SlideShare a Scribd company logo
1 of 17
By: Zulhemay, M. N., Rohana, M. R., Zakaria, O.
FSTP, UPNM, Kuala Lumpur, Malaysia.
• The evolution of economy
• K-economy utilising information as key materials to operate and survive in the
market
• Economy has switched from being organised around the flow of things and
money to the flow of information (Drucker, 1992).
• Information is vital asset to organisation – secure the information is
paramount to company – information security is business process (Pipkin,
20000).
Agriculture Industrial Knowledge
Organisation
information Security
Utilise
Information
Protect by
Figure 1: The relationship between organisation and information security
Information SecurityInformation
Technical
solutions
Social-technical
solutions
Approaches
Firewall
Antivirus
software
Biometrics
Theexampleofthesolutions
Awareness
Training
Education
Figure 2: Approaches in information security
• This paper review relevant literatures regarding Information Security
Awareness (ISA) and suggest a structured approach of ISA programme for
organisation.
• Adapt Information Security (IS) process by (Pipkin, 2000).
• IS process can give general idea on security knowledge
• Security knowledge can help to reduce security incidents.
• A conceptual framework is proposed based on IS process to increase IS in
organisations.
• Content
• The information on how the desired results are to be achieved in practice (M.
Siponen, 2006).
• E.g., Johnson (2006) suggest the ideas on how to switch security awareness into
a better programme and highlight the important issues such as changing
employees perception towards security, topic that should be covered on
awareness programme the need for measuring effectiveness of the programme,
and security guidance.
• Rezgui and Marks (2008) indirectly provide the content to awareness
programme by exploring the factors that contribute to the security awareness of
staff in higher education and provide a number of recommendations to
promote security awareness. The recommendation is the example of ‘how the
desired results are to be achieved’ in promoting awareness programme.
• Evaluation
• Several authors acknowledge the significance of evaluating awareness
programme as the way to be better in securing information assets such present
in a number of literatures (i.e., (Albrechtsen & Hovden, 2010; Eminağaoğlu, Uçar,
& Eren, 2009; H. Kruger, Drevin, & Steyn, 2006; H. Kruger & Kearney, 2005)).
• I.e., Alarifi et al. (2012) study on awareness level among public in Saudi Arabia
using online survey.
• Without measurement, rating, metrics, or indicators, one cannot demonstrate
the value of information security effort especially to their top level management
(Eminağaoğlu et al., 2009; Herold, 2011).
• Framework
• Provide the relationships among the variables, explains the theory and describe
the direction of the relationships (Sekaran, 2007).
• Aggeliki, Maria, Spyros, and Evangelos (2012) analysed why security awareness
and training in the company failed to meet their goals and provide a framework
that enables the analysis of awareness activities by using actor network theory
(ANT).
• Zakaria (2013) adapt Schein’s organisational culture model to establish security
culture. In addition, the research concludes that one of the prerequisite to
establish security culture in an organisation is by having a structured security
awareness programme.
• H. Kruger et al. (2006); Thomson and Von Solms (1998) utilise social psychology
model in security awareness. (Chan & Wei, 2009) uses educational psychology
called conceptual change to embedded awareness to the students.
• Tools
• In terms of this study evice or implement to carry out a particular function.
• I.e., knowledge regarding information security is delivering by using game play
(Chun-Che, Khera, Depickere, Tantatsanawong, & Boonbrahm, 2008; Cone,
Irvine, Thompson, & Nguyen, 2007). Such therefore, game is a tool to deliver
awareness message.
• Based on our analysis, another popular tool develop by researchers is web
based application such as online portal, intranet and online learning such
present in (Chen, Shaw, & Yang, 2006; Shaw, Chen, Harris, & Huang, 2009).
• The themes provide us with several approaches towards effectiveness of information
security awareness. However, there is no research that provides a framework for
information security awareness programme based on information security processes.
• By identifying several themes of information security awareness strategy in the
previous section, we manage to prove that the human dimension of information
security such as awareness is not being neglected, at least in academic field. In
fact, the significance of human dimension on information security such as
awareness programme has been acknowledged in many literatures
• Nevertheless, it has gone quite far without noticing that there is an absent of realistic
function which is to introduce information security to the audience. As a result, only a
few security elements are being covered in awareness programme and it is not
structured according to the proper chronology of information security processes.
Also, it is not comprehensive in terms of not cover all aspects of information security
processes. Only favourite topics are being concern based on the previous issues
faced by the organisation or just randomly pick by the consultant or security officer.
INSPECTION
PROTECTION
DETECTION
REACTION
REFLECTION
Inspection is a process of
regulating and appraising the
relevant security level in the
organisation.
Protection is a proactive process
that enforces a secure
environment at the appropriate
level.
Detection is a reactive
process that identifies any
appropriate events.
Reaction is a response process
to a security incident.
Reflection is a follow-up
process that evaluates the
existing implementation of a
security system.
Adapt Pipkin’s information
security processes
Structured
security
awareness
in
organisation
Challenges /
Gap
Information
security risks
A structured information
security awareness
programme principles
An ideal situation
 Employees
aware on
security
processes
 Employees can
perform security
tasks
Establish
basic security
knowledge
Appropriate
security practices
Yes
Determine
No
Leads to
Develop
Revisited
Figure 3. A structured information security awareness framework
• We analysed and discuss the implication of the current approaches and
contribute to the body of knowledge by locating a structured information
security awareness.
• This study adapts Pipkin’s (2000) security processes into a structured security
awareness conceptual framework to investigate awareness programme
challenges within an organisation.
• Pipkin’s security processes has been choose based on the theory develop by
(Zakaria, 2013) where basic security knowledge can further help to increase
awareness amongst all level of employees of their security responsibilities
and promote a collective security responsibility.
• In order to enable employees to internalise security knowledge, organisation
need to establish appropriate (structured) information security awareness
programmes.
Alarifi, A., Tootell, H., & Hyland, P. (2012, 26-28 June 2012). A study of information security awareness and practices in Saudi Arabia. Paper presented at the Communications and Information
Technology (ICCIT), 2012 International Conference on.
Albrechtsen, E., & Hovden, J. (2010). Improving information security awareness and behaviour through dialogue, participation and collective reflection. An intervention study. Computers &
Security, 29(4), 432-445. doi: 10.1016/j.cose.2009.12.005
Anggeliki, T., Maria, K., Spyros, K., & Evangelos, K. (2012). Analyzing trajectories of information security awareness. Information Technology & People, 25(3), 327-352. doi:
10.1108/09593841211254358
Chen, C. C., Shaw, R. S., & Yang, S. C. (2006). Mitigating Information Security Risks by Increasing User Security Awareness: A Case Study of an Information Security Awareness System.
Information technology learning and performance journal, 24(1), 1-14.
Chun-Che, F., Khera, V., Depickere, A., Tantatsanawong, P., & Boonbrahm, P. (2008, 26-29 Feb. 2008). Raising information security awareness in digital ecosystem with games - a pilot study in
Thailand. Paper presented at the Digital Ecosystems and Technologies, 2008. DEST 2008. 2nd IEEE International Conference on.
Cone, B. D., Irvine, C. E., Thompson, M. F., & Nguyen, T. D. (2007). A video game for cyber security training and awareness. Computers & Security, 26(1), 63-72. doi: 10.1016/j.cose.2006.10.005
Drucker, P. F. (1992). The Economy’s Power Shift. The Wall Street journal. Eastern edition.
Eminağaoğlu, M., Uçar, E., & Eren, Ş. (2009). The positive outcomes of information security awareness training in companies – A case study. Information Security Technical Report, 14(4), 223-
229. doi: 10.1016/j.istr.2010.05.002.
Herold, R. (2011). Managing an information security and privacy awareness and training program Information Security Management Handbook (2nd ed.). Boca Raton, Fla.: CRC Press.
Johnson, E. C. (2006). Security awareness: switch to a better programme. Network Security, 2006(2), 15-18.
Kruger, H., Drevin, L., & Steyn, T. (2006). A framework for evaluating ICT security awareness. Paper presented at the Proceeding of the Information Security South Africa (ISSA), Johannesburg,
South Africa.
Kruger, H., & Kearney, W. (2005). Measuring information security awareness: a west africa gold mining environment case study. Paper presented at the Proceedings of the ISSA 2005 New
Knowledge Today Conference, Balalaika Hotel, Sandton, South Africa 2005. http://icsa.cs.up.ac.za/issa/2005/Proceedings/Full/018_Article.pdf.
Pipkin, D. L. (2000). Information security: Protecting the global enterprise Upper Saddle River, New Jersey.: Prentice Hall.
Rezgui, Y., & Marks, A. (2008). Information security awareness in higher education: An exploratory study. Computers & Security, 27(7–8), 241-253. doi:
http://dx.doi.org/10.1016/j.cose.2008.07.008
Sekaran, U. (2007). Research Methods for Business (4 ed.). New Delhi: Wiley India.
Siponen, M. (2006). Information security standards focus on the existence of process, not its content. Commun. ACM, 49(8), 97-100. doi: 10.1145/1145287.114531.
Shaw, R. S., Chen, C. C., Harris, A. L., & Huang, H.-J. (2009). The impact of information richness on information security awareness training effectiveness. Computers & Education, 52(1), 92-100.
doi: http://dx.doi.org/10.1016/j.compedu.2008.06.011
Zakaria, O. (2013). Information Security Culture: A Human Firewall Approach. German: Lambert Academic Publishing.

