The least secure places in the universe? A systematic literature review on information security management in higher education

Bongiovanni, I. (2019) The least secure places in the universe? A systematic literature review on information security management in higher education. Computers and Security, 86, pp. 350-357. (doi: 10.1016/j.cose.2019.07.003)

[img]
Preview
Text
190399.pdf - Accepted Version
Available under License Creative Commons Attribution Non-commercial No Derivatives.

647kB

Abstract

Current research has demonstrated the progressively more strategic role that information security has in modern organisations. Higher education is no exception. The reported increasing number of security breaches experienced in recent years by higher education institutions epitomises the importance of confidentiality, integrity and availability of information in universities. To synthesise research in this field, this literature review systematically examines papers that have been published in the last thirteen years. The present review aims at expanding our understanding of the sub-topics, perspectives, methodologies, and trends that characterise this nascent field of investigation. Literature gaps are highlighted and an agenda for further work is proposed. First of its kind, this review concludes that information security management in higher education is a highly under-investigated topic. Areas for further research include information security culture; comparative studies on information security management in industries other than higher education; comparative studies across universities; and economics of information security management.

Item Type:Articles
Status:Published
Refereed:Yes
Glasgow Author(s) Enlighten ID:Bongiovanni, Dr Ivano
Authors: Bongiovanni, I.
College/School:College of Social Sciences > Adam Smith Business School > Management
Journal Name:Computers and Security
Publisher:Elsevier
ISSN:0167-4048
ISSN (Online):1872-6208
Published Online:08 July 2019
Copyright Holders:Copyright © 2019 Elsevier Ltd.
First Published:First published in Computers and Security 86: 350-357
Publisher Policy:Reproduced in accordance with the publisher copyright policy

University Staff: Request a correction | Enlighten Editors: Update this record