International Journal of Innovative Research in Engineering and Management
Year: 2016, Volume: 3, Issue: 4
First page : ( 353) Last page : ( 357)
Online ISSN : 2350-0557.
Article Tools: Print the Abstract | Indexing metadata | How to cite item | Email this article | Post a Comment
Sham Sul Kamal Wan Fakeh , Julina Tajul Ariffin, Zaharudin Ibrahim, Zahari Mohd Amin, Wan Abdul Malik, Mohd Jailani Paiman, A’dillah Mustafa, Mohd Ridzuan Ibrahim, Yanti Rahayu Rambli, Juwahir Ali
The research began with definitions of information, information security, and information security awareness, as identified by previous publications. The four independent variables established in this study are policy of information security, education of information security, knowledge of IT, and employee’s behaviour towards information security in the workplace. A survey was selected as a research method for the study, and was conducted in order to gain respondent’s feedback on the level of information security awareness. The survey findings showed that the level of information security awareness was considered high, but the relation or contribution factors proposed by this study were only slight correlated.
[1] Blyth, A., & Kovacich, G. (2006). Information assurance: Security in the information. Cambridge: Spriger.
[2] Burn,R.B.(2000).Introduction to research method.Australia: Longman
[3] Caroll, M.D. (2006). Information security: Examining and managing the insider threat. ACM Proceeding of the 3rd Annual Conference on Information Security Curriculum Development 2006. Kennesaw.
[4] ENISA. (2006). A users’ Guide: How to raise information security awareness. Retrieved March 17, 2012.
[5] Gross, J.B, (2008). Looking for trouble: ACM Proceedings of the 2008 Human Interaction for the Management of Information Technology. (p.10) Cambridge. MA.
[6] Kruger, H.A., & Kearney, W.D.(2006). A Prototype for assessing information security awareness. Computer & Security, 25, 289-289.
[7] Saint-Gemain, R. (2005). Information security management best practice based on ISO/IEC 17799. Information Management Journal, 39 (4), 60-65.
[8] Stroub, D.W. (1990). Effective IS Security: An Empirical Study. Information System Research, 1 (3), 255-276.
[9] Takemura, T. (2011), A Quantitative Study on Japenes Workers’ Awareness to Information Security Using the data collected by Web based survey, American Journal of Economics and Business Administration, 20-26.
[10] Theiss, H. (1983). On Terminology. Information Science in Action: System Design, 1,84-94.
[11] Thomson, M.E., & Solms, R.v. (1998). Information security awareness: educating your users effectively. Information Management & Computer Security, 6 (4), 167-173.
[12] Tipton, H.F., & Krause, M. (Eds.) (2004). Information Security Management Handbook (5th Edition ed.) U.S.A: CRC Press LC.
[13] Vroom, C., 7 R.v. Solms, 2004. Towards information security behavioral compliance. Computers & Security, 23(3): 191- 198.
Faculty of Information Management, University Technology MARA (UiTM), Shah Alam, MALAYSIA
No. of Downloads: 7 | No. of Views: 970
Sham Sul Kamal Wan Fakeh, Adnan Jamaludin, ZahariMohd Amin, Juwahir Ali,Ahmad, Soufien Othman, Yanti , Shah Alam, RahayuRambli, Zaharudin Ibrahim, NorZainaZaharah, A’dillah Mustafa, MohdRidzuan Ibrahim.
September 2015 - Vol 2, Issue 5