SlideShare a Scribd company logo
1 of 1
Download to read offline
An Investigation into Information Security Culture within
Students at Edinburgh Napier University
1. Overview
The Importance?
• Technological security components, such as
firewalls, only provide a fragment of the overall
security system.
• Large percentage of security incidents are
caused by, insiders, neglect staff or students
who demonstrate poor security behaviour.
Security Culture
• The shared collective values and beliefs towards
information security within stakeholders.
• Can create a positive security conscious attitude
amongst stakeholders through:
- Education & training
- Security polices & procedures
- Organisational management
• Investigate the security culture that is
present in students at Edinburgh Napier
University
• Identify and adapted a framework that
structures the research to produce an
overall evaluation.
Key Questions
• What are students attitudes towards
information?
• Do students who possess more computer
knowledge display an alternative behaviour
towards information security, compared to
students with less technical knowledge?
• How do these attitudes align with Napier IT
Services expectations?
Information
Security
Knowledge
Visible layer of security:
Technology, security handbooks,
awareness courses
Strategies & goals: Security
policies and procedures
Beliefs and values: Shared
attitude within the
organisation
Level of information
security knowledge
Security Culture
Framework
Shared Tacit
Assumptions
Espoused
Values
Artefacts
Research Methods
Listed below are the approaches that were
used to analyse the different levels of the De
Veiga and Eloff framework: (adapted from
Schein’s model of organisational culture)
• Artefacts: Observation and document
analysis
• Espoused values: Interview with IT
Services & document analysis
• Shared Assumptions: Group
discussion with students
• Security knowledge: Group
discussions and observation
• Framework for evaluation adapted well in the university
organisational structure.
• Overall culture is good, but certain aspects need improving:
• Students comfortable leaving computers unattended and
only worried about losing unsaved work. Many privacy risks
are possible through unattended student profiles .
• Students are happy to distribute academic papers, which could
lead to university copyright issues.
• Security polices have proven to be invisible, as no students
are aware of there presence. Security roadshows, currently
being conducted, could be a step in the right direction.
• Computer students feel less at risk to low level security risks
compared to students without technical knowledge but more
vulnerable to high level specific threats.
Future Work
• Investigate the actual behaviour of students, not just their
feelings by recording computer logs and quantitative data.
• Investigate further afield in the university. Research students
from different campuses and staff behaviour.
Andrew Kerr
40056581
Supervisor – Peter Cruickshank
2nd marker – Dr Colin Smith
2. Aims
3. Design 4. Findings
4. Conclusion and Future Work
“Majority have never seen the
Napier security polices”
“Remember no security training
or awareness schemes”
“Would share passwords to my
friends” “Willing to share university
software and documents”
“Regularly leave my profile
logged-in but unattended”
“Biggest risk is losing saved files”
“Never heard of security culture
before or what it might mean”

More Related Content

What's hot

NETS for students
NETS for studentsNETS for students
NETS for studentsfaithrigsby
 
Nets s standards
Nets s standardsNets s standards
Nets s standardsLucasT74
 
Nets standards EDTC245
Nets standards EDTC245Nets standards EDTC245
Nets standards EDTC245babyal13
 
Nets s standards
Nets s standardsNets s standards
Nets s standardsmacyistre
 
EDUCATION TECHNOLOGY
EDUCATION TECHNOLOGY EDUCATION TECHNOLOGY
EDUCATION TECHNOLOGY Jolina Nora
 
INTRODUCTION OF EDUCATION TECHNOLOGY
INTRODUCTION OF EDUCATION TECHNOLOGYINTRODUCTION OF EDUCATION TECHNOLOGY
INTRODUCTION OF EDUCATION TECHNOLOGYJolina Nora
 

What's hot (13)

NETS for students
NETS for studentsNETS for students
NETS for students
 
Nets s standards
Nets s standardsNets s standards
Nets s standards
 
Nets standards EDTC245
Nets standards EDTC245Nets standards EDTC245
Nets standards EDTC245
 
Nets s standards
Nets s standardsNets s standards
Nets s standards
 
Nets s standards
Nets s standardsNets s standards
Nets s standards
 
Nets s standards
Nets s standardsNets s standards
Nets s standards
 
Nets s standards
Nets s standardsNets s standards
Nets s standards
 
NETS S Standards
NETS S StandardsNETS S Standards
NETS S Standards
 
Nets s standards
Nets s standardsNets s standards
Nets s standards
 
Nets s standards
Nets s standardsNets s standards
Nets s standards
 
EDUCATION TECHNOLOGY
EDUCATION TECHNOLOGY EDUCATION TECHNOLOGY
EDUCATION TECHNOLOGY
 
INTRODUCTION OF EDUCATION TECHNOLOGY
INTRODUCTION OF EDUCATION TECHNOLOGYINTRODUCTION OF EDUCATION TECHNOLOGY
INTRODUCTION OF EDUCATION TECHNOLOGY
 