More Related Content

What's hot

INVESTIGATING THE DETERMINANTS OF COLLEGE STUDENTS INFORMATION SECURITY BEHAV...
INVESTIGATING THE DETERMINANTS OF COLLEGE STUDENTS INFORMATION SECURITY BEHAV...INVESTIGATING THE DETERMINANTS OF COLLEGE STUDENTS INFORMATION SECURITY BEHAV...
INVESTIGATING THE DETERMINANTS OF COLLEGE STUDENTS INFORMATION SECURITY BEHAV...ijcsit
 
ADOPTION OF CLOUD COMPUTING IN HIGHER EDUCATION INSTITUTION IN NIGERIA
ADOPTION OF CLOUD COMPUTING IN HIGHER EDUCATION INSTITUTION IN NIGERIAADOPTION OF CLOUD COMPUTING IN HIGHER EDUCATION INSTITUTION IN NIGERIA
ADOPTION OF CLOUD COMPUTING IN HIGHER EDUCATION INSTITUTION IN NIGERIAijiert bestjournal
 
Multimedia based IoT-centric smart framework for eLearning paradigm Muhammad ...
Multimedia based IoT-centric smart framework for eLearning paradigm Muhammad ...Multimedia based IoT-centric smart framework for eLearning paradigm Muhammad ...
Multimedia based IoT-centric smart framework for eLearning paradigm Muhammad ...eraser Juan José Calderón
 
IoT-based students interaction framework using attention-scoring assessment i...
IoT-based students interaction framework using attention-scoring assessment i...IoT-based students interaction framework using attention-scoring assessment i...
IoT-based students interaction framework using attention-scoring assessment i...eraser Juan José Calderón
 
Journal of Information Technology Education/tutorialoutletdotcom
Journal of Information Technology Education/tutorialoutletdotcomJournal of Information Technology Education/tutorialoutletdotcom
Journal of Information Technology Education/tutorialoutletdotcomwilliamtrumpz5m
 
Security and personnel bp11521
Security and personnel bp11521Security and personnel bp11521
Security and personnel bp11521Merlin Florrence
 
120321 IAPS Some things Prep Heads need to know about ICT
120321 IAPS Some things Prep Heads need to know about ICT120321 IAPS Some things Prep Heads need to know about ICT
120321 IAPS Some things Prep Heads need to know about ICTMark S. Steed
 
Conceptualizing Information Technology Governance Model for Higher Education:...
Conceptualizing Information Technology Governance Model for Higher Education:...Conceptualizing Information Technology Governance Model for Higher Education:...
Conceptualizing Information Technology Governance Model for Higher Education:...journalBEEI
 
MAKING LEARNING STRESS-FREE TO SAVE THE CHILDREN: NEW THEORIES AND STRATEGIES
MAKING LEARNING STRESS-FREE TO SAVE THE CHILDREN: NEW THEORIES AND STRATEGIES MAKING LEARNING STRESS-FREE TO SAVE THE CHILDREN: NEW THEORIES AND STRATEGIES
MAKING LEARNING STRESS-FREE TO SAVE THE CHILDREN: NEW THEORIES AND STRATEGIES Dr. Raju M. Mathew
 
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAEIT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE360 BSI
 

What's hot (17)

Digital Portfolios
Digital PortfoliosDigital Portfolios
Digital Portfolios
 
INVESTIGATING THE DETERMINANTS OF COLLEGE STUDENTS INFORMATION SECURITY BEHAV...
INVESTIGATING THE DETERMINANTS OF COLLEGE STUDENTS INFORMATION SECURITY BEHAV...INVESTIGATING THE DETERMINANTS OF COLLEGE STUDENTS INFORMATION SECURITY BEHAV...
INVESTIGATING THE DETERMINANTS OF COLLEGE STUDENTS INFORMATION SECURITY BEHAV...
 
