Writing on the Wall: A Case of State Colleges and Universities

Author(s):  
Judith Barlaan

Information security is imperative for state colleges and universities (SUCs) to have a sound information security in protecting their information assets, enhancing institutional reputation and ensuring compliance with the law. This paper presents the level of implementation of information security in the state colleges and universities (SUCs) in the Philippines. Data  used  was  based  on questionnaire adapted from the Information Security Governance (ISG) Assessment Tool for Higher Education(EDUCAUSE/Internet2 Security Task 2004) and was  distributed  to  a  total  of  30  individuals  who  are  responsible  in managing and keeping  the  information assets of the SUCS. Findings revealed that information security is not yet fully implemented among the SUCS, this is a clear indication of failure or disaster, and these institutions are vulnerable to information security threats. SUCs are encouraged to implement comprehensive information security program at a strategic level involving the board of regents and top executives for safety and security.

2013 ◽  
Vol 284-287 ◽  
pp. 3657-3661 ◽  
Author(s):  
Chir Neng Hung ◽  
Ming Dar Hwang ◽  
Yuan Chen Liu

This study used a questionnaire survey to investigate the maturity of information security governance (ISG). The main objective is to assess the maturity of ISG, exploring the factors concerned, and building an ISG maturity model . Questionnaires were sent to 93 CIOs in schools, and 85 were returned. The return ratio is 91.4% excluding three invalid, and with 82 effective questionnaires, the effective sample return rate is 88.2%. In order to improve the maturity of ISG for Taiwanese technological colleges and universities, this study aims to build an ISG maturity model to look for relevant features of maturity of ISG. According to the Information Security Governance and Maturity Assessment Tool, this study found that schools with low rates of maturity take up 59.8%, medium 31.7%, and high 8.5%. With discriminant analysis, the maturity of ISG can be distinguished by low, medium, and high rates. With correlation analysis, this study finds that 33 items have significant correlation with ISG maturity. With analysis of variance (ANOVA), post hoc range test and ANOVA multiple comparison least significant difference (LSD), this study finds that there are significant differences between the items of ISG maturity. This study also finds the ISG maturity of schools is lower. They can improve their ISG maturity according to this model.


2022 ◽  
Vol 6 ◽  
pp. 877-892
Author(s):  
Francis Balahadia ◽  

Purpose-Many educational systems across the world have shifted to online learning methodology as a measure against Covid-19 Pandemic to continue educating students. This phenomenon is causing a lot of complications to the educational system around the world in the context of developing countries, especially to the public state colleges and universities. This paper aims to identify and describe the challenges of online learning from the perspective of Information Technology Education (ITE) students in the public state colleges and universities during the COVID-19 pandemic. Method-It used descriptive research for the conducted of the study wherein survey questionnaires were sent out via electronic survey in different state colleges and universities in the Philippines. The evaluations were calculated using descriptive statistics and Chi-square and responses were compared between their profilesusing a nonparametric test. Results-The findings obtained the demographic profile of the ITE students with the degree of BS Information Technology, BS Computer Science, and BS Information System such courses, year level, and place they live. Additionally, the study gained a significant relationship between student profile in the device used in class, internet connectivity, student type of data connection, capability to attend online class, and their commitment to participate and submit class requirements. The study identifies different interrelated challenges such as the majority of the student only using smartphones in onlinelearning and poor internet connection as they tried to adapt to online learning because they are committed to participating and submitting requirements. Conclusion-The study gives insights into the current condition experienced by the students in the school administrations and officials, and faculty as well to strengthen the appropriate online teaching mode and other practices applicable to the students. It can also useto emphasize to be more responsive to the learning needs of the IT students, especially beyond the conventional classrooms.Recommendations-It is suggested that educational institutions must create appropriate and effective content, and provide digital literacy training to current faculty to improve learning outcomes. Lastly, a strong Information Communication Technology Office that focuses on the development of a different website and mobile application that assist the need of the students and faculty may be established.


Author(s):  
Gurpreet Dhillon ◽  
Sushma Mishra

This chapter discusses the impact of Sarbanes-Oxley (SOX) Act on corporate information security governance practices. The resultant regulatory intervention forces a company to revisit its internal control structures and assess the nature and scope of its compliance with the law. This chapter reviews the organizational implications emerging from the mandatory compliance with SOX. Industry internal control assessment frameworks, such as COSO and COBIT, are reviewed and their usefulness in ensuring compliance evaluated. Other emergent issues related to IT governance and the general integrity of the enterprise are identified and discussed.


2008 ◽  
pp. 2545-2560
Author(s):  
Sushma Mishra ◽  
Gurpreet Dhillon

This chapter discusses the impact of Sarbanes-Oxley (SOX) Act on corporate information security governance practices. The resultant regulatory intervention forces a company to revisit its internal control structures and assess the nature and scope of its compliance with the law. This chapter reviews the organizational implications emerging from the mandatory compliance with SOX. Industry internal control assessment frameworks, such as COSO and COBIT, are reviewed and their usefulness in ensuring compliance evaluated. Other emergent issues related to IT governance and the general integrity of the enterprise are identified and discussed.


2013 ◽  
Vol 278-280 ◽  
pp. 2199-2203 ◽  
Author(s):  
Chir Neng Hung ◽  
Ming Dar Hwang ◽  
Yuan Chen Liu

This study used a questionnaire survey, investigating the maturity of information security governance (ISG). The main objective is to assess the maturity, exploring the factors concerned, providing path analysis of maturity, and showing the way to ISG. Questionnaires were sent to 71 schools of CIO, and 68 returned. The effective sample return rate is 95.8%. In order to improve the maturity of ISG for universities, this study aims to look for maturity relevant factors. According to assessment Tool to explore an overall security evaluation rating approach, this study finds that schools with low rate of maturity take up 39.7%, schools with medium rate 33.8%, high 26.5%. With discriminant analysis, the maturity of ISG can distinguished in low, medium, and high rate. With correlation analysis, this study finds that 31 items have significant correlation. With analysis of variance (ANOVA), post hoc range test and ANOVA multiple comparison least significant difference (LSD) are used to confirm that there is significant differences between the items of the maturity of ISG. This study also finds the security management problems that are too much reliant on IT. Especially their maturity of ISG is lower and the items in the risk management aspect are very low.


2009 ◽  
Vol 7 (1) ◽  
pp. 309-317
Author(s):  
Karin Höne ◽  
Jan Eloff

World wide the importance of Information Security Governance is demanding the attention of senior management. This is due to the ever-changing threat landscape requiring that organisations adopt a focussed approach towards the protection of information assets. Any successful approach towards Information Security Governance is dependant on the availability of relevant and timely research outputs. The research community working on Information Security Governance are diverse and appears to be mis-aligned with the needs of the business community. The problem that this paper addresses is twofold. Firstly, it addresses the confusion regarding the meaning of Information Security Governance. Secondly, it assesses the gap between research and business communities from an Information Security Governance perspective. This article analyses the requirements from the business community and mapped it against current research outputs. Findings clearly indicate that the two worlds are not entirely aligned and that in some cases minimum effort is being spent on the topics deemed important by the business community. Information Security Governance in general can benefit from an improved alignment between the needs of business and the outputs of the research community.


Sign in / Sign up

Export Citation Format

Share Document