SlideShare a Scribd company logo
@ IJTSRD | Available Online @ www.ijtsrd.com | Special Issue Publication | November 2018
ISSN No: 2456
International Journal of Trend in Scientific
Research and
International Conference on Advanced Engineering
and Information Technology
Issues on Management
Janet Gabriel1
, Sheik Mohideen Abdul Latheef
1
Newbridge College, Melaka, Malaysia
2
Faculty of Engineering
ABSTRACT
In higher education, Governance of data security is
the data management mechanism that has to be
practiced. This is an appropriate management model
for the employees in the higher education institution
that will understand the role to be played to secure
more highly confidential data. This paper aims at
issues on management and governance of data
security in Higher education institutions (HEIs). This
will conclude on identifying the factors affecting
governance of data security in private higher
education system. It also enables to discover the
issues in the management and provide appropriate
solution for the governance of data security in the
HEIs. A research model with factors was proposed for
data security governance practice in HEIs. From the
research findings, a governance model was derived
and proposed for the all new HEIs.
Keywords: issues, governance; data security; higher
education institutions
1. INTRODUCTION
The key role of governance is the way of management
managing to protect the data in a highly secure
manner. The institutions provide and apply specific
rules and regulations but the main
governance is involvement, accountability and
decision rights. So both security and management is
different [1]. To protect the accountability and
responsibility of HEIs need proper internal controls
with formal informational assets in institutional
structure by the security information system
governance [2].
The sense of ownership revolves around the
institutional staff’s responsibility and accountability
@ IJTSRD | Available Online @ www.ijtsrd.com | Special Issue Publication | November 2018
ISSN No: 2456 - 6470 | www.ijtsrd.com | Special Issue
International Journal of Trend in Scientific
Research and Development (IJTSRD)
International Conference on Advanced Engineering
and Information Technology (ICAEIT-2017)
n Management and Governance of Data Security In HEIs
Sheik Mohideen Abdul Latheef2
, Veluswamy Jayavardhanavelu
Newbridge College, Melaka, Malaysia
f Engineering and Technology, Linton University College, Malaysia
In higher education, Governance of data security is
mechanism that has to be
practiced. This is an appropriate management model
for the employees in the higher education institution
that will understand the role to be played to secure
more highly confidential data. This paper aims at
d governance of data
security in Higher education institutions (HEIs). This
will conclude on identifying the factors affecting
governance of data security in private higher
education system. It also enables to discover the
ide appropriate
solution for the governance of data security in the
HEIs. A research model with factors was proposed for
data security governance practice in HEIs. From the
research findings, a governance model was derived
issues, governance; data security; higher
The key role of governance is the way of management
managing to protect the data in a highly secure
manner. The institutions provide and apply specific
principle for
governance is involvement, accountability and
decision rights. So both security and management is
different [1]. To protect the accountability and
responsibility of HEIs need proper internal controls
informational assets in institutional
structure by the security information system
The sense of ownership revolves around the
institutional staff’s responsibility and accountability
to provide data governance with the proper security
polices in information systems security governance
are crucial [3].
This paper explains the HEIs
security for the information security in various fields.
It coincides with the management of information
security. The real world situation o
concentrates on every element of managing secure
data in whatsoever applications implemented or in use
of user which involves governance of data security.
The main concern is the sense of proper governance
data security need to be establish
be breach of data that will be
knowledge of user and administrator. This paper
explains the issues on management and governance of
data security in HEIs based on the research of faculty
members. The main purpose is
aware of the factors that affect governance in the area
of data security. The data governance values need to
practice in HEIs is an important concern for data
security.
The findings in this paper provide valuable
information on the data governance values that have
to be practice in the HEIs to upgrade the governance
responsibility and accountability for the controlling
and directing issues of the management [4].
This paper identifies the
management and governance o
propose data security governance model for better
data security in higher education industries.
@ IJTSRD | Available Online @ www.ijtsrd.com | Special Issue Publication | November 2018 P - 243
Special Issue Publication
International Conference on Advanced Engineering
f Data Security In HEIs
Veluswamy Jayavardhanavelu1
nd Technology, Linton University College, Malaysia
to provide data governance with the proper security
ices in information systems security governance
HEIs governance of data
security for the information security in various fields.
It coincides with the management of information
security. The real world situation on data security
concentrates on every element of managing secure
data in whatsoever applications implemented or in use
of user which involves governance of data security.
The main concern is the sense of proper governance
data security need to be established in ordered not to
be violated without the
and administrator. This paper
explains the issues on management and governance of
data security in HEIs based on the research of faculty
members. The main purpose is to understand and be
aware of the factors that affect governance in the area
of data security. The data governance values need to
practice in HEIs is an important concern for data
The findings in this paper provide valuable
ata governance values that have
to be practice in the HEIs to upgrade the governance
responsibility and accountability for the controlling
and directing issues of the management [4].
emerging issues in
management and governance of data security and
propose data security governance model for better
data security in higher education industries.
International Journal of Trend in Scientific Research and Development (IJTSRD) | ISSN: 2456-647
@ IJTSRD | Available Online @ www.ijtsrd.com | Special Issue Publication | November 2018 P - 244
2. Literature Review
This paper focuses on the issues on management and
governance of data security in HEIs. Data security
governance enhances tight security of governance in
the higher education data infringement rules and
regulations.