Game based learning for safety and security education
Game based learning for safety and security educationGame based learning for safety and security education
Game based learning for safety and security education
 
ADOPTION OF CLOUD COMPUTING IN HIGHER EDUCATION INSTITUTION IN NIGERIA
ADOPTION OF CLOUD COMPUTING IN HIGHER EDUCATION INSTITUTION IN NIGERIAADOPTION OF CLOUD COMPUTING IN HIGHER EDUCATION INSTITUTION IN NIGERIA
ADOPTION OF CLOUD COMPUTING IN HIGHER EDUCATION INSTITUTION IN NIGERIA
 
Multimedia based IoT-centric smart framework for eLearning paradigm Muhammad ...
Multimedia based IoT-centric smart framework for eLearning paradigm Muhammad ...Multimedia based IoT-centric smart framework for eLearning paradigm Muhammad ...
Multimedia based IoT-centric smart framework for eLearning paradigm Muhammad ...
 
IoT-based students interaction framework using attention-scoring assessment i...
IoT-based students interaction framework using attention-scoring assessment i...IoT-based students interaction framework using attention-scoring assessment i...
IoT-based students interaction framework using attention-scoring assessment i...
 
Journal of Information Technology Education/tutorialoutletdotcom
Journal of Information Technology Education/tutorialoutletdotcomJournal of Information Technology Education/tutorialoutletdotcom
Journal of Information Technology Education/tutorialoutletdotcom
 
Security and personnel bp11521
Security and personnel bp11521Security and personnel bp11521
Security and personnel bp11521
 
TAM
TAMTAM
TAM
 
120321 IAPS Some things Prep Heads need to know about ICT
120321 IAPS Some things Prep Heads need to know about ICT120321 IAPS Some things Prep Heads need to know about ICT
120321 IAPS Some things Prep Heads need to know about ICT
 
Ijcatr04041023
Ijcatr04041023Ijcatr04041023
Ijcatr04041023
 
Personnel security
Personnel securityPersonnel security
Personnel security
 
information management
information managementinformation management
information management
 
Conceptualizing Information Technology Governance Model for Higher Education:...
Conceptualizing Information Technology Governance Model for Higher Education:...Conceptualizing Information Technology Governance Model for Higher Education:...
Conceptualizing Information Technology Governance Model for Higher Education:...
 
MAKING LEARNING STRESS-FREE TO SAVE THE CHILDREN: NEW THEORIES AND STRATEGIES
MAKING LEARNING STRESS-FREE TO SAVE THE CHILDREN: NEW THEORIES AND STRATEGIES MAKING LEARNING STRESS-FREE TO SAVE THE CHILDREN: NEW THEORIES AND STRATEGIES
MAKING LEARNING STRESS-FREE TO SAVE THE CHILDREN: NEW THEORIES AND STRATEGIES
 
E LEARNING
E LEARNINGE LEARNING
E LEARNING
 
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAEIT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
 

Viewers also liked

Information Security Awareness Training (En)_Information Security Awareness F...
Information Security Awareness Training (En)_Information Security Awareness F...Information Security Awareness Training (En)_Information Security Awareness F...
Information Security Awareness Training (En)_Information Security Awareness F...Shah Nawaj Ahmad
 
Saahil Goel Information Security Awareness Amongst Top Management
Saahil Goel Information Security Awareness Amongst Top ManagementSaahil Goel Information Security Awareness Amongst Top Management
Saahil Goel Information Security Awareness Amongst Top ManagementSaahil Goel
 
Elements of an Information Security Awareness Program
Elements of an Information Security Awareness ProgramElements of an Information Security Awareness Program
Elements of an Information Security Awareness ProgramBarry Caplin
 
Information security (un)awareness by Marc Vael
Information security (un)awareness by Marc VaelInformation security (un)awareness by Marc Vael
Information security (un)awareness by Marc VaelCONFENIS 2012
 
CISSP Information Systems Security Training Course
CISSP Information Systems Security Training CourseCISSP Information Systems Security Training Course
CISSP Information Systems Security Training CourseSalim Karim
 
Information Security Awareness Training Open
Information Security Awareness Training OpenInformation Security Awareness Training Open
Information Security Awareness Training OpenFred Beck MBA, CPA
 
New Hire Information Security Awareness
New Hire Information Security AwarenessNew Hire Information Security Awareness
New Hire Information Security Awarenesshubbargf
 
Information Security Awareness Training
Information Security Awareness TrainingInformation Security Awareness Training
Information Security Awareness TrainingRandy Bowman
 
UW School of Medicine Social Engineering and Phishing Awareness
UW School of Medicine   Social Engineering and Phishing AwarenessUW School of Medicine   Social Engineering and Phishing Awareness
UW School of Medicine Social Engineering and Phishing AwarenessNicholas Davis
 
Social engineering-Attack of the Human Behavior
Social engineering-Attack of the Human BehaviorSocial engineering-Attack of the Human Behavior
Social engineering-Attack of the Human BehaviorJames Krusic
 
What Do Real Women Look Like? 100 Stock Photos of Real Women
What Do Real Women Look Like? 100 Stock Photos of Real WomenWhat Do Real Women Look Like? 100 Stock Photos of Real Women
What Do Real Women Look Like? 100 Stock Photos of Real WomenTwenty20 Inc.
 

Viewers also liked (13)

Information Security Awareness Training (En)_Information Security Awareness F...
Information Security Awareness Training (En)_Information Security Awareness F...Information Security Awareness Training (En)_Information Security Awareness F...
Information Security Awareness Training (En)_Information Security Awareness F...
 
