Computer security control practices: views of future employees in Malaysia

Threats in computerized working environment are getting serious attention by many companies around the world. These threats among others include; highly important data loss, misuse of companies’ computer facilities, and equipment damages due to negligence by the employees. Due to these threats, it i...

Full description

Bibliographic Details
Main Authors: Zainol, Zaini, Puat Nelson, Sherliza
Format: Conference or Workshop Item
Language:English
Published: 2015
Subjects:
Online Access:http://irep.iium.edu.my/43615/
http://irep.iium.edu.my/43615/12/programme-book%2Bpaper%2Bacceptance_letter-zaini-zainol.pdf
id iium-43615
recordtype eprints
spelling iium-436152015-08-19T03:41:12Z http://irep.iium.edu.my/43615/ Computer security control practices: views of future employees in Malaysia Zainol, Zaini Puat Nelson, Sherliza HF5601 Accounting. Bookkeeping Threats in computerized working environment are getting serious attention by many companies around the world. These threats among others include; highly important data loss, misuse of companies’ computer facilities, and equipment damages due to negligence by the employees. Due to these threats, it is timely to install awareness and educate future employees on how to better safeguard companies’ properties especially the information technology resources like computers. In light of this, it calls for a growing need of research to investigate the existing practices of computer security controls in four domains namely; (1) data security controls,(2) software and access security controls, (3) hardware and physical access controls and (4) output security controls. Business students who enrolled in accounting, economics, and finance and business degrees are chosen as proxies for future employees in corporate organizations. In total, 346 questionnaires were distributed to students at the Faculty of Economics and Management Sciences in one university in Malaysia. These students were required to indicate their existing behaviour or practices with regard to their own personal computer’s administration within the four mentioned domains. Our findings indicate that majority of the students were concerned about their computer’s security controls. However, it is of our concern to find that, there were students who put little attention on their computers’ security. And hence, posed potential threats to their future employers. Our recommendations are higher learning institutions should continuously stress the importance of practicing good security controls in their education, and instill security governance awareness in IT usage to their students. 2015-06-03 Conference or Workshop Item NonPeerReviewed application/pdf en http://irep.iium.edu.my/43615/12/programme-book%2Bpaper%2Bacceptance_letter-zaini-zainol.pdf Zainol, Zaini and Puat Nelson, Sherliza (2015) Computer security control practices: views of future employees in Malaysia. In: 1st International Conference on Educational Studies, 3-4 June 2015, Pulai Spring Resort Johor Bahru. (Unpublished)
repository_type Digital Repository
institution_category Local University
institution International Islamic University Malaysia
building IIUM Repository
collection Online Access
language English
topic HF5601 Accounting. Bookkeeping
spellingShingle HF5601 Accounting. Bookkeeping
Zainol, Zaini
Puat Nelson, Sherliza
Computer security control practices: views of future employees in Malaysia
description Threats in computerized working environment are getting serious attention by many companies around the world. These threats among others include; highly important data loss, misuse of companies’ computer facilities, and equipment damages due to negligence by the employees. Due to these threats, it is timely to install awareness and educate future employees on how to better safeguard companies’ properties especially the information technology resources like computers. In light of this, it calls for a growing need of research to investigate the existing practices of computer security controls in four domains namely; (1) data security controls,(2) software and access security controls, (3) hardware and physical access controls and (4) output security controls. Business students who enrolled in accounting, economics, and finance and business degrees are chosen as proxies for future employees in corporate organizations. In total, 346 questionnaires were distributed to students at the Faculty of Economics and Management Sciences in one university in Malaysia. These students were required to indicate their existing behaviour or practices with regard to their own personal computer’s administration within the four mentioned domains. Our findings indicate that majority of the students were concerned about their computer’s security controls. However, it is of our concern to find that, there were students who put little attention on their computers’ security. And hence, posed potential threats to their future employers. Our recommendations are higher learning institutions should continuously stress the importance of practicing good security controls in their education, and instill security governance awareness in IT usage to their students.
format Conference or Workshop Item
author Zainol, Zaini
Puat Nelson, Sherliza
author_facet Zainol, Zaini
Puat Nelson, Sherliza
author_sort Zainol, Zaini
title Computer security control practices: views of future employees in Malaysia
title_short Computer security control practices: views of future employees in Malaysia
title_full Computer security control practices: views of future employees in Malaysia
title_fullStr Computer security control practices: views of future employees in Malaysia
title_full_unstemmed Computer security control practices: views of future employees in Malaysia
title_sort computer security control practices: views of future employees in malaysia
publishDate 2015
url http://irep.iium.edu.my/43615/
http://irep.iium.edu.my/43615/12/programme-book%2Bpaper%2Bacceptance_letter-zaini-zainol.pdf
first_indexed 2023-09-18T21:02:09Z
last_indexed 2023-09-18T21:02:09Z
_version_ 1777410694528892928