The latest trends of data security in institutions of
higher education
As the technology becomes advanced, most higher
learning institutions are moving towards Mobile
Learning Systems (M-LS). It has advantages and
benefit but no specific standard to improve the M-LS
due to multiplicities and drawback of the mobile
devices [5].
Information asset’s residing within the M-LS must be
secured and given high priorities where it should
guard the business operation, university reputation
and risk and liabilities [4]. However, the
responsibilities and commitment from higher
education employees with regard to information
security is found to be lacking [6].
Other than the M-LS, higher education need to avoid
unauthorized users to access and monitor the work of
professors and researchers, making sure of their
research are safe in the institution and not allowing
anyone to track on the information that is being
accessed. More importantly, the student’s confidential
data and results in the computer of the institution must
also be protected. Hence, the data security governance
is required to facilitate all higher education users to
comply with policies and best practices [7].
Overview of data security in HEIs
Teaching and Learning has been growing rapidly in
the higher education. One of the important growing
environments is E-learning. As people are moving
faster heading towards Web 2.0, the younger
generations desires for online communications and
latest gadgets in the market drive towards mobile
learning. Online communication and mobile
computing are being the new trends for the
Malaysians.
Mobile learning is a term that focuses on the learning
materials which can be use through mobile devices
that can be accessed at any time around the world [5].
Information accessed and dissemination has to be
given importance has this is the key assets for the
higher education success [4].
However, studies have highlighted that many of this
educational resources are being blocked for access
due to privacy reasons, complications and regulations
set by the university. This is also due to the increase
of security breaches as the results of the IT security
policy and procedures; design for the academic
purposes is in an average range [7].
Therefore, strong leadership, policies and procedures,
training and awareness are needed towards the
designing a proper IT security strategies for
employees to handle security measures [7].
Governance of data security in HEIs
The governance in higher education institutions
involves formation of policies to organize and
monitor the work of management on a day today basis
in their institution or administration of the institutions.
The institutions resources that require access need to
have conditions to access the control and a private key
being generated on request, which permits the system
readable to the information authorized users.
The information privacy and security are at stake
when data are shared among the users and systems.
Data’s needed to be governed in a secure way with
appropriate values and polices [8]. There are many
research papers has been provided to resolve actions
with what information is, when and on what
conditions is and what methods used to provide to
information security [9].
The various institutions have different resources,
needs and beginning point. Anthony [10] stated out
the point that concern on the HEIs data protect, proper
usage, and protect the management of data in
institutional resources.
This is being organized based on different goals and
models rather than the public corporate sector, non-
profitable managements also face same type of issues
such as risk, business continuity, liability, costs factor
and national repercussions which are the core
activities that move around the internet technology.
The use of data governance systems and polices will
give more valuable advantages for the public higher
education and gives more quality organizational data,
provide positive effects of the data governance tools
and systems on institutional strategic planning and
decision making [11].
International Journal of Trend in Scientific Research and Development (IJTSRD) | ISSN: 2456-647
@ IJTSRD | Available Online @ www.ijtsrd.com | Special Issue Publication | November 2018 P - 245
Information Security Scenario in Malaysia Private
Higher Education
IT environment is a major part in all the higher
education that deals multiple types of data, access
network resources and managing databases from
faculty staffs. It needs to be secured through
technology as the information security is important
due to the increase of computer application, internet
usage and intrusions [12].
This technology has to be up to date with current
technology however insufficient facilities and cost
towards the technology change becomes threats to
higher education. These threats causes confidentiality
of data being breached and in this case experts are
needed to take in charge to control and monitor over
the system and threats. This process goes beyond to
identify what types of security breach and kind of
strategies needed to solve these issues [12].
Communication is also a barrier when dealing with
data security among the faculty members where
information can be misunderstood. Besides that, the
organization has to support the management by
having some practices, processes and policy
enforcement over the data security that will help the
faculty staffs in the higher education to be aware of
seriousness and challenges to protect data that they
are handling every day.
Hence, a proper communication channel needs to be
provided for information sharing. Access rights have
to be given to the faculty staffs in charge in avoiding
data breach. This will support the performance of the
faculty staffs towards the data security.
3. Research Methodology
This paper develops into the issues on management
and governance of data security in HEIs. The aim is to
identify new data security governance practices were
to help to solve data governance problems in the
higher education.
The research carried out through quantitative
approach in a form of collecting survey data. The data
is analyzed by using statistical method.
In the research design, qualitative method was used
which consists of analytical approach focusing on the
review and analysis of the literature review that will
help to develop governance of data security model
and empirical approach is testing the proposed model
with questionnaire and verify by experts in the higher
education through structure interviews. Statistical tool
is used to analyze the data that been collected through
questionnaire. The final solution is taken to design
star data governance model. The implemented model
generated a constant management and governance of
data security practices in HEIs.
The research is based on the 8 hypotheses feedbacks
and comments on the survey instrument. The data are
collected from various faculties’ staffs in higher
education institutions.
4. Findings
FIGURE 1: STAR GOVERNANCE MODEL OF
DATA SECURITY
Independent
Variables
Role of Variables
Data Security
Governance
Practices
To achieve goals and the key performance processes for data security in the higher
education through governance practices.