Saahil Goel Information Security Awareness Amongst Top Management
Saahil Goel Information Security Awareness Amongst Top ManagementSaahil Goel Information Security Awareness Amongst Top Management
Saahil Goel Information Security Awareness Amongst Top Management
 
Elements of an Information Security Awareness Program
Elements of an Information Security Awareness ProgramElements of an Information Security Awareness Program
Elements of an Information Security Awareness Program
 
Information security (un)awareness by Marc Vael
Information security (un)awareness by Marc VaelInformation security (un)awareness by Marc Vael
Information security (un)awareness by Marc Vael
 
Information security awareness, middle management
Information security awareness, middle managementInformation security awareness, middle management
Information security awareness, middle management
 
CISSP Information Systems Security Training Course
CISSP Information Systems Security Training CourseCISSP Information Systems Security Training Course
CISSP Information Systems Security Training Course
 
Information Security Awareness Training Open
Information Security Awareness Training OpenInformation Security Awareness Training Open
Information Security Awareness Training Open
 
New Hire Information Security Awareness
New Hire Information Security AwarenessNew Hire Information Security Awareness
New Hire Information Security Awareness
 
Information Security Awareness Training
Information Security Awareness TrainingInformation Security Awareness Training
Information Security Awareness Training
 
UW School of Medicine Social Engineering and Phishing Awareness
UW School of Medicine   Social Engineering and Phishing AwarenessUW School of Medicine   Social Engineering and Phishing Awareness
UW School of Medicine Social Engineering and Phishing Awareness
 
Social engineering-Attack of the Human Behavior
Social engineering-Attack of the Human BehaviorSocial engineering-Attack of the Human Behavior
Social engineering-Attack of the Human Behavior
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
What Do Real Women Look Like? 100 Stock Photos of Real Women
What Do Real Women Look Like? 100 Stock Photos of Real WomenWhat Do Real Women Look Like? 100 Stock Photos of Real Women
What Do Real Women Look Like? 100 Stock Photos of Real Women
 

Similar to Towards a Structured Information Security Awareness Programme

Recapitulating the development initiatives of a robust information security s...
Recapitulating the development initiatives of a robust information security s...Recapitulating the development initiatives of a robust information security s...
Recapitulating the development initiatives of a robust information security s...IOSR Journals
 
An information security governance framework
An information security governance frameworkAn information security governance framework
An information security governance frameworkAnne ndolo
 
Improving Delivery Effectiveness of Information Security Learning Continuum
Improving Delivery Effectiveness of Information Security Learning ContinuumImproving Delivery Effectiveness of Information Security Learning Continuum
Improving Delivery Effectiveness of Information Security Learning ContinuumMansoor Faridi, CISA
 
Fissea09 mgupta-day3-panel process-program-build-effective-training
Fissea09 mgupta-day3-panel process-program-build-effective-trainingFissea09 mgupta-day3-panel process-program-build-effective-training
Fissea09 mgupta-day3-panel process-program-build-effective-trainingSwati Gupta
 
Electronic Healthcare Record Security and Management in Healthcare Organizations
Electronic Healthcare Record Security and Management in Healthcare OrganizationsElectronic Healthcare Record Security and Management in Healthcare Organizations
Electronic Healthcare Record Security and Management in Healthcare Organizationsijtsrd
 
A Descriptive Review And Classification Of Organizational Information Securit...
A Descriptive Review And Classification Of Organizational Information Securit...A Descriptive Review And Classification Of Organizational Information Securit...
A Descriptive Review And Classification Of Organizational Information Securit...Brandi Gonzales
 
Deepening the knowledge on information security management in developing coun...
Deepening the knowledge on information security management in developing coun...Deepening the knowledge on information security management in developing coun...
Deepening the knowledge on information security management in developing coun...Alexander Decker
 
Implementing Best Practices.pptx
Implementing Best Practices.pptxImplementing Best Practices.pptx
Implementing Best Practices.pptxdamilolasunmola
 
Running Head STATEMENT OF WORKSTATEMENT OF WORK .docx
Running Head STATEMENT OF WORKSTATEMENT OF WORK                .docxRunning Head STATEMENT OF WORKSTATEMENT OF WORK                .docx
Running Head STATEMENT OF WORKSTATEMENT OF WORK .docxtoltonkendal
 
Implementing cybersecurity best practices and new technology ppt (1).pptx
Implementing cybersecurity best practices and new technology ppt (1).pptxImplementing cybersecurity best practices and new technology ppt (1).pptx
Implementing cybersecurity best practices and new technology ppt (1).pptxdamilolasunmola
 
A Critical Analysis Of Information Security -A Case Study Of Cognizant Techno...
A Critical Analysis Of Information Security -A Case Study Of Cognizant Techno...A Critical Analysis Of Information Security -A Case Study Of Cognizant Techno...
A Critical Analysis Of Information Security -A Case Study Of Cognizant Techno...Finni Rice
 
Ics 3210 information systems security and audit - edited
Ics 3210   information systems security and audit - editedIcs 3210   information systems security and audit - edited
Ics 3210 information systems security and audit - editedNelson Kimathi
 
Design and Implementation Security Model for Sudanese E-government
Design and Implementation Security Model for Sudanese E-governmentDesign and Implementation Security Model for Sudanese E-government
Design and Implementation Security Model for Sudanese E-governmentEditor IJCATR
 
Information Systems Security & Strategy
Information Systems Security & StrategyInformation Systems Security & Strategy
Information Systems Security & StrategyTony Hauxwell
 
AN EFFECTIVE METHOD FOR INFORMATION SECURITY AWARENESS RAISING INITIATIVES
AN EFFECTIVE METHOD FOR INFORMATION SECURITY AWARENESS RAISING INITIATIVESAN EFFECTIVE METHOD FOR INFORMATION SECURITY AWARENESS RAISING INITIATIVES
AN EFFECTIVE METHOD FOR INFORMATION SECURITY AWARENESS RAISING INITIATIVESijcsit
 
Information Security Management System: Emerging Issues and Prospect
Information Security Management System: Emerging Issues and ProspectInformation Security Management System: Emerging Issues and Prospect
Information Security Management System: Emerging Issues and ProspectIOSR Journals
 
Multi-Dimensional Privacy Protection for Digital Collaborations.
Multi-Dimensional Privacy Protection for Digital Collaborations.Multi-Dimensional Privacy Protection for Digital Collaborations.
Multi-Dimensional Privacy Protection for Digital Collaborations.CSCJournals
 
2 Security And Internet Security
2 Security And Internet Security2 Security And Internet Security
2 Security And Internet SecurityAna Meskovska
 
End User Security Awareness Presentation
End User Security Awareness PresentationEnd User Security Awareness Presentation
End User Security Awareness PresentationCristian Mihai
 
Assimilation Of Security-Related Policies In U.S. Firms An Empirical Study O...
Assimilation Of Security-Related Policies In U.S. Firms  An Empirical Study O...Assimilation Of Security-Related Policies In U.S. Firms  An Empirical Study O...
Assimilation Of Security-Related Policies In U.S. Firms An Empirical Study O...Angie Miller
 

Similar to Towards a Structured Information Security Awareness Programme (20)

Recapitulating the development initiatives of a robust information security s...
Recapitulating the development initiatives of a robust information security s...Recapitulating the development initiatives of a robust information security s...
Recapitulating the development initiatives of a robust information security s...
 
