (2006). A users’ Guide: How to raise information security awareness. Retrieved March 17, 2012.
[6] Gross, J.B, (2008). Looking for trouble: ACM Proceedings of the 2008 Human Interaction for the Management of Information Technology. (p.10) Cambridge. MA.
[7] Kruger, H.A., & Kearney, W.D.(2006). A Prototype for assessing information security awareness. Computer & Security, 25, 289-289.
[8] Saint-Gemain, R. (2005). Information security management best practice based on ISO/IEC 17799. Information Management Journal, 39 (4), 60-65.
[9] Stroub, D.W. (1990). Effective IS Security: An Empirical Study. Information System Research, 1 (3), 255-276.
[10] Takemura, T. (2011), A Quantitative Study on Japenes Workers’ Awareness to Information Security Using the data collected by Web based survey, American Journal of Economics and Business Administration, 20-26.
[11] Theiss, H. (1983). On Terminology. Information Science in Action: System Design, 1,84-94.
[12] Thomson, M.E., & Solms, R.v. (1998). Information security awareness: educating your users effectively. Information Management & Computer Security, 6 (4), 167-173.
[13] Tipton, H.F., & Krause, M. (Eds.) (2004). Information Security Management Handbook (5th Edition ed.) U.S.A: CRC Press LC.
[14] Vroom, C., 7 R.v. Solms, 2004. Towards information security behavioral compliance. Computers & Security, 23(3): 191-198.
[15] Whitman, M.E., & HJ. Mattord, 2005. Principles of Information Security (2nd Edition ed.). Australia: Thomson course Technolgy
Faculty of Information, University Teknologi (UiTM) Mara Shah Alam, Selangor Malaysia, 019-6038522, 03-79622143 (e-mail: shamsul@salam.uitm.edu.my)
No. of Downloads: 4 | No. of Views: 1051