International Journal of Trend in Scientific Research and Development (IJTSRD) | ISSN: 2456-647
@ IJTSRD | Available Online @ www.ijtsrd.com | Special Issue Publication | November 2018 P - 246
Dependent
Variables Role of Variables
IT Leadership IT experts are expected to take lead control and organize the technologies in the
higher education institution to have better data security.
Management
Support
To improve employee productivity in the higher education institution for better data
security.
Ethics Set of standard quality principles for data security in higher education institution.
Communications To improve internal communication in the higher education institution for better
data security.
Data
Infrastructure To improve data infrastructure in the higher education institution for data security.
Data Policies
and Standards
To ensure all employees practice the policies and standard for data security in the
higher education institution.
People To be more organized and improve the relationships among faculties’ members in
the higher education institution for data security.
Organization
Process
Actions being taken to maintain the data security in the higher education
institution.
TABLE 1: ROLE OF VARIABLES IN HEIs
The role of dependent and independent variables that
plays in the HEIs shows the purpose of the each
variable that holds a responsibility towards the HEIs.
The hypothesis has generated a constant data security
value against the data governance security practices in
higher education institutions.
FIGURE 2: SUMMARY OF HYPOTHESIS
TESTING
5. Future Work
There are some limitations are need to be taken into
considerations through the research case study. This
paper primary focus was on issues pertaining to data
governance security. The primary respondents of this
HEIs study are taken from the various staffs in the
higher education institutions. Their view and
knowledge may slightly differ among all the other
institution members based on their exposure towards
the governance of data security and knowledge. This
paper is widely adopts the quantitative approach using
questionnaire to collect data. However, the difficulties
to collect information from institution staffs those
who are not aware on the importance of the
governance in the data security may contribute to
provide a saturated linear results. Nevertheless,
security measures need to be prioritized in HEI’s to
provide quality in organizational data management.
Future research is to practically test the star data
security governance factors in practically checking the
feasibility that these factors actually brought to
saturated values in HEIs practices in data security
governance.
6. Contribution
This study used the eight variables of model of data
security governance practice for the higher education.
It has contributed eight variables which includes IT
leadership, management support, ethics,
communications, data infrastructure, data policies and
standard, people and organization process which
contribute the factors that affects the governance of
data security in the higher education institutions. The
eight governance’s model is designed as star data
governance model which shows equal weight age in
data governance practices. The summarized
hypothesis testing of star governance practices is to
provide common average data governance security
value. The identified factors will assist the IT
management department of institution in identifying
what is necessary to address the data security
governance issues in higher education. Findings of
this study have also contributed to the data security
governance body of knowledge in empirically testing
the identified variables in a higher education
institutions HEIs context.
International Journal of Trend in Scientific Research and Development (IJTSRD) | ISSN: 2456-647
@ IJTSRD | Available Online @ www.ijtsrd.com | Special Issue Publication | November 2018 P - 247
7. Conclusion
This paper analyzes the governance of data security
conceptual model for higher education in Malaysia.
Based on the quantitative and qualitative survey, it
was discovered that all the factors have positive
relationship with the data security governance
practices. As per summary of hypothesis, all the
factors are influential factors that support each other.
The factors are balanced that are expected to take
control, organize and support each other in the HEIs
to solve the issues on management and have better
data security governance in higher education.
Research findings shows that the governance model
of data security should include IT leadership,
management support, ethics, communication, data
infrastructure, data policies and standards, people and
organization process. All these factors have positive
impact on Data governance of security based on star
data governance model. Proven to be the best for the
hypothesis.
8. References
1. Broadbent, M. (2003). Effective IT Governance
by Design, Gartner Inc.
2. Dhillon, G. (2007) Principles of Information
Systems Security: Text and Cases Wiley.
3. Sushma, M., & Gurpreet, D. (2016). Information
systems security governance research: A
behavioural perspective.
4. Munyaradzi. M., Patrick. M., and Theo. T.
(2014).The Status of Information Security
Governance within State Universities in
Zimbabwe.
5. Farrah, D. S. B., Norizan, A., Noraizan, A., &
Riaza, P.M.R. (2014). Conceptualizing security
measures on mobile learning for Malaysian higher
education institutions. IETC. Procedia - Social and
Behavioral Sciences 176 (2015), 1083 -1088.
6. Von. Solms. B. (2001). Corporate Governance and
Information Security. Computers & Security, 20,
pp 215-218
7. Robert, B. K, John, V., Judith, B. C., and Judith,
A. P. (2003). Information Technology Security:
Governance, Strategy, and Practice in Higher
Education.(5) 2003.
8. Knox, C.W., Jarl, N. & Steve, M. (2011)
Persistent Security, privacy and governance for
healthcare information.
9. Rajesh, P., & Umesh, K, S. (2012). An overview
and study of security issues and challenges in
cloud computing.
10. Anthony. (2014). Data Governance Overview.
Protiviti Risk Business Consulting. Internal Audit.
11. Marsha. P. (2011). Applying Aspects of Data
Governance from the Private Sector to Public
Higher Education.
12. Md. Waliullah., Jahidul. A & Golam, M. D.
(2012). Information Technology Security,
Strategies and Practices in Higher Education: A
Literature Review. Journal of Computing, 4(7),
July 2012.

More Related Content

PDF
Electronic Healthcare Record Security and Management in Healthcare Organizations
PDF
Recapitulating the development initiatives of a robust information security s...
