Proceedings of the International Conference on Advances in Computing, Communication and Control 2009
DOI: 10.1145/1523103.1523209
|View full text |Cite
|
Sign up to set email alerts
|

Information security assurance for academic institutions using role based security metric

Abstract: Information Security has become a serious concern for academic institutions for their normal functioning. This paper proposes a metric based assurance plan, keeping in view the resource limitation of small institutions. Modular approach of the proposed solution allows institutions to switch to higher version as they grow and augment more resources. Organization structure necessary to monitor the proposed plan is also proposed with non traditional roles and their job description. For every control an appropriat… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2015
2015
2022
2022

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 1 publication
0
2
0
Order By: Relevance
“…Concerns about the security of the human resources information system must be addressed because the use of the human resources information system, electronic human resources, and similar enterprise systems will only increase. The researchers proposed an information security assessment plan in [15], taking into account academic institution expectations and related regulatory requirements. The primary goal of this plan is to provide an internal assessment and role-based response system, rather than just a checklist of security metrics.…”
Section: Introductionmentioning
confidence: 99%
“…Concerns about the security of the human resources information system must be addressed because the use of the human resources information system, electronic human resources, and similar enterprise systems will only increase. The researchers proposed an information security assessment plan in [15], taking into account academic institution expectations and related regulatory requirements. The primary goal of this plan is to provide an internal assessment and role-based response system, rather than just a checklist of security metrics.…”
Section: Introductionmentioning
confidence: 99%
“…Though educational institutions render these vital services towards the socio-economic development of a nation only few studies examined how IT is being governed in this critical sector. Academic institutions depend greatly on information technology to support various academic programs, research and administrative functions, and as such, stringent controls are necessary to secure institutional data (Bhilare, Ramani, & Tanwani, 2009). But governance of IT cannot be separated from that of information systems.…”
Section: Introductionmentioning
confidence: 99%