An information security governance framework
An information security governance frameworkAn information security governance framework
An information security governance framework
 
Improving Delivery Effectiveness of Information Security Learning Continuum
Improving Delivery Effectiveness of Information Security Learning ContinuumImproving Delivery Effectiveness of Information Security Learning Continuum
Improving Delivery Effectiveness of Information Security Learning Continuum
 
Fissea09 mgupta-day3-panel process-program-build-effective-training
Fissea09 mgupta-day3-panel process-program-build-effective-trainingFissea09 mgupta-day3-panel process-program-build-effective-training
Fissea09 mgupta-day3-panel process-program-build-effective-training
 
Electronic Healthcare Record Security and Management in Healthcare Organizations
Electronic Healthcare Record Security and Management in Healthcare OrganizationsElectronic Healthcare Record Security and Management in Healthcare Organizations
Electronic Healthcare Record Security and Management in Healthcare Organizations
 
A Descriptive Review And Classification Of Organizational Information Securit...
A Descriptive Review And Classification Of Organizational Information Securit...A Descriptive Review And Classification Of Organizational Information Securit...
A Descriptive Review And Classification Of Organizational Information Securit...
 
Deepening the knowledge on information security management in developing coun...
Deepening the knowledge on information security management in developing coun...Deepening the knowledge on information security management in developing coun...
Deepening the knowledge on information security management in developing coun...
 
Implementing Best Practices.pptx
Implementing Best Practices.pptxImplementing Best Practices.pptx
Implementing Best Practices.pptx
 
Running Head STATEMENT OF WORKSTATEMENT OF WORK .docx
Running Head STATEMENT OF WORKSTATEMENT OF WORK                .docxRunning Head STATEMENT OF WORKSTATEMENT OF WORK                .docx
Running Head STATEMENT OF WORKSTATEMENT OF WORK .docx
 
Implementing cybersecurity best practices and new technology ppt (1).pptx
Implementing cybersecurity best practices and new technology ppt (1).pptxImplementing cybersecurity best practices and new technology ppt (1).pptx
Implementing cybersecurity best practices and new technology ppt (1).pptx
 
A Critical Analysis Of Information Security -A Case Study Of Cognizant Techno...
A Critical Analysis Of Information Security -A Case Study Of Cognizant Techno...A Critical Analysis Of Information Security -A Case Study Of Cognizant Techno...
A Critical Analysis Of Information Security -A Case Study Of Cognizant Techno...
 
Ics 3210 information systems security and audit - edited
Ics 3210   information systems security and audit - editedIcs 3210   information systems security and audit - edited
Ics 3210 information systems security and audit - edited
 
Design and Implementation Security Model for Sudanese E-government
Design and Implementation Security Model for Sudanese E-governmentDesign and Implementation Security Model for Sudanese E-government
Design and Implementation Security Model for Sudanese E-government
 
Information Systems Security & Strategy
Information Systems Security & StrategyInformation Systems Security & Strategy
Information Systems Security & Strategy
 
AN EFFECTIVE METHOD FOR INFORMATION SECURITY AWARENESS RAISING INITIATIVES
AN EFFECTIVE METHOD FOR INFORMATION SECURITY AWARENESS RAISING INITIATIVESAN EFFECTIVE METHOD FOR INFORMATION SECURITY AWARENESS RAISING INITIATIVES
AN EFFECTIVE METHOD FOR INFORMATION SECURITY AWARENESS RAISING INITIATIVES
 
Information Security Management System: Emerging Issues and Prospect
Information Security Management System: Emerging Issues and ProspectInformation Security Management System: Emerging Issues and Prospect
Information Security Management System: Emerging Issues and Prospect
 
Multi-Dimensional Privacy Protection for Digital Collaborations.
Multi-Dimensional Privacy Protection for Digital Collaborations.Multi-Dimensional Privacy Protection for Digital Collaborations.
Multi-Dimensional Privacy Protection for Digital Collaborations.
 
2 Security And Internet Security
2 Security And Internet Security2 Security And Internet Security
2 Security And Internet Security
 
End User Security Awareness Presentation
End User Security Awareness PresentationEnd User Security Awareness Presentation
End User Security Awareness Presentation
 
Assimilation Of Security-Related Policies In U.S. Firms An Empirical Study O...
Assimilation Of Security-Related Policies In U.S. Firms  An Empirical Study O...Assimilation Of Security-Related Policies In U.S. Firms  An Empirical Study O...
Assimilation Of Security-Related Policies In U.S. Firms An Empirical Study O...
 

More from tulipbiru64

Towards The Curated web
Towards The Curated webTowards The Curated web
Towards The Curated webtulipbiru64
 
Kajian Kepuasan Pengguna Terhadap Kualiti Perkhidmatan Ruang Pembelajaran di ...
Kajian Kepuasan Pengguna Terhadap Kualiti Perkhidmatan Ruang Pembelajaran di ...Kajian Kepuasan Pengguna Terhadap Kualiti Perkhidmatan Ruang Pembelajaran di ...
Kajian Kepuasan Pengguna Terhadap Kualiti Perkhidmatan Ruang Pembelajaran di ...tulipbiru64
 
Multi-factor Information Security Risk in Information System
Multi-factor Information Security Risk in Information SystemMulti-factor Information Security Risk in Information System
Multi-factor Information Security Risk in Information Systemtulipbiru64
 
Informative Centers' Intelligent Agent Based Model - a preliminary study
Informative Centers' Intelligent Agent Based Model - a preliminary studyInformative Centers' Intelligent Agent Based Model - a preliminary study
Informative Centers' Intelligent Agent Based Model - a preliminary studytulipbiru64
 
Research Data Management: Our Role
Research Data Management: Our RoleResearch Data Management: Our Role
Research Data Management: Our Roletulipbiru64
 
Transforming The Academic Library Services For Generation Y Using Knowledge M...
Transforming The Academic Library Services For Generation Y Using Knowledge M...Transforming The Academic Library Services For Generation Y Using Knowledge M...
Transforming The Academic Library Services For Generation Y Using Knowledge M...tulipbiru64
 
Repositori Institusi Isu Dan Cabaran: Kajian Kes Perpustakaan Universiti Tekn...
Repositori Institusi Isu Dan Cabaran: Kajian Kes Perpustakaan Universiti Tekn...Repositori Institusi Isu Dan Cabaran: Kajian Kes Perpustakaan Universiti Tekn...
Repositori Institusi Isu Dan Cabaran: Kajian Kes Perpustakaan Universiti Tekn...tulipbiru64
 