PDF
Information Security Management System: Emerging Issues and Prospect
PDF
A DECISION-MAKING MODEL FOR REINFORCING A CORPORATE INFORMATION SECURITY SYSTEM
DOCX
Ics 3210 information systems security and audit - edited
PDF
Information Security Governance #2A
PPSX
Information Security Governance: Concepts, Security Management & Metrics
PDF
Study and analysis of E-Governance Information Security (InfoSec) in Indian C...
Electronic Healthcare Record Security and Management in Healthcare Organizations
Recapitulating the development initiatives of a robust information security s...
Information Security Management System: Emerging Issues and Prospect
A DECISION-MAKING MODEL FOR REINFORCING A CORPORATE INFORMATION SECURITY SYSTEM
Ics 3210 information systems security and audit - edited
Information Security Governance #2A
Information Security Governance: Concepts, Security Management & Metrics
Study and analysis of E-Governance Information Security (InfoSec) in Indian C...

What's hot (18)

PDF
11.management information system and senior staff job performance in polytech...
PDF
Information Security Governance: Concepts, Security Management & Metrics
PDF
Exquando - A case for content classification automation
PDF
RANKING CRITERIA OF ENTERPRISE INFORMATION SECURITY ARCHITECTURE USING FUZZY ...
PDF
Paper Titled Information Security in an organization
PDF
Is security model by dawit mekonnen
PDF
11.management information system and senior staff job performance in polytech...
PPTX
9 mahmood shah risk 4 3
PDF
11.management information system and senior staff job performance in polytech...
PDF
An information security governance framework
PDF
Information Technology (IT) Security Framework for Kenyan Small and Medium En...
PDF
International Journal of Engineering Research and Development
PDF
DIGITALIZATION AND DIGITAL TRANSFORMATION IN TAKING THE OMAN ACADEMIC ACCREDI...
PDF
Si pi, 02, kiki kusumayadi ahadiyat, hapzi ali, the application of data and i...
PDF
WIRELESS SECURITY MEASUREMENT USING DATA VALUE INDEX
PDF
IRJET- Big Data Privacy and Security Challenges in Industries
PDF
Policy on ia 1st assignment
PPT
Security and personnel bp11521
11.management information system and senior staff job performance in polytech...
Information Security Governance: Concepts, Security Management & Metrics
Exquando - A case for content classification automation
RANKING CRITERIA OF ENTERPRISE INFORMATION SECURITY ARCHITECTURE USING FUZZY ...
Paper Titled Information Security in an organization
Is security model by dawit mekonnen
11.management information system and senior staff job performance in polytech...
9 mahmood shah risk 4 3
11.management information system and senior staff job performance in polytech...
An information security governance framework
Information Technology (IT) Security Framework for Kenyan Small and Medium En...
International Journal of Engineering Research and Development
DIGITALIZATION AND DIGITAL TRANSFORMATION IN TAKING THE OMAN ACADEMIC ACCREDI...
Si pi, 02, kiki kusumayadi ahadiyat, hapzi ali, the application of data and i...
WIRELESS SECURITY MEASUREMENT USING DATA VALUE INDEX
IRJET- Big Data Privacy and Security Challenges in Industries
Policy on ia 1st assignment
Security and personnel bp11521
Ad

Similar to Issues on Management and Governance of Data Security In HEIs (20)

PPTX
Data and information governance: getting this right to support an information...
PDF
IT Security in Higher Education
PDF
Enhanced Cryptographic Solution for Security Issues Faced by Saudi Arabian un...
PDF
Cybersecurity in Educational Institutions: Management Strategies (www.kiu.ac.ug)
PDF
Key findings from information security survey at higher education institution...
PPTX
Information Security Governance and Strategy - 3
PDF
Data Protection for Higher Education
DOCX
Journal of Information Technology Education Volume 11, 2012 .docx
DOCX
GUL Network Infrastructure
PPT
Start With A Great Information Security Plan!
PPT
Exeter university ig manager presentation [1]
PDF
Auditing Organizational Information Assurance (IA) Governance Practices
PDF
Conceptualizing Information Technology Governance Model for Higher Education:...
PPTX
144 presentation iee_tel2021
PDF
Information Security Governance: Concepts, Security Management & Metrics
PPTX
IT Governance Made Easy
PDF
Information Security Management in University Campus Using Cognitive Security
PDF
Best practice framework for information technology security governance in In...
PDF
Attitude towards E – Governance among the Student Teachers of Educational Col...
PDF
Access Control and Identity Management Information Systems Security Assurance...
Data and information governance: getting this right to support an information...
IT Security in Higher Education
Enhanced Cryptographic Solution for Security Issues Faced by Saudi Arabian un...
Cybersecurity in Educational Institutions: Management Strategies (www.kiu.ac.ug)
Key findings from information security survey at higher education institution...
Information Security Governance and Strategy - 3
Data Protection for Higher Education
Journal of Information Technology Education Volume 11, 2012 .docx
GUL Network Infrastructure
Start With A Great Information Security Plan!
Exeter university ig manager presentation [1]
Auditing Organizational Information Assurance (IA) Governance Practices
Conceptualizing Information Technology Governance Model for Higher Education:...
