IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

ICT Security Policy in a Higher Education Institution in Malaysia

ICT Security Policy in a Higher Education Institution in Malaysia
View Sample PDF
Author(s): Fardzah Sulaiman (University Sains Malaysia, Malaysia), T. Ramayah (University Sains Malaysia, Malaysia)and Azizah Omar (University Sains Malaysia, Malaysia)
Copyright: 2011
Pages: 19
Source title: Handbook of Research on Information Communication Technology Policy: Trends, Issues and Advancements
Source Author(s)/Editor(s): Esharenana E. Adomi (Delta State University, Nigeria)
DOI: 10.4018/978-1-61520-847-0.ch021

Purchase

View ICT Security Policy in a Higher Education Institution in Malaysia on the publisher's website for pricing and purchasing information.

Abstract

Information and communication technology (ICT) is an important strategic and essential functional requirement for many institutions of higher learning. In the developing world, ICT is achieving breakthrough in management and teaching through online learning, which helps to cater for the increasing student population. However, the security of the information being processed stored and exchanged is a growing concern to the management as the dependence on ICT for most of the institutions’ core services functions are increasing. This chapter discusses the current state of ICT security policy practices in University Science of Malaysia (USM); one of the Higher Education Institution in Malaysia. USM has been granted accelerated programme for excellence (APEX) status due to the mission of readiness, transformation plan and preparedness to change and transform it into Malaysia‘s first world-class university. The discussion encapsulates the problems, consequences of ICT risks and ICT awareness. Furthermore, it highlights the ICT policy guideline, ICT security policy formulation, ICT security management safeguards, principles and ICT security and adherence compliance plan.

Related Content

Jeff Mangers, Christof Oberhausen, Meysam Minoufekr, Peter Plapper. © 2020. 26 pages.
Sylvain Maechler, Jean-Christophe Graz. © 2020. 27 pages.
Sabrina Petersohn, Sophie Biesenbender, Christoph Thiedig. © 2020. 41 pages.
Jonas Lundsten, Jesper Mayntz Paasch. © 2020. 21 pages.
Justus Alexander Baron. © 2020. 31 pages.
Vasileios Mavroeidis, Petros E. Maravelakis, Katarzyna Tarnawska. © 2020. 19 pages.
Hiam Serhan, Doudja Saïdi-Kabeche. © 2020. 30 pages.
Body Bottom