Social Tagging/Bookmarking Application: The Usage In Academic Libraries
Social Tagging/Bookmarking Application: The Usage In Academic LibrariesSocial Tagging/Bookmarking Application: The Usage In Academic Libraries
Social Tagging/Bookmarking Application: The Usage In Academic Librariestulipbiru64
 
e-Books: Putting Librarians And Researchers 'In The Know'
e-Books: Putting Librarians And Researchers 'In The Know'e-Books: Putting Librarians And Researchers 'In The Know'
e-Books: Putting Librarians And Researchers 'In The Know'tulipbiru64
 
Measurement Of Values And Performance For The Institutions Of Higher Educatio...
Measurement Of Values And Performance For The Institutions Of Higher Educatio...Measurement Of Values And Performance For The Institutions Of Higher Educatio...
Measurement Of Values And Performance For The Institutions Of Higher Educatio...tulipbiru64
 
Keynote Speech by YBhg. Profesor Datuk Dr. Shahrin Sahib, Vice Chancellor UTeM
Keynote Speech by YBhg. Profesor Datuk Dr. Shahrin Sahib, Vice Chancellor UTeMKeynote Speech by YBhg. Profesor Datuk Dr. Shahrin Sahib, Vice Chancellor UTeM
Keynote Speech by YBhg. Profesor Datuk Dr. Shahrin Sahib, Vice Chancellor UTeMtulipbiru64
 
Repository : A Brief Comparative Study Between The National University Of Mal...
Repository : A Brief Comparative Study Between The National University Of Mal...Repository : A Brief Comparative Study Between The National University Of Mal...
Repository : A Brief Comparative Study Between The National University Of Mal...tulipbiru64
 
Mobile OPAC Prototype Based On Koha Open Source Integrated Library System
Mobile OPAC Prototype Based On Koha Open Source Integrated Library SystemMobile OPAC Prototype Based On Koha Open Source Integrated Library System
Mobile OPAC Prototype Based On Koha Open Source Integrated Library Systemtulipbiru64
 
Kajian Tinjauan Tanggapan Pengguna Terhadap Profesion Pustakawan Dalam Kalang...
Kajian Tinjauan Tanggapan Pengguna Terhadap Profesion Pustakawan Dalam Kalang...Kajian Tinjauan Tanggapan Pengguna Terhadap Profesion Pustakawan Dalam Kalang...
Kajian Tinjauan Tanggapan Pengguna Terhadap Profesion Pustakawan Dalam Kalang...tulipbiru64
 
Corporate Social Responsibility (CSR) And Library Collaborative Partnership
Corporate Social Responsibility (CSR) And Library Collaborative PartnershipCorporate Social Responsibility (CSR) And Library Collaborative Partnership
Corporate Social Responsibility (CSR) And Library Collaborative Partnershiptulipbiru64
 
The Effectiveness Of Searching Arabic Resources Through OPAC : A Case Study I...
The Effectiveness Of Searching Arabic Resources Through OPAC : A Case Study I...The Effectiveness Of Searching Arabic Resources Through OPAC : A Case Study I...
The Effectiveness Of Searching Arabic Resources Through OPAC : A Case Study I...tulipbiru64
 
Library Usage Among Medical Students In The Faculty Of Medicine And Health Sc...
Library Usage Among Medical Students In The Faculty Of Medicine And Health Sc...Library Usage Among Medical Students In The Faculty Of Medicine And Health Sc...
Library Usage Among Medical Students In The Faculty Of Medicine And Health Sc...tulipbiru64
 
Kajian Kepuasan Pelanggan Di Perpustakaan UTHM Dalam Meningkatkan Kualiti Per...
Kajian Kepuasan Pelanggan Di Perpustakaan UTHM Dalam Meningkatkan Kualiti Per...Kajian Kepuasan Pelanggan Di Perpustakaan UTHM Dalam Meningkatkan Kualiti Per...
Kajian Kepuasan Pelanggan Di Perpustakaan UTHM Dalam Meningkatkan Kualiti Per...tulipbiru64
 
An Assessment Of The Effectiveness Of Library Resources And Services In Suppo...
An Assessment Of The Effectiveness Of Library Resources And Services In Suppo...An Assessment Of The Effectiveness Of Library Resources And Services In Suppo...
An Assessment Of The Effectiveness Of Library Resources And Services In Suppo...tulipbiru64
 

More from tulipbiru64 (20)

Towards The Curated web
Towards The Curated webTowards The Curated web
Towards The Curated web
 
Kajian Kepuasan Pengguna Terhadap Kualiti Perkhidmatan Ruang Pembelajaran di ...
Kajian Kepuasan Pengguna Terhadap Kualiti Perkhidmatan Ruang Pembelajaran di ...Kajian Kepuasan Pengguna Terhadap Kualiti Perkhidmatan Ruang Pembelajaran di ...
Kajian Kepuasan Pengguna Terhadap Kualiti Perkhidmatan Ruang Pembelajaran di ...
 
Multi-factor Information Security Risk in Information System
Multi-factor Information Security Risk in Information SystemMulti-factor Information Security Risk in Information System
Multi-factor Information Security Risk in Information System
 
Informative Centers' Intelligent Agent Based Model - a preliminary study
Informative Centers' Intelligent Agent Based Model - a preliminary studyInformative Centers' Intelligent Agent Based Model - a preliminary study
Informative Centers' Intelligent Agent Based Model - a preliminary study
 
Research Data Management: Our Role
Research Data Management: Our RoleResearch Data Management: Our Role
Research Data Management: Our Role
 
Transforming The Academic Library Services For Generation Y Using Knowledge M...
Transforming The Academic Library Services For Generation Y Using Knowledge M...Transforming The Academic Library Services For Generation Y Using Knowledge M...
Transforming The Academic Library Services For Generation Y Using Knowledge M...
 
Repositori Institusi Isu Dan Cabaran: Kajian Kes Perpustakaan Universiti Tekn...
Repositori Institusi Isu Dan Cabaran: Kajian Kes Perpustakaan Universiti Tekn...Repositori Institusi Isu Dan Cabaran: Kajian Kes Perpustakaan Universiti Tekn...
Repositori Institusi Isu Dan Cabaran: Kajian Kes Perpustakaan Universiti Tekn...
 
Social Tagging/Bookmarking Application: The Usage In Academic Libraries
Social Tagging/Bookmarking Application: The Usage In Academic LibrariesSocial Tagging/Bookmarking Application: The Usage In Academic Libraries
Social Tagging/Bookmarking Application: The Usage In Academic Libraries
 
e-Books: Putting Librarians And Researchers 'In The Know'
e-Books: Putting Librarians And Researchers 'In The Know'e-Books: Putting Librarians And Researchers 'In The Know'
e-Books: Putting Librarians And Researchers 'In The Know'
 
Buku Masa Depan
Buku Masa DepanBuku Masa Depan
Buku Masa Depan
 
Measurement Of Values And Performance For The Institutions Of Higher Educatio...
Measurement Of Values And Performance For The Institutions Of Higher Educatio...Measurement Of Values And Performance For The Institutions Of Higher Educatio...
Measurement Of Values And Performance For The Institutions Of Higher Educatio...
 