144 presentation iee_tel2021
Information Security Governance: Concepts, Security Management & Metrics
IT Governance Made Easy
Information Security Management in University Campus Using Cognitive Security
Best practice framework for information technology security governance in In...
Attitude towards E – Governance among the Student Teachers of Educational Col...
Access Control and Identity Management Information Systems Security Assurance...
Ad

More from ijtsrd (20)

PDF
A Study of School Dropout in Rural Districts of Darjeeling and Its Causes
PDF
Pre extension Demonstration and Evaluation of Soybean Technologies in Fedis D...
PDF
Pre extension Demonstration and Evaluation of Potato Technologies in Selected...
PDF
Pre extension Demonstration and Evaluation of Animal Drawn Potato Digger in S...
PDF
Pre extension Demonstration and Evaluation of Drought Tolerant and Early Matu...
PDF
Pre extension Demonstration and Evaluation of Double Cropping Practice Legume...
PDF
Pre extension Demonstration and Evaluation of Common Bean Technology in Low L...
PDF
Enhancing Image Quality in Compression and Fading Channels A Wavelet Based Ap...
PDF
Manpower Training and Employee Performance in Mellienium Ltdawka, Anambra State
PDF
A Statistical Analysis on the Growth Rate of Selected Sectors of Nigerian Eco...
PDF
Automatic Accident Detection and Emergency Alert System using IoT
PDF
Corporate Social Responsibility Dimensions and Corporate Image of Selected Up...
PDF
The Role of Media in Tribal Health and Educational Progress of Odisha
PDF
Advancements and Future Trends in Advanced Quantum Algorithms A Prompt Scienc...
PDF
A Study on Seismic Analysis of High Rise Building with Mass Irregularities, T...
PDF
Descriptive Study to Assess the Knowledge of B.Sc. Interns Regarding Biomedic...
PDF
Performance of Grid Connected Solar PV Power Plant at Clear Sky Day
PDF
Vitiligo Treated Homoeopathically A Case Report
PDF
Vitiligo Treated Homoeopathically A Case Report
PDF
Uterine Fibroids Homoeopathic Perspectives
A Study of School Dropout in Rural Districts of Darjeeling and Its Causes
Pre extension Demonstration and Evaluation of Soybean Technologies in Fedis D...
Pre extension Demonstration and Evaluation of Potato Technologies in Selected...
Pre extension Demonstration and Evaluation of Animal Drawn Potato Digger in S...
Pre extension Demonstration and Evaluation of Drought Tolerant and Early Matu...
Pre extension Demonstration and Evaluation of Double Cropping Practice Legume...
Pre extension Demonstration and Evaluation of Common Bean Technology in Low L...
Enhancing Image Quality in Compression and Fading Channels A Wavelet Based Ap...
Manpower Training and Employee Performance in Mellienium Ltdawka, Anambra State
A Statistical Analysis on the Growth Rate of Selected Sectors of Nigerian Eco...
Automatic Accident Detection and Emergency Alert System using IoT
Corporate Social Responsibility Dimensions and Corporate Image of Selected Up...
The Role of Media in Tribal Health and Educational Progress of Odisha
Advancements and Future Trends in Advanced Quantum Algorithms A Prompt Scienc...
A Study on Seismic Analysis of High Rise Building with Mass Irregularities, T...
Descriptive Study to Assess the Knowledge of B.Sc. Interns Regarding Biomedic...
Performance of Grid Connected Solar PV Power Plant at Clear Sky Day
Vitiligo Treated Homoeopathically A Case Report
Vitiligo Treated Homoeopathically A Case Report
Uterine Fibroids Homoeopathic Perspectives

Recently uploaded (20)

PPTX
20th Century Theater, Methods, History.pptx
PPTX
Chinmaya Tiranga Azadi Quiz (Class 7-8 )
PDF
A GUIDE TO GENETICS FOR UNDERGRADUATE MEDICAL STUDENTS
PDF
HVAC Specification 2024 according to central public works department
PPTX
A powerpoint presentation on the Revised K-10 Science Shaping Paper
PDF
Chinmaya Tiranga quiz Grand Finale.pdf
PDF
MBA _Common_ 2nd year Syllabus _2021-22_.pdf
PPTX
History, Philosophy and sociology of education (1).pptx
PDF
BP 704 T. NOVEL DRUG DELIVERY SYSTEMS (UNIT 1)
PDF
AI-driven educational solutions for real-life interventions in the Philippine...
PDF
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
PPTX
Introduction to pro and eukaryotes and differences.pptx
PDF
LDMMIA Reiki Yoga Finals Review Spring Summer
PDF
David L Page_DCI Research Study Journey_how Methodology can inform one's prac...
PPTX
Introduction to Building Materials
PPTX
Computer Architecture Input Output Memory.pptx
PDF
Paper A Mock Exam 9_ Attempt review.pdf.
PPTX
CHAPTER IV. MAN AND BIOSPHERE AND ITS TOTALITY.pptx
PDF
1_English_Language_Set_2.pdf probationary
PDF
medical_surgical_nursing_10th_edition_ignatavicius_TEST_BANK_pdf.pdf
20th Century Theater, Methods, History.pptx
Chinmaya Tiranga Azadi Quiz (Class 7-8 )
A GUIDE TO GENETICS FOR UNDERGRADUATE MEDICAL STUDENTS
HVAC Specification 2024 according to central public works department
A powerpoint presentation on the Revised K-10 Science Shaping Paper
Chinmaya Tiranga quiz Grand Finale.pdf
MBA _Common_ 2nd year Syllabus _2021-22_.pdf
History, Philosophy and sociology of education (1).pptx
BP 704 T. NOVEL DRUG DELIVERY SYSTEMS (UNIT 1)
AI-driven educational solutions for real-life interventions in the Philippine...
