Computer security control practices: views of future employees in Malaysia

Threats in computerized working environment are getting serious attention by many companies around the world. These threats among others include; highly important data loss, misuse of companies’ computer facilities, and equipment damages due to negligence by the employees. Due to these threats, it i...

Full description

Bibliographic Details
Main Authors: Zainol, Zaini, Puat Nelson, Sherliza
Format: Proceeding Paper
Language:English
Published: 2015
Subjects:
Online Access:http://irep.iium.edu.my/43615/
http://irep.iium.edu.my/43615/12/programme-book%2Bpaper%2Bacceptance_letter-zaini-zainol.pdf
_version_ 1848782481746034688
author Zainol, Zaini
Puat Nelson, Sherliza
author_facet Zainol, Zaini
Puat Nelson, Sherliza
author_sort Zainol, Zaini
building IIUM Repository
collection Online Access
description Threats in computerized working environment are getting serious attention by many companies around the world. These threats among others include; highly important data loss, misuse of companies’ computer facilities, and equipment damages due to negligence by the employees. Due to these threats, it is timely to install awareness and educate future employees on how to better safeguard companies’ properties especially the information technology resources like computers. In light of this, it calls for a growing need of research to investigate the existing practices of computer security controls in four domains namely; (1) data security controls,(2) software and access security controls, (3) hardware and physical access controls and (4) output security controls. Business students who enrolled in accounting, economics, and finance and business degrees are chosen as proxies for future employees in corporate organizations. In total, 346 questionnaires were distributed to students at the Faculty of Economics and Management Sciences in one university in Malaysia. These students were required to indicate their existing behaviour or practices with regard to their own personal computer’s administration within the four mentioned domains. Our findings indicate that majority of the students were concerned about their computer’s security controls. However, it is of our concern to find that, there were students who put little attention on their computers’ security. And hence, posed potential threats to their future employers. Our recommendations are higher learning institutions should continuously stress the importance of practicing good security controls in their education, and instill security governance awareness in IT usage to their students.
first_indexed 2025-11-14T16:06:09Z
format Proceeding Paper
id iium-43615
institution International Islamic University Malaysia
institution_category Local University
language English
last_indexed 2025-11-14T16:06:09Z
publishDate 2015
recordtype eprints
repository_type Digital Repository
spelling iium-436152015-08-19T03:41:12Z http://irep.iium.edu.my/43615/ Computer security control practices: views of future employees in Malaysia Zainol, Zaini Puat Nelson, Sherliza HF5601 Accounting. Bookkeeping Threats in computerized working environment are getting serious attention by many companies around the world. These threats among others include; highly important data loss, misuse of companies’ computer facilities, and equipment damages due to negligence by the employees. Due to these threats, it is timely to install awareness and educate future employees on how to better safeguard companies’ properties especially the information technology resources like computers. In light of this, it calls for a growing need of research to investigate the existing practices of computer security controls in four domains namely; (1) data security controls,(2) software and access security controls, (3) hardware and physical access controls and (4) output security controls. Business students who enrolled in accounting, economics, and finance and business degrees are chosen as proxies for future employees in corporate organizations. In total, 346 questionnaires were distributed to students at the Faculty of Economics and Management Sciences in one university in Malaysia. These students were required to indicate their existing behaviour or practices with regard to their own personal computer’s administration within the four mentioned domains. Our findings indicate that majority of the students were concerned about their computer’s security controls. However, it is of our concern to find that, there were students who put little attention on their computers’ security. And hence, posed potential threats to their future employers. Our recommendations are higher learning institutions should continuously stress the importance of practicing good security controls in their education, and instill security governance awareness in IT usage to their students. 2015-06-03 Proceeding Paper NonPeerReviewed application/pdf en http://irep.iium.edu.my/43615/12/programme-book%2Bpaper%2Bacceptance_letter-zaini-zainol.pdf Zainol, Zaini and Puat Nelson, Sherliza (2015) Computer security control practices: views of future employees in Malaysia. In: 1st International Conference on Educational Studies, 3-4 June 2015, Pulai Spring Resort Johor Bahru. (Unpublished)
spellingShingle HF5601 Accounting. Bookkeeping
Zainol, Zaini
Puat Nelson, Sherliza
Computer security control practices: views of future employees in Malaysia
title Computer security control practices: views of future employees in Malaysia
title_full Computer security control practices: views of future employees in Malaysia
title_fullStr Computer security control practices: views of future employees in Malaysia
title_full_unstemmed Computer security control practices: views of future employees in Malaysia
title_short Computer security control practices: views of future employees in Malaysia
title_sort computer security control practices: views of future employees in malaysia
topic HF5601 Accounting. Bookkeeping
url http://irep.iium.edu.my/43615/
http://irep.iium.edu.my/43615/12/programme-book%2Bpaper%2Bacceptance_letter-zaini-zainol.pdf