Abstract
Internationalization of research is reflected in the distributed nature of research communities. Research has a strong collaborative dimension. It is often carried out by non-collocated individuals and teams in the context of national / international funded programs, institutionally led projects, or simply self-motivated initiatives. Universities form a strong and influential component of these virtual research communities. Advances in information and communication technologies (ICT), including the Internet, have helped sustain these virtual research communities. However, despite the strategic nature of research, there exist various levels of awareness about the security risk factor linked with virtual collaboration. This study examines the security awareness of academics and researchers across higher education institutions with a focus on three different academic settings. The paper suggests that a security awareness program aimed at academics should be initiated across universities to pave the way to security aware research collaborative communities.
Chapter PDF
Similar content being viewed by others
References
Rezgui, Y., Marks, A.: Information security awareness in higher education: An exploratory study. Computers and Security 27(7-8) (2008)
Updegrove, D., Gordon, W.: Computers and Network Security in Higher Education, EDUCAUSE (2003)
Yin, R.K.: Applications of case study research. Sage, London (2003)
Albrechtsen, E., Hovden, J.: The information security digital divide between information security managers and users. Computers & Security (2009)
Bray, T.J.: Security actions during reduction in workforce efforts: what to do when downsizing. Information systems security (2002)
Cooper, M.: Information Security Training- Lessons Learned Along the Trail. In: Proceedings of the 36th annual ACM SIGUCCS conference on User services conference (2009)
Dlimini, M., Eloff, J., Eloff, M.: Information security: The moving target. Computers & Security (2008)
Dunlop, C., Kling, R.: Social Relationship in Electronic Commerce. In: Dunlop, C., Kling, R. (eds.) Introduction in Computerization and Controversy- Value Conflicts and Social change. Academic Press, New York (1992)
EDUCAUSE: Center for Applied Research: Information Technology Security: Governance, strategy, and practice in Higher Education (2003)
ISF- International Security Forum. The Forum’s Standard of Good Practice for IS security, http://www.isfsecuritystandard.com/index_ie.htm (Cited May 18, 2006)
Katz, F.H.: The Effect of a University Information Security Survey on Instructing Methods in Information Security. In: Proceedings of the 2nd annual conference on Information security curriculum development (2005)
Kovacich, G.: Information system security Officer’s Guide: Establishing and Managing an Information Protection Program. Butterworth-Heinemann, USA (1998)
Kruger, H.A., Kearney, W.D.: A prototype for assessing information security awareness. Computers & Security 25(1), 289–296 (2006)
Mitnick, K.D., Simon, W.L.: The Art of Deception: Controlling the Human Element of Security. Wiley, Indianapolis (2002)
North, M., Roy, G., North, S.: Computer Security Ethics Awareness in University Environments: A Challenge for Management of Information Systems (2006)
Puhakainen, P.: A Design Theory for Information Security Awareness (2006)
Siponen, M.T.: A Conceptual Foundation for Organizational Information Security awareness. Information Management & Computer Security (2000)
Joseph, M.: IT in the Middle East: Overview. In: Proceedings of the 7th conference on Information technology education (2006)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 IFIP
About this paper
Cite this paper
Marks, A., Rezgui, Y. (2010). Security Awareness in Virtual Communities: The Case of Non-collocated Academic Research Collaborations. In: Camarinha-Matos, L.M., Boucher, X., Afsarmanesh, H. (eds) Collaborative Networks for a Sustainable World. PRO-VE 2010. IFIP Advances in Information and Communication Technology, vol 336. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-15961-9_76
Download citation
DOI: https://doi.org/10.1007/978-3-642-15961-9_76
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-15960-2
Online ISBN: 978-3-642-15961-9
eBook Packages: Computer ScienceComputer Science (R0)