Nets s standards
Nets s standardsNets s standards
Nets s standards
 

Similar to Information Security Culture Among Edinburgh Napier Students

144 presentation iee_tel2021
144 presentation iee_tel2021144 presentation iee_tel2021
144 presentation iee_tel2021Malinka Ivanova
 
e-Safety, Ofsted and the new Computing Curriculum for Governors 2014
e-Safety, Ofsted and the new Computing Curriculum for Governors 2014e-Safety, Ofsted and the new Computing Curriculum for Governors 2014
e-Safety, Ofsted and the new Computing Curriculum for Governors 2014Rebecca Avery
 
01-intro.pptx
01-intro.pptx01-intro.pptx
01-intro.pptxEmanAzam
 
6528 opensource intelligence as the new introduction in the graduate cybersec...
6528 opensource intelligence as the new introduction in the graduate cybersec...6528 opensource intelligence as the new introduction in the graduate cybersec...
6528 opensource intelligence as the new introduction in the graduate cybersec...Damir Delija
 
Keynote e-Safety, Ofsted and the new computing Curriculum
Keynote e-Safety, Ofsted and the new computing Curriculum Keynote e-Safety, Ofsted and the new computing Curriculum
Keynote e-Safety, Ofsted and the new computing Curriculum Rebecca Avery
 
Keeping learners safe online presentation
Keeping learners safe online presentationKeeping learners safe online presentation
Keeping learners safe online presentationJisc
 
Role of the CISO in Higher Education
Role of the CISO in Higher EducationRole of the CISO in Higher Education
Role of the CISO in Higher EducationJisc
 
Security Awareness Training for Community Colleges 2009
Security Awareness Training for Community Colleges 2009Security Awareness Training for Community Colleges 2009
Security Awareness Training for Community Colleges 2009Donald E. Hester
 
E safety in post-16 education
E safety in post-16 educationE safety in post-16 education
E safety in post-16 educationdeborahjudah
 
American Public University System (NASDAQ:APEI) - Dr. Clay Wilson is the Prog...
American Public University System (NASDAQ:APEI) - Dr. Clay Wilson is the Prog...American Public University System (NASDAQ:APEI) - Dr. Clay Wilson is the Prog...
American Public University System (NASDAQ:APEI) - Dr. Clay Wilson is the Prog...Investorideas.com
 
Cybersecurity strategy-brief-to-itc final-17_apr2015
Cybersecurity strategy-brief-to-itc final-17_apr2015Cybersecurity strategy-brief-to-itc final-17_apr2015
Cybersecurity strategy-brief-to-itc final-17_apr2015IT Strategy Group
 
chapter 1. Introduction to Information Security
chapter 1. Introduction to Information Security chapter 1. Introduction to Information Security
chapter 1. Introduction to Information Security elmuhammadmuhammad
 
Erau cybersecurity and security degrees
Erau cybersecurity and security degreesErau cybersecurity and security degrees
Erau cybersecurity and security degreesERAUWebinars
 
Best Practices for Security Awareness and Training
Best Practices for Security Awareness and TrainingBest Practices for Security Awareness and Training
Best Practices for Security Awareness and TrainingKimberly Hood
 
Cyber awareness ppt on the recorded data
Cyber awareness ppt on the recorded dataCyber awareness ppt on the recorded data
Cyber awareness ppt on the recorded dataTecnoIncentive
 
Security Awareness and Training
Security Awareness and TrainingSecurity Awareness and Training
Security Awareness and TrainingPriyank Hada
 
EDR 8204 Week 3 Assignment: Analyze Action Research
EDR 8204 Week 3 Assignment: Analyze Action ResearchEDR 8204 Week 3 Assignment: Analyze Action Research
EDR 8204 Week 3 Assignment: Analyze Action Researcheckchela
 

Similar to Information Security Culture Among Edinburgh Napier Students (20)

144 presentation iee_tel2021
144 presentation iee_tel2021144 presentation iee_tel2021
144 presentation iee_tel2021
 
e-Safety, Ofsted and the new Computing Curriculum for Governors 2014
e-Safety, Ofsted and the new Computing Curriculum for Governors 2014e-Safety, Ofsted and the new Computing Curriculum for Governors 2014
e-Safety, Ofsted and the new Computing Curriculum for Governors 2014
 
01-intro.pptx
01-intro.pptx01-intro.pptx
01-intro.pptx
 
6528 opensource intelligence as the new introduction in the graduate cybersec...
6528 opensource intelligence as the new introduction in the graduate cybersec...6528 opensource intelligence as the new introduction in the graduate cybersec...
6528 opensource intelligence as the new introduction in the graduate cybersec...
 
