2021
DOI: 10.1007/978-3-030-81111-2_6
|View full text |Cite
|
Sign up to set email alerts
|

A Conceptual Information Security Culture Framework for Higher Learning Institutions

Abstract: Education institutions within and outside Ghana continue to experience mass information leakages at an alarming rate even with the huge investment made in information technology infrastructure to secure their information assets. The lack of organisational commitment to enhance the nontechnical aspects of information securitythus, information security culture (ISC)largely accounts for the consistent rise of security breaches in institutions like the educational institutions. Securing information assets goes bey… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
1
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
2
1
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 34 publications
0
1
0
Order By: Relevance
“…Broadly, technical and other factors related to a system's design have not been studied in the context of ICS security culture as much as people-centric factors such as security training policy. This generally extends to the wider security culture literature, where technology aspects and their influence on security culture have had limited attention [41]. However, the unique operational nature of ICS, where patching is harder to implement, or passwords frequently need to be shared [29], often contrasts general security practices.…”
Section: Discussionmentioning
confidence: 90%
“…Broadly, technical and other factors related to a system's design have not been studied in the context of ICS security culture as much as people-centric factors such as security training policy. This generally extends to the wider security culture literature, where technology aspects and their influence on security culture have had limited attention [41]. However, the unique operational nature of ICS, where patching is harder to implement, or passwords frequently need to be shared [29], often contrasts general security practices.…”
Section: Discussionmentioning
confidence: 90%
“…Previous research has demonstrated that factors influencing compliance with regard to ISP can originate from employees’ behaviour (Angraini et al , 2021; Chen et al , 2020; Chin and Chua, 2021; Nord et al , 2020) and from the organisation (Ali et al , 2020a, 2020b; Amankwa et al , 2018; Da Veiga, 2018; Karlsson et al , 2018; Liu et al , 2020; Ocloo et al , 2021; Sommestad, 2018; Da Veiga et al , 2020). The study of Angraini et al (2021) discovered that corporate commitment had a substantial impact on attempts to encourage employee compliance with the ISPs in the organisation.…”
Section: Introductionmentioning
confidence: 99%