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
Introduction to pro and eukaryotes and differences.pptx
LDMMIA Reiki Yoga Finals Review Spring Summer
David L Page_DCI Research Study Journey_how Methodology can inform one's prac...
Introduction to Building Materials
Computer Architecture Input Output Memory.pptx
Paper A Mock Exam 9_ Attempt review.pdf.
CHAPTER IV. MAN AND BIOSPHERE AND ITS TOTALITY.pptx
1_English_Language_Set_2.pdf probationary
medical_surgical_nursing_10th_edition_ignatavicius_TEST_BANK_pdf.pdf

Issues on Management and Governance of Data Security In HEIs

  • 1. @ IJTSRD | Available Online @ www.ijtsrd.com | Special Issue Publication | November 2018 ISSN No: 2456 International Journal of Trend in Scientific Research and International Conference on Advanced Engineering and Information Technology Issues on Management Janet Gabriel1 , Sheik Mohideen Abdul Latheef 1 Newbridge College, Melaka, Malaysia 2 Faculty of Engineering ABSTRACT In higher education, Governance of data security is the data management mechanism that has to be practiced. This is an appropriate management model for the employees in the higher education institution that will understand the role to be played to secure more highly confidential data. This paper aims at issues on management and governance of data security in Higher education institutions (HEIs). This will conclude on identifying the factors affecting governance of data security in private higher education system. It also enables to discover the issues in the management and provide appropriate solution for the governance of data security in the HEIs. A research model with factors was proposed for data security governance practice in HEIs. From the research findings, a governance model was derived and proposed for the all new HEIs. Keywords: issues, governance; data security; higher education institutions 1. INTRODUCTION The key role of governance is the way of management managing to protect the data in a highly secure manner. The institutions provide and apply specific rules and regulations but the main governance is involvement, accountability and decision rights. So both security and management is different [1]. To protect the accountability and responsibility of HEIs need proper internal controls with formal informational assets in institutional structure by the security information system governance [2]. The sense of ownership revolves around the institutional staff’s responsibility and accountability @ IJTSRD | Available Online @ www.ijtsrd.com | Special Issue Publication | November 2018 ISSN No: 2456 - 6470 | www.ijtsrd.com | Special Issue International Journal of Trend in Scientific Research and Development (IJTSRD) International Conference on Advanced Engineering and Information Technology (ICAEIT-2017) n Management and Governance of Data Security In HEIs Sheik Mohideen Abdul Latheef2 , Veluswamy Jayavardhanavelu Newbridge College, Melaka, Malaysia f Engineering and Technology, Linton University College, Malaysia In higher education, Governance of data security is mechanism that has to be practiced. This is an appropriate management model for the employees in the higher education institution that will understand the role to be played to secure more highly confidential data. This paper aims at d governance of data security in Higher education institutions (HEIs). This will conclude on identifying the factors affecting governance of data security in private higher education system. It also enables to discover the ide appropriate solution for the governance of data security in the HEIs. A research model with factors was proposed for data security governance practice in HEIs. From the research findings, a governance model was derived issues, governance; data security; higher The key role of governance is the way of management managing to protect the data in a highly secure manner. The institutions provide and apply specific principle for governance is involvement, accountability and decision rights. So both security and management is different [1]. To protect the accountability and responsibility of HEIs need proper internal controls informational assets in institutional structure by the security information system The sense of ownership revolves around the institutional staff’s responsibility and accountability to provide data governance with the proper security polices in information systems security governance are crucial [3]. This paper explains the HEIs security for the information security in various fields. It coincides with the management of information security. The real world situation o concentrates on every element of managing secure data in whatsoever applications implemented or in use of user which involves governance of data security. The main concern is the sense of proper governance data security need to be establish be breach of data that will be knowledge of user and administrator. This paper explains the issues on management and governance of data security in HEIs based on the research of faculty members. The main purpose is aware of the factors that affect governance in the area of data security. The data governance values need to practice in HEIs is an important concern for data security. The findings in this paper provide valuable information on the data governance values that have to be practice in the HEIs to upgrade the governance responsibility and accountability for the controlling and directing issues of the management [4]. This paper identifies the management and governance o propose data security governance model for better data security in higher education industries. @ IJTSRD | Available Online @ www.ijtsrd.com | Special Issue Publication | November 2018 P - 243 Special Issue Publication International Conference on Advanced Engineering f Data Security In HEIs Veluswamy Jayavardhanavelu1 nd Technology, Linton University College, Malaysia to provide data governance with the proper security ices in information systems security governance HEIs governance of data security for the information security in various fields. It coincides with the management of information security. The real world situation on data security concentrates on every element of managing secure data in whatsoever applications implemented or in use of user which involves governance of data security. The main concern is the sense of proper governance data security need to be established in ordered not to be violated without the and administrator. This paper explains the issues on management and governance of data security in HEIs based on the research of faculty members. The main purpose is to understand and be aware of the factors that affect governance in the area of data security. The data governance values need to practice in HEIs is an important concern for data The findings in this paper provide valuable ata governance values that have to be practice in the HEIs to upgrade the governance responsibility and accountability for the controlling and directing issues of the management [4]. emerging issues in management and governance of data security and propose data security governance model for better data security in higher education industries.