Keynote e-Safety, Ofsted and the new computing Curriculum
Keynote e-Safety, Ofsted and the new computing Curriculum Keynote e-Safety, Ofsted and the new computing Curriculum
Keynote e-Safety, Ofsted and the new computing Curriculum
 
Keeping learners safe online presentation
Keeping learners safe online presentationKeeping learners safe online presentation
Keeping learners safe online presentation
 
Role of the CISO in Higher Education
Role of the CISO in Higher EducationRole of the CISO in Higher Education
Role of the CISO in Higher Education
 
Security Awareness Training for Community Colleges 2009
Security Awareness Training for Community Colleges 2009Security Awareness Training for Community Colleges 2009
Security Awareness Training for Community Colleges 2009
 
E safety in post-16 education
E safety in post-16 educationE safety in post-16 education
E safety in post-16 education
 
American Public University System (NASDAQ:APEI) - Dr. Clay Wilson is the Prog...
American Public University System (NASDAQ:APEI) - Dr. Clay Wilson is the Prog...American Public University System (NASDAQ:APEI) - Dr. Clay Wilson is the Prog...
American Public University System (NASDAQ:APEI) - Dr. Clay Wilson is the Prog...
 
Privacy Engineering in the Wild
Privacy Engineering in the WildPrivacy Engineering in the Wild
Privacy Engineering in the Wild
 
Cybersecurity strategy-brief-to-itc final-17_apr2015
Cybersecurity strategy-brief-to-itc final-17_apr2015Cybersecurity strategy-brief-to-itc final-17_apr2015
Cybersecurity strategy-brief-to-itc final-17_apr2015
 
ANS_Ch_06_Handouts.pdf
ANS_Ch_06_Handouts.pdfANS_Ch_06_Handouts.pdf
ANS_Ch_06_Handouts.pdf
 
chapter 1. Introduction to Information Security
chapter 1. Introduction to Information Security chapter 1. Introduction to Information Security
chapter 1. Introduction to Information Security
 
Erau cybersecurity and security degrees
Erau cybersecurity and security degreesErau cybersecurity and security degrees
Erau cybersecurity and security degrees
 
Best Practices for Security Awareness and Training
Best Practices for Security Awareness and TrainingBest Practices for Security Awareness and Training
Best Practices for Security Awareness and Training
 
Cyber awareness ppt on the recorded data
Cyber awareness ppt on the recorded dataCyber awareness ppt on the recorded data
Cyber awareness ppt on the recorded data
 
9 mahmood shah risk 4 3
9 mahmood shah risk 4 39 mahmood shah risk 4 3
9 mahmood shah risk 4 3
 
Security Awareness and Training
Security Awareness and TrainingSecurity Awareness and Training
Security Awareness and Training
 
EDR 8204 Week 3 Assignment: Analyze Action Research
EDR 8204 Week 3 Assignment: Analyze Action ResearchEDR 8204 Week 3 Assignment: Analyze Action Research
EDR 8204 Week 3 Assignment: Analyze Action Research
 

Information Security Culture Among Edinburgh Napier Students

  • 1. An Investigation into Information Security Culture within Students at Edinburgh Napier University 1. Overview The Importance? • Technological security components, such as firewalls, only provide a fragment of the overall security system. • Large percentage of security incidents are caused by, insiders, neglect staff or students who demonstrate poor security behaviour. Security Culture • The shared collective values and beliefs towards information security within stakeholders. • Can create a positive security conscious attitude amongst stakeholders through: - Education & training - Security polices & procedures - Organisational management • Investigate the security culture that is present in students at Edinburgh Napier University • Identify and adapted a framework that structures the research to produce an overall evaluation. Key Questions • What are students attitudes towards information? • Do students who possess more computer knowledge display an alternative behaviour towards information security, compared to students with less technical knowledge? • How do these attitudes align with Napier IT Services expectations? Information Security Knowledge Visible layer of security: Technology, security handbooks, awareness courses Strategies & goals: Security policies and procedures Beliefs and values: Shared attitude within the organisation Level of information security knowledge Security Culture Framework Shared Tacit Assumptions Espoused Values Artefacts Research Methods Listed below are the approaches that were used to analyse the different levels of the De Veiga and Eloff framework: (adapted from Schein’s model of organisational culture) • Artefacts: Observation and document analysis • Espoused values: Interview with IT Services & document analysis • Shared Assumptions: Group discussion with students • Security knowledge: Group discussions and observation • Framework for evaluation adapted well in the university organisational structure. • Overall culture is good, but certain aspects need improving: • Students comfortable leaving computers unattended and only worried about losing unsaved work. Many privacy risks are possible through unattended student profiles . • Students are happy to distribute academic papers, which could lead to university copyright issues. • Security polices have proven to be invisible, as no students are aware of there presence. Security roadshows, currently being conducted, could be a step in the right direction. • Computer students feel less at risk to low level security risks compared to students without technical knowledge but more vulnerable to high level specific threats. Future Work • Investigate the actual behaviour of students, not just their feelings by recording computer logs and quantitative data. • Investigate further afield in the university. Research students from different campuses and staff behaviour. Andrew Kerr 40056581 Supervisor – Peter Cruickshank 2nd marker – Dr Colin Smith 2. Aims 3. Design 4. Findings 4. Conclusion and Future Work “Majority have never seen the Napier security polices” “Remember no security training or awareness schemes” “Would share passwords to my friends” “Willing to share university software and documents” “Regularly leave my profile logged-in but unattended” “Biggest risk is losing saved files” “Never heard of security culture before or what it might mean”