IIUM Repository

Computer security control practices: views of future employees in Malaysia

Zainol, Zaini and Puat Nelson, Sherliza (2015) Computer security control practices: views of future employees in Malaysia. In: 1st International Conference on Educational Studies, 3-4 June 2015, Pulai Spring Resort Johor Bahru. (Unpublished)

[img] PDF (Computer security control practices: Views of future employees in Malaysia) - Published Version
Restricted to Repository staff only

Download (886kB) | Request a copy


Threats in computerized working environment are getting serious attention by many companies around the world. These threats among others include; highly important data loss, misuse of companies’ computer facilities, and equipment damages due to negligence by the employees. Due to these threats, it is timely to install awareness and educate future employees on how to better safeguard companies’ properties especially the information technology resources like computers. In light of this, it calls for a growing need of research to investigate the existing practices of computer security controls in four domains namely; (1) data security controls,(2) software and access security controls, (3) hardware and physical access controls and (4) output security controls. Business students who enrolled in accounting, economics, and finance and business degrees are chosen as proxies for future employees in corporate organizations. In total, 346 questionnaires were distributed to students at the Faculty of Economics and Management Sciences in one university in Malaysia. These students were required to indicate their existing behaviour or practices with regard to their own personal computer’s administration within the four mentioned domains. Our findings indicate that majority of the students were concerned about their computer’s security controls. However, it is of our concern to find that, there were students who put little attention on their computers’ security. And hence, posed potential threats to their future employers. Our recommendations are higher learning institutions should continuously stress the importance of practicing good security controls in their education, and instill security governance awareness in IT usage to their students.

Item Type: Conference or Workshop Item (Full Paper)
Additional Information: 3886/43615
Subjects: H Social Sciences > HF Commerce > HF5001 Business. Business Administration > HF5601 Accounting. Bookkeeping
Kulliyyahs/Centres/Divisions/Institutes (Can select more than one option. Press CONTROL button): Kulliyyah of Economics and Management Sciences > Department of Accounting
Depositing User: Dr. Zaini Zainol
Date Deposited: 19 Aug 2015 11:40
Last Modified: 19 Aug 2015 11:41
URI: http://irep.iium.edu.my/id/eprint/43615

Actions (login required)

View Item View Item


Downloads per month over past year