3 research outputs found

    Users’ perception on the information security policy of the institutions of higher learning

    Get PDF
    Securing information is essential for safeguarding the organization business operations as information is a business asset to any organization including education sector.One of the most imperative information security (InfoSec) controls identified is InfoSec policy, a direction-giving document.The purpose of this study is to investigate the user awareness, understanding and acceptance of InfoSec policy in the Malaysian’s Institutes of Higher Learning.Survey questionnaires had been distributed to graduate students and non-IT staff of Universiti Teknologi Malaysia (UTM),International Campus, Kuala Lumpur.The result of this study had perceived consistent agreeable behaviors of the InfoSec policy within UTM

    RETOOLING SCIENCE TEACHING ON STABILITY TOPIC FOR STEM EDUCATION: MALAYSIAN CASE STUDY

    Get PDF
    By 2020, Malaysia needs to develop its workforce capacity in order to obtain the 500,000 STEM human capital requirement for the New Key Economic Areas (NKEAs). Therefore, an effort of retooling teaching and learning of science teachers is a part of the planning in catalyst STEM human capital. Science teachers require refreshment in teaching and learning approach of pedagogy to enhance the student understanding in the subject matter and stability topic is chose as the initial idea to attract the student interest in STEM activities. This study aims to introduce a teaching aid Arts and Stability Card (A&S Card) to help teachers to diversify the teaching concept of stability science through A&S Card. 300 science teachers across the 10 districts from Perak state, provided their perceptions upon the modules via questionnaire in two parts: a pedagogical approach to teaching and learning, and training suitability. The reliability test of Chronbach’s Alpha to the pedagogical approach to teaching and learning scored 0.868 while training suitability obtained 0.874, which fall under the very good category of reliability results. The mean result score of 4.29 and 4.17 to the pedagogical approach to teaching and learning, and training suitability, where the results indicate A&S Card module and training were successfully conducted. Besides, this module also contains the value of creativity and innovation to build a fun learning in a science subject and the concept can be replicated for other science subject

    Users' perception of the information security policy at Universiti Teknologi Malaysia

    Get PDF
    Securing information is essential for safeguarding the organization business operations as information is a business asset to any organization including education sector. One of the most imperative information security (InfoSec) controls identified is InfoSec policy. The purpose of this study is to gauge the level of enforcement and effectiveness of Universiti Teknologi Malaysia's (UTM) InfoSec policy from the users perspective. This study involved three phases of data collection, namely preliminary study, interview and survey. The preliminary study allows an exploratory activity in understanding the information technology (IT) arrangement and organizational structural practices in UTM environment. Next, an interview with an IT-expert aimed to understand the establishment of the InfoSec in UTM. Then, a survey questionnaire is distributed to post-graduate and non-IT staff of UTM, International Campus, Kuala Lumpur to gauge the level of users perception on the institution's security policy. The study had found that that nearly half of the users perceived that they are aware, understand and accept the UTMs policy, with more than half of the them agreed that the UTMs policy is effective. The study also proposed a theoretical framework model for the effectiveness of the institutions InfoSec policy. The model which consists of enforcement, users awareness, users understanding and users acceptance identified as the independent variables, whereas an effectiveness of InfoSec policy identified as dependant variable. This proposed framework model may be useful as a basis for reference not only for researchers in this field but also for practitioner in developing the InfoSec policy
    corecore