Keynote Speech by YBhg. Profesor Datuk Dr. Shahrin Sahib, Vice Chancellor UTeM
Keynote Speech by YBhg. Profesor Datuk Dr. Shahrin Sahib, Vice Chancellor UTeMKeynote Speech by YBhg. Profesor Datuk Dr. Shahrin Sahib, Vice Chancellor UTeM
Keynote Speech by YBhg. Profesor Datuk Dr. Shahrin Sahib, Vice Chancellor UTeM
 
Repository : A Brief Comparative Study Between The National University Of Mal...
Repository : A Brief Comparative Study Between The National University Of Mal...Repository : A Brief Comparative Study Between The National University Of Mal...
Repository : A Brief Comparative Study Between The National University Of Mal...
 
Mobile OPAC Prototype Based On Koha Open Source Integrated Library System
Mobile OPAC Prototype Based On Koha Open Source Integrated Library SystemMobile OPAC Prototype Based On Koha Open Source Integrated Library System
Mobile OPAC Prototype Based On Koha Open Source Integrated Library System
 
Kajian Tinjauan Tanggapan Pengguna Terhadap Profesion Pustakawan Dalam Kalang...
Kajian Tinjauan Tanggapan Pengguna Terhadap Profesion Pustakawan Dalam Kalang...Kajian Tinjauan Tanggapan Pengguna Terhadap Profesion Pustakawan Dalam Kalang...
Kajian Tinjauan Tanggapan Pengguna Terhadap Profesion Pustakawan Dalam Kalang...
 
Corporate Social Responsibility (CSR) And Library Collaborative Partnership
Corporate Social Responsibility (CSR) And Library Collaborative PartnershipCorporate Social Responsibility (CSR) And Library Collaborative Partnership
Corporate Social Responsibility (CSR) And Library Collaborative Partnership
 
The Effectiveness Of Searching Arabic Resources Through OPAC : A Case Study I...
The Effectiveness Of Searching Arabic Resources Through OPAC : A Case Study I...The Effectiveness Of Searching Arabic Resources Through OPAC : A Case Study I...
The Effectiveness Of Searching Arabic Resources Through OPAC : A Case Study I...
 
Library Usage Among Medical Students In The Faculty Of Medicine And Health Sc...
Library Usage Among Medical Students In The Faculty Of Medicine And Health Sc...Library Usage Among Medical Students In The Faculty Of Medicine And Health Sc...
Library Usage Among Medical Students In The Faculty Of Medicine And Health Sc...
 
Kajian Kepuasan Pelanggan Di Perpustakaan UTHM Dalam Meningkatkan Kualiti Per...
Kajian Kepuasan Pelanggan Di Perpustakaan UTHM Dalam Meningkatkan Kualiti Per...Kajian Kepuasan Pelanggan Di Perpustakaan UTHM Dalam Meningkatkan Kualiti Per...
Kajian Kepuasan Pelanggan Di Perpustakaan UTHM Dalam Meningkatkan Kualiti Per...
 
An Assessment Of The Effectiveness Of Library Resources And Services In Suppo...
An Assessment Of The Effectiveness Of Library Resources And Services In Suppo...An Assessment Of The Effectiveness Of Library Resources And Services In Suppo...
An Assessment Of The Effectiveness Of Library Resources And Services In Suppo...
 

Recently uploaded

Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room servicediscovermytutordmt
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...christianmathematics
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...Sapna Thakur
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfchloefrazer622
 
General AI for Medical Educators April 2024
General AI for Medical Educators April 2024General AI for Medical Educators April 2024
General AI for Medical Educators April 2024Janet Corral
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 

Recently uploaded (20)

Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room service
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdf
 
General AI for Medical Educators April 2024
General AI for Medical Educators April 2024General AI for Medical Educators April 2024
General AI for Medical Educators April 2024
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 

