Miko Nuñez, X. Palmer, Lucas Potter, Chris Jordan G. Aliac, Lemuel Clark Velasco
{"title":"ICT Security Tools and Techniques among Higher Education Institutions: A Critical Review","authors":"Miko Nuñez, X. Palmer, Lucas Potter, Chris Jordan G. Aliac, Lemuel Clark Velasco","doi":"10.3991/ijet.v18i15.40673","DOIUrl":null,"url":null,"abstract":"Higher education institutions (HEIs) are increasingly relying on digital technologies for classroom and organizational management, but this puts them at higher risk for information and communication (ICT security attacks. Recent studies show that HEIs have experienced more security breaches in ICT security composed of both cybersecurity an information security. A literature review was conducted to identify common ICT security practices in HEIs over the last decade. 11 journal articles were profiled and analyzed, revealing threats to HEIs’ security and protective measures in terms of organizational security, technological security, physical security, and standards and frameworks. Security tools and techniques were grouped into categories with specific ways to protect ICT security. HEIs also implement general security standards and guidelines, such as the ISO 27000-series and Center for Internet Security (CIS) controls, in their framework. Through synthesis and analysis of ICT security tools and techniques among HEIs, this critical review hopes to provide research directions on IT governance that academic and technical administrators can further explore to secure their information resources.","PeriodicalId":47933,"journal":{"name":"International Journal of Emerging Technologies in Learning","volume":" ","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2023-08-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Emerging Technologies in Learning","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.3991/ijet.v18i15.40673","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"Social Sciences","Score":null,"Total":0}
引用次数: 0
Abstract
Higher education institutions (HEIs) are increasingly relying on digital technologies for classroom and organizational management, but this puts them at higher risk for information and communication (ICT security attacks. Recent studies show that HEIs have experienced more security breaches in ICT security composed of both cybersecurity an information security. A literature review was conducted to identify common ICT security practices in HEIs over the last decade. 11 journal articles were profiled and analyzed, revealing threats to HEIs’ security and protective measures in terms of organizational security, technological security, physical security, and standards and frameworks. Security tools and techniques were grouped into categories with specific ways to protect ICT security. HEIs also implement general security standards and guidelines, such as the ISO 27000-series and Center for Internet Security (CIS) controls, in their framework. Through synthesis and analysis of ICT security tools and techniques among HEIs, this critical review hopes to provide research directions on IT governance that academic and technical administrators can further explore to secure their information resources.
期刊介绍:
This interdisciplinary journal focuses on the exchange of relevant trends and research results and presents practical experiences gained while developing and testing elements of technology enhanced learning. It bridges the gap between pure academic research journals and more practical publications. So it covers the full range from research, application development to experience reports and product descriptions. Fields of interest include, but are not limited to: -Software / Distributed Systems -Knowledge Management -Semantic Web -MashUp Technologies -Platforms and Content Authoring -New Learning Models and Applications -Pedagogical and Psychological Issues -Trust / Security -Internet Applications -Networked Tools -Mobile / wireless -Electronics -Visualisation -Bio- / Neuroinformatics -Language /Speech -Collaboration Tools / Collaborative Networks