Information security behaviour : a descriptive analysis on a Malaysian public university

Ramlah Hussein, * and Fateema Lambensa, and Raja Baharuddin Anom, (2011) Information security behaviour : a descriptive analysis on a Malaysian public university. In: Symposium on Information & Computer Sciences (1st).


Download (154kB) | Preview


The critical issues of information security have gradually increased. Effective information security management require a great understanding both technological and human dimensions. Thus, the purpose of this research is to investigate the university student?s behavior towards information security and to examine factors influencing information security behavior. The study adopted the quantitative approach by conducting a survey among students in one of the public universities in Malaysia. Questionnaires were distributed to the targeted respondents. Then, the SPSS software was used to systematically analyze all data obtained and generate statistical information and detailed analyses of the survey results. This study is helpful in exploring issues related to information security behavior. Hopefully, this study contributed to an understanding of the influencing factors towards the university students? behavior in relation to information security.

Item Type: Conference or Workshop Item (Paper)
Additional Information: Second author is affiliated to the International Islamic University Malaysia, Kuliyah ICT; Third author is affiliated to Universiti Teknologi Malaysia, Dept. of Information Systems.
Uncontrolled Keywords: information security; security threat; information security behavior; Self-efficacy; Perceived Importance
Subjects: Q Science > QA Mathematics > QA75 Electronic computers. Computer science
Q Science > QA Mathematics > QA76 Computer software
Divisions: Sunway University > School of Engineering and Technology [formerly School of Science and Technology until 2020] > Dept. Computing and Information Systems
Depositing User: Administrator Admin
Date Deposited: 17 Oct 2012 03:38
Last Modified: 10 May 2019 08:41

Actions (login required)

View Item View Item