Towards a Structured Information Security Awareness Programme

  • 1. By: Zulhemay, M. N., Rohana, M. R., Zakaria, O. FSTP, UPNM, Kuala Lumpur, Malaysia.
  • 2. • The evolution of economy • K-economy utilising information as key materials to operate and survive in the market • Economy has switched from being organised around the flow of things and money to the flow of information (Drucker, 1992). • Information is vital asset to organisation – secure the information is paramount to company – information security is business process (Pipkin, 20000). Agriculture Industrial Knowledge
  • 3. Organisation information Security Utilise Information Protect by Figure 1: The relationship between organisation and information security
  • 4.
  • 5.
  • 7. • This paper review relevant literatures regarding Information Security Awareness (ISA) and suggest a structured approach of ISA programme for organisation. • Adapt Information Security (IS) process by (Pipkin, 2000). • IS process can give general idea on security knowledge • Security knowledge can help to reduce security incidents. • A conceptual framework is proposed based on IS process to increase IS in organisations.
  • 8. • Content • The information on how the desired results are to be achieved in practice (M. Siponen, 2006). • E.g., Johnson (2006) suggest the ideas on how to switch security awareness into a better programme and highlight the important issues such as changing employees perception towards security, topic that should be covered on awareness programme the need for measuring effectiveness of the programme, and security guidance. • Rezgui and Marks (2008) indirectly provide the content to awareness programme by exploring the factors that contribute to the security awareness of staff in higher education and provide a number of recommendations to promote security awareness. The recommendation is the example of ‘how the desired results are to be achieved’ in promoting awareness programme.
  • 9. • Evaluation • Several authors acknowledge the significance of evaluating awareness programme as the way to be better in securing information assets such present in a number of literatures (i.e., (Albrechtsen & Hovden, 2010; Eminağaoğlu, Uçar, & Eren, 2009; H. Kruger, Drevin, & Steyn, 2006; H. Kruger & Kearney, 2005)). • I.e., Alarifi et al. (2012) study on awareness level among public in Saudi Arabia using online survey. • Without measurement, rating, metrics, or indicators, one cannot demonstrate the value of information security effort especially to their top level management (Eminağaoğlu et al., 2009; Herold, 2011).
  • 10. • Framework • Provide the relationships among the variables, explains the theory and describe the direction of the relationships (Sekaran, 2007). • Aggeliki, Maria, Spyros, and Evangelos (2012) analysed why security awareness and training in the company failed to meet their goals and provide a framework that enables the analysis of awareness activities by using actor network theory (ANT). • Zakaria (2013) adapt Schein’s organisational culture model to establish security culture. In addition, the research concludes that one of the prerequisite to establish security culture in an organisation is by having a structured security awareness programme. • H. Kruger et al. (2006); Thomson and Von Solms (1998) utilise social psychology model in security awareness. (Chan & Wei, 2009) uses educational psychology called conceptual change to embedded awareness to the students.
  • 11. • Tools • In terms of this study evice or implement to carry out a particular function. • I.e., knowledge regarding information security is delivering by using game play (Chun-Che, Khera, Depickere, Tantatsanawong, & Boonbrahm, 2008; Cone, Irvine, Thompson, & Nguyen, 2007). Such therefore, game is a tool to deliver awareness message. • Based on our analysis, another popular tool develop by researchers is web based application such as online portal, intranet and online learning such present in (Chen, Shaw, & Yang, 2006; Shaw, Chen, Harris, & Huang, 2009).
  • 12.
  • 13. • The themes provide us with several approaches towards effectiveness of information security awareness. However, there is no research that provides a framework for information security awareness programme based on information security processes. • By identifying several themes of information security awareness strategy in the previous section, we manage to prove that the human dimension of information security such as awareness is not being neglected, at least in academic field. In fact, the significance of human dimension on information security such as awareness programme has been acknowledged in many literatures • Nevertheless, it has gone quite far without noticing that there is an absent of realistic function which is to introduce information security to the audience. As a result, only a few security elements are being covered in awareness programme and it is not structured according to the proper chronology of information security processes. Also, it is not comprehensive in terms of not cover all aspects of information security processes. Only favourite topics are being concern based on the previous issues faced by the organisation or just randomly pick by the consultant or security officer.
  • 14. INSPECTION PROTECTION DETECTION REACTION REFLECTION Inspection is a process of regulating and appraising the relevant security level in the organisation. Protection is a proactive process that enforces a secure environment at the appropriate level. Detection is a reactive process that identifies any appropriate events. Reaction is a response process to a security incident. Reflection is a follow-up process that evaluates the existing implementation of a security system.
  • 15. Adapt Pipkin’s information security processes Structured security awareness in organisation Challenges / Gap Information security risks A structured information security awareness programme principles An ideal situation  Employees aware on security processes  Employees can perform security tasks Establish basic security knowledge Appropriate security practices Yes Determine No Leads to Develop Revisited Figure 3. A structured information security awareness framework
  • 16. • We analysed and discuss the implication of the current approaches and contribute to the body of knowledge by locating a structured information security awareness. • This study adapts Pipkin’s (2000) security processes into a structured security awareness conceptual framework to investigate awareness programme challenges within an organisation. • Pipkin’s security processes has been choose based on the theory develop by (Zakaria, 2013) where basic security knowledge can further help to increase awareness amongst all level of employees of their security responsibilities and promote a collective security responsibility. • In order to enable employees to internalise security knowledge, organisation need to establish appropriate (structured) information security awareness programmes.
  • 17. Alarifi, A., Tootell, H., & Hyland, P. (2012, 26-28 June 2012). A study of information security awareness and practices in Saudi Arabia. Paper presented at the Communications and Information Technology (ICCIT), 2012 International Conference on. Albrechtsen, E., & Hovden, J. (2010). Improving information security awareness and behaviour through dialogue, participation and collective reflection. An intervention study. Computers & Security, 29(4), 432-445. doi: 10.1016/j.cose.2009.12.005 Anggeliki, T., Maria, K., Spyros, K., & Evangelos, K. (2012). Analyzing trajectories of information security awareness. Information Technology & People, 25(3), 327-352. doi: 10.1108/09593841211254358 Chen, C. C., Shaw, R. S., & Yang, S. C. (2006). Mitigating Information Security Risks by Increasing User Security Awareness: A Case Study of an Information Security Awareness System. Information technology learning and performance journal, 24(1), 1-14. Chun-Che, F., Khera, V., Depickere, A., Tantatsanawong, P., & Boonbrahm, P. (2008, 26-29 Feb. 2008). Raising information security awareness in digital ecosystem with games - a pilot study in Thailand. Paper presented at the Digital Ecosystems and Technologies, 2008. DEST 2008. 2nd IEEE International Conference on. Cone, B. D., Irvine, C. E., Thompson, M. F., & Nguyen, T. D. (2007). A video game for cyber security training and awareness. Computers & Security, 26(1), 63-72. doi: 10.1016/j.cose.2006.10.005 Drucker, P. F. (1992). The Economy’s Power Shift. The Wall Street journal. Eastern edition. Eminağaoğlu, M., Uçar, E., & Eren, Ş. (2009). The positive outcomes of information security awareness training in companies – A case study. Information Security Technical Report, 14(4), 223- 229. doi: 10.1016/j.istr.2010.05.002. Herold, R. (2011). Managing an information security and privacy awareness and training program Information Security Management Handbook (2nd ed.). Boca Raton, Fla.: CRC Press. Johnson, E. C. (2006). Security awareness: switch to a better programme. Network Security, 2006(2), 15-18. Kruger, H., Drevin, L., & Steyn, T. (2006). A framework for evaluating ICT security awareness. Paper presented at the Proceeding of the Information Security South Africa (ISSA), Johannesburg, South Africa. Kruger, H., & Kearney, W. (2005). Measuring information security awareness: a west africa gold mining environment case study. Paper presented at the Proceedings of the ISSA 2005 New Knowledge Today Conference, Balalaika Hotel, Sandton, South Africa 2005. http://icsa.cs.up.ac.za/issa/2005/Proceedings/Full/018_Article.pdf. Pipkin, D. L. (2000). Information security: Protecting the global enterprise Upper Saddle River, New Jersey.: Prentice Hall. Rezgui, Y., & Marks, A. (2008). Information security awareness in higher education: An exploratory study. Computers & Security, 27(7–8), 241-253. doi: http://dx.doi.org/10.1016/j.cose.2008.07.008 Sekaran, U. (2007). Research Methods for Business (4 ed.). New Delhi: Wiley India. Siponen, M. (2006). Information security standards focus on the existence of process, not its content. Commun. ACM, 49(8), 97-100. doi: 10.1145/1145287.114531. Shaw, R. S., Chen, C. C., Harris, A. L., & Huang, H.-J. (2009). The impact of information richness on information security awareness training effectiveness. Computers & Education, 52(1), 92-100. doi: http://dx.doi.org/10.1016/j.compedu.2008.06.011 Zakaria, O. (2013). Information Security Culture: A Human Firewall Approach. German: Lambert Academic Publishing.