  • 2. International Journal of Trend in Scientific Research and Development (IJTSRD) | ISSN: 2456-647 @ IJTSRD | Available Online @ www.ijtsrd.com | Special Issue Publication | November 2018 P - 244 2. Literature Review This paper focuses on the issues on management and governance of data security in HEIs. Data security governance enhances tight security of governance in the higher education data infringement rules and regulations. The latest trends of data security in institutions of higher education As the technology becomes advanced, most higher learning institutions are moving towards Mobile Learning Systems (M-LS). It has advantages and benefit but no specific standard to improve the M-LS due to multiplicities and drawback of the mobile devices [5]. Information asset’s residing within the M-LS must be secured and given high priorities where it should guard the business operation, university reputation and risk and liabilities [4]. However, the responsibilities and commitment from higher education employees with regard to information security is found to be lacking [6]. Other than the M-LS, higher education need to avoid unauthorized users to access and monitor the work of professors and researchers, making sure of their research are safe in the institution and not allowing anyone to track on the information that is being accessed. More importantly, the student’s confidential data and results in the computer of the institution must also be protected. Hence, the data security governance is required to facilitate all higher education users to comply with policies and best practices [7]. Overview of data security in HEIs Teaching and Learning has been growing rapidly in the higher education. One of the important growing environments is E-learning. As people are moving faster heading towards Web 2.0, the younger generations desires for online communications and latest gadgets in the market drive towards mobile learning. Online communication and mobile computing are being the new trends for the Malaysians. Mobile learning is a term that focuses on the learning materials which can be use through mobile devices that can be accessed at any time around the world [5]. Information accessed and dissemination has to be given importance has this is the key assets for the higher education success [4]. However, studies have highlighted that many of this educational resources are being blocked for access due to privacy reasons, complications and regulations set by the university. This is also due to the increase of security breaches as the results of the IT security policy and procedures; design for the academic purposes is in an average range [7]. Therefore, strong leadership, policies and procedures, training and awareness are needed towards the designing a proper IT security strategies for employees to handle security measures [7]. Governance of data security in HEIs The governance in higher education institutions involves formation of policies to organize and monitor the work of management on a day today basis in their institution or administration of the institutions. The institutions resources that require access need to have conditions to access the control and a private key being generated on request, which permits the system readable to the information authorized users. The information privacy and security are at stake when data are shared among the users and systems. Data’s needed to be governed in a secure way with appropriate values and polices [8]. There are many research papers has been provided to resolve actions with what information is, when and on what conditions is and what methods used to provide to information security [9]. The various institutions have different resources, needs and beginning point. Anthony [10] stated out the point that concern on the HEIs data protect, proper usage, and protect the management of data in institutional resources. This is being organized based on different goals and models rather than the public corporate sector, non- profitable managements also face same type of issues such as risk, business continuity, liability, costs factor and national repercussions which are the core activities that move around the internet technology. The use of data governance systems and polices will give more valuable advantages for the public higher education and gives more quality organizational data, provide positive effects of the data governance tools and systems on institutional strategic planning and decision making [11].
  • 3. International Journal of Trend in Scientific Research and Development (IJTSRD) | ISSN: 2456-647 @ IJTSRD | Available Online @ www.ijtsrd.com | Special Issue Publication | November 2018 P - 245 Information Security Scenario in Malaysia Private Higher Education IT environment is a major part in all the higher education that deals multiple types of data, access network resources and managing databases from faculty staffs. It needs to be secured through technology as the information security is important due to the increase of computer application, internet usage and intrusions [12]. This technology has to be up to date with current technology however insufficient facilities and cost towards the technology change becomes threats to higher education. These threats causes confidentiality of data being breached and in this case experts are needed to take in charge to control and monitor over the system and threats. This process goes beyond to identify what types of security breach and kind of strategies needed to solve these issues [12]. Communication is also a barrier when dealing with data security among the faculty members where information can be misunderstood. Besides that, the organization has to support the management by having some practices, processes and policy enforcement over the data security that will help the faculty staffs in the higher education to be aware of seriousness and challenges to protect data that they are handling every day. Hence, a proper communication channel needs to be provided for information sharing. Access rights have to be given to the faculty staffs in charge in avoiding data breach. This will support the performance of the faculty staffs towards the data security. 3. Research Methodology This paper develops into the issues on management and governance of data security in HEIs. The aim is to identify new data security governance practices were to help to solve data governance problems in the higher education. The research carried out through quantitative approach in a form of collecting survey data. The data is analyzed by using statistical method. In the research design, qualitative method was used which consists of analytical approach focusing on the review and analysis of the literature review that will help to develop governance of data security model and empirical approach is testing the proposed model with questionnaire and verify by experts in the higher education through structure interviews. Statistical tool is used to analyze the data that been collected through questionnaire. The final solution is taken to design star data governance model. The implemented model generated a constant management and governance of data security practices in HEIs. The research is based on the 8 hypotheses feedbacks and comments on the survey instrument. The data are collected from various faculties’ staffs in higher education institutions. 4. Findings FIGURE 1: STAR GOVERNANCE MODEL OF DATA SECURITY Independent Variables Role of Variables Data Security Governance Practices To achieve goals and the key performance processes for data security in the higher education through governance practices.
