Review of Information Security Policy based on Content Coverage and Online Presentation in Higher Education

Abstract

Policies are high-level statements that are equal to organizational law and drive the decision-making process within the organization. Information security policy is not easy to develop unless organizations clearly identify the necessary steps required in the development process of an information security policy, particularly in institutions of higher education that largely utilize IT. An inappropriate development process or replication of security policy content from other organizations could fail in execution. The execution of a duplicated policy could fail to act in accordance with enforceable rules and regulations even though it is well developed. Hence, organizations need to develop appropriate policies in compliance with the organization regulatory requirements. This paper aims to reviews policies from selected universities with regards to ISO 27001:2013 minimum requirements as well as effective online presentation. The online presentation review covers the elements of aesthetics, navigation and content presentation. The information on the security policy document resides on the universities’ website.

Authors and Affiliations

Arash Ghazvini, Zarina Shukur, Zaihosnita Hood

Keywords

Related Articles

Dynamic wireless charging of electric vehicles on the move with Mobile Energy Disseminators

Dynamic wireless charging of electric vehicles (EVs) is becoming a preferred method since it enables power exchange between the vehicle and the grid while the vehicle is moving. In this article, we present mobile energy...

Frequency Estimation of Single-Tone Sinusoids Under Additive and Phase Noise

We investigate the performance of main frequency estimation methods for a single-component complex sinusoid under complex additive white Gaussian noise (AWGN) as well as phase noise (PN). Two methods are under test: Maxi...

Design of A high performance low-power consumption discrete time Second order Sigma-Delta modulator used for Analog to Digital Converter

This paper presents the design and simulations results of a switched-capacitor discrete time Second order Sigma-Delta modulator used for a resolution of 14 bits Sigma-Delta analog to digital converter. The use of operati...

LOD Explorer: Presenting the Web of Data

The quantity of data published on the Web according to principles of Linked Data is increasing intensely. However, this data is still largely limited to be used up by domain professionals and users who understand Linked...

A Behavioral Study of Task Scheduling Algorithms in Cloud Computing

All the services offered by cloud computing are bundled into one service know as IT as a Service (ITaaS). The user’s processes are executed using these services. The scheduling techniques used in the cloud computing envi...

Download PDF file
  • EP ID EP376461
  • DOI 10.14569/IJACSA.2018.090853
  • Views 88
  • Downloads 0

How To Cite

Arash Ghazvini, Zarina Shukur, Zaihosnita Hood (2018). Review of Information Security Policy based on Content Coverage and Online Presentation in Higher Education. International Journal of Advanced Computer Science & Applications, 9(8), 410-423. https://europub.co.uk/articles/-A-376461