  • 4. International Journal of Trend in Scientific Research and Development (IJTSRD) | ISSN: 2456-647 @ IJTSRD | Available Online @ www.ijtsrd.com | Special Issue Publication | November 2018 P - 246 Dependent Variables Role of Variables IT Leadership IT experts are expected to take lead control and organize the technologies in the higher education institution to have better data security. Management Support To improve employee productivity in the higher education institution for better data security. Ethics Set of standard quality principles for data security in higher education institution. Communications To improve internal communication in the higher education institution for better data security. Data Infrastructure To improve data infrastructure in the higher education institution for data security. Data Policies and Standards To ensure all employees practice the policies and standard for data security in the higher education institution. People To be more organized and improve the relationships among faculties’ members in the higher education institution for data security. Organization Process Actions being taken to maintain the data security in the higher education institution. TABLE 1: ROLE OF VARIABLES IN HEIs The role of dependent and independent variables that plays in the HEIs shows the purpose of the each variable that holds a responsibility towards the HEIs. The hypothesis has generated a constant data security value against the data governance security practices in higher education institutions. FIGURE 2: SUMMARY OF HYPOTHESIS TESTING 5. Future Work There are some limitations are need to be taken into considerations through the research case study. This paper primary focus was on issues pertaining to data governance security. The primary respondents of this HEIs study are taken from the various staffs in the higher education institutions. Their view and knowledge may slightly differ among all the other institution members based on their exposure towards the governance of data security and knowledge. This paper is widely adopts the quantitative approach using questionnaire to collect data. However, the difficulties to collect information from institution staffs those who are not aware on the importance of the governance in the data security may contribute to provide a saturated linear results. Nevertheless, security measures need to be prioritized in HEI’s to provide quality in organizational data management. Future research is to practically test the star data security governance factors in practically checking the feasibility that these factors actually brought to saturated values in HEIs practices in data security governance. 6. Contribution This study used the eight variables of model of data security governance practice for the higher education. It has contributed eight variables which includes IT leadership, management support, ethics, communications, data infrastructure, data policies and standard, people and organization process which contribute the factors that affects the governance of data security in the higher education institutions. The eight governance’s model is designed as star data governance model which shows equal weight age in data governance practices. The summarized hypothesis testing of star governance practices is to provide common average data governance security value. The identified factors will assist the IT management department of institution in identifying what is necessary to address the data security governance issues in higher education. Findings of this study have also contributed to the data security governance body of knowledge in empirically testing the identified variables in a higher education institutions HEIs context.
  • 5. International Journal of Trend in Scientific Research and Development (IJTSRD) | ISSN: 2456-647 @ IJTSRD | Available Online @ www.ijtsrd.com | Special Issue Publication | November 2018 P - 247 7. Conclusion This paper analyzes the governance of data security conceptual model for higher education in Malaysia. Based on the quantitative and qualitative survey, it was discovered that all the factors have positive relationship with the data security governance practices. As per summary of hypothesis, all the factors are influential factors that support each other. The factors are balanced that are expected to take control, organize and support each other in the HEIs to solve the issues on management and have better data security governance in higher education. Research findings shows that the governance model of data security should include IT leadership, management support, ethics, communication, data infrastructure, data policies and standards, people and organization process. All these factors have positive impact on Data governance of security based on star data governance model. Proven to be the best for the hypothesis. 8. References 1. Broadbent, M. (2003). Effective IT Governance by Design, Gartner Inc. 2. Dhillon, G. (2007) Principles of Information Systems Security: Text and Cases Wiley. 3. Sushma, M., & Gurpreet, D. (2016). Information systems security governance research: A behavioural perspective. 4. Munyaradzi. M., Patrick. M., and Theo. T. (2014).The Status of Information Security Governance within State Universities in Zimbabwe. 5. Farrah, D. S. B., Norizan, A., Noraizan, A., & Riaza, P.M.R. (2014). Conceptualizing security measures on mobile learning for Malaysian higher education institutions. IETC. Procedia - Social and Behavioral Sciences 176 (2015), 1083 -1088. 6. Von. Solms. B. (2001). Corporate Governance and Information Security. Computers & Security, 20, pp 215-218 7. Robert, B. K, John, V., Judith, B. C., and Judith, A. P. (2003). Information Technology Security: Governance, Strategy, and Practice in Higher Education.(5) 2003. 8. Knox, C.W., Jarl, N. & Steve, M. (2011) Persistent Security, privacy and governance for healthcare information. 9. Rajesh, P., & Umesh, K, S. (2012). An overview and study of security issues and challenges in cloud computing. 10. Anthony. (2014). Data Governance Overview. Protiviti Risk Business Consulting. Internal Audit. 11. Marsha. P. (2011). Applying Aspects of Data Governance from the Private Sector to Public Higher Education. 12. Md. Waliullah., Jahidul. A & Golam, M. D. (2012). Information Technology Security, Strategies and Practices in Higher Education: A Literature Review. Journal of Computing, 4(7), July 2012.