CFP last date
20 June 2024
Reseach Article

Investigating Practices of Information Security Awareness: Perspectives from Government Entities in Libya

by Almabruk Sultan, Elmabruk Laias, Ahmed El Saiti
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 186 - Number 1
Year of Publication: 2024
Authors: Almabruk Sultan, Elmabruk Laias, Ahmed El Saiti
10.5120/ijca2024923330

Almabruk Sultan, Elmabruk Laias, Ahmed El Saiti . Investigating Practices of Information Security Awareness: Perspectives from Government Entities in Libya. International Journal of Computer Applications. 186, 1 ( Jan 2024), 9-15. DOI=10.5120/ijca2024923330

@article{ 10.5120/ijca2024923330,
author = { Almabruk Sultan, Elmabruk Laias, Ahmed El Saiti },
title = { Investigating Practices of Information Security Awareness: Perspectives from Government Entities in Libya },
journal = { International Journal of Computer Applications },
issue_date = { Jan 2024 },
volume = { 186 },
number = { 1 },
month = { Jan },
year = { 2024 },
issn = { 0975-8887 },
pages = { 9-15 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume186/number1/33035-2024923330/ },
doi = { 10.5120/ijca2024923330 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T01:29:24.119500+05:30
%A Almabruk Sultan
%A Elmabruk Laias
%A Ahmed El Saiti
%T Investigating Practices of Information Security Awareness: Perspectives from Government Entities in Libya
%J International Journal of Computer Applications
%@ 0975-8887
%V 186
%N 1
%P 9-15
%D 2024
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Government and military organizations and other organizations process and store huge volumes of confidential data, regularly transmitted across networks, thereby increasing their exposure to security threats. The probable damages can lead to monetary losses and put national security at risk if critical information infrastructure is targeted. This study examined the level of information security awareness (ISA) and information security (InfoSec) practices in all departments among the general public (non-IT departments) in Libyan organizations. This examination was conducted using an online and manual survey that was based on instruments produced by organizations specializing in information security (InfoSec), due to cultural constraints, it would ordinarily be difficult to gather data from female respondents in Libya, however, the use of an online survey helped to collect the data successfully. The ISA survey involved 421 respondents from all department’s employees. Results indicated that Libyan organizations' information security awareness (ISA) and practices are quite low. Several areas of weakness in InfoSec appear to be related to the information security standards policies and practices.

References
  1. Alshboul, A. (2010). Information systems security measures and countermeasures: Protecting organizational assets from malicious attacks. Communications of the IBIMA
  2. Al-Awadi, M., & Renaud, K. (2007), “Success factors in information security implementation in organizations,” Paper presented at an international conference.
  3. Fadi A. Aloul, “The Need for Effective Information Security Awareness”, Journal of Advances in Information Technology, Vol.3, No.3, August.2012.
  4. Alotaibi, M., & Alfehaid, W. (2018). Information security awareness: A review of methods, challenges, and solutions. Proceedings of the ICITST-WorldCIS-WCST-WCICSS-2018, Cambridge, UK, 10, 13.‏
  5. Ahmad, N., Arifin, A., Asma’Mokhtar, U., Hood, Z., Tiun, S., & Jambari, D. I. (2019). Parental awareness on cyber threats using social media. Jurnal Komunikasi: Malaysian Journal of Communication, 35(2), 485-498.
  6. Kaspersky Lab (2022) http://www.securelist.com/en/analysis/204792101/Kaspersky_Security_Bulletin_2009_Statistics _2009, accessed 29/02/2010.
  7. Cox, J. 2012. Information systems user security: A structured model of the knowing-doing gap. Computers in Human Behavior, 28:1849-1858.
  8. Alotaibi, F.; Furnell, S.; Stengel, I.; Papadaki, M. A survey of cyber-security awareness in Saudi Arabia. In Proceedings of the 2016 11th International Conference for Internet Technology and Secured Transactions (ICITST), Barcelona, Spain, 5–7 December 2016.
  9. Alotaibi, M., & Alfehaid, W. (2018). Information security awareness: A review of methods, challenges, and solutions. Proceedings of the ICITST-WorldCIS-WCST-WCICSS-2018, Cambridge, UK, 10, 13.‏
  10. Bhushan K. (2012), India ranks fifth among cybercrime-affected countries, retrieved from http://www.thinkdigit.com/Internet/India-ranks-fifth-among-cyber-crimeaffected_9476.html on September 5, 2012.
  11. Jamil D. and Khan M.N.A. (2011), Data Protection Act in India with Compared to the European Union Countries, International Journal of Electrical & Computer Sciences, Vol: 11 No: 06.
  12. Pandey K. (2012), Low security makes netizens vulnerable to cybercrimes, retrieved from http://articles.timesofindia.indiatimes.com/indore/31863717_1_cyber-crimes-cyber-cellcyber-criminals on May 26, 2012
  13. Dalal P. (2010), Awareness of Cyber Law in India, retrieved from http://cyberlawsinindia.blogspot.in/2010/05/awareness-of-cyber-law-in-india.html on September 03, 2012
  14. Saxena P. et al. (2012), A Cyber Era Approach for Building Awareness in Cyber Security for Educational System in India, IACSIT International Journal of Information and Education Technology, Vol. 2, No. 2.
  15. Mehta, S., & Singh, V. (2013). A study of awareness about Cyber Laws in the Indian Society. International Journal of Computing and Business Research, 4(1), 1-8.
  16. Scholl, M. C., Fuhrmann, F., & Scholl, L. R. (2018). Scientific knowledge of the human side of information security as a basis for sustainable training in organizational practices.‏
  17. Yerby, J., & Floyd, K. (2018, August). Faculty and staff information security awareness and behaviors. In Journal of The Colloquium for Information Systems Security Education (Vol. 6, No. 1, pp. 23-23).‏
  18. Muhirwe & White (2016) conducted a study for college students at a public university in the Pacific Northwest of the United States of America and indicated the results from their study.
  19. Al-Hamar, Y., Kolivand, H., & Al-Hamar, A. (2019, October). Phishing attacks in Qatar: A literature review of the problems and solutions. In 2019 12th International Conference on Developments in eSystems Engineering (DeSE) (pp. 837-842). IEEE.
  20. Roca, S. K.-L.-D.-V. (2019). Cybersecurity Current Challenges and Inria’s Research Directions. Le Chesnay Cedex, France: Inria.Bowman, M., Debray, S. K., and Peterson, L. L. 1993. Reasoning about naming systems.
  21. Salima. B ,Almabruk ,S , Awad.E , 2020 . Assessment of Security Issues in Banking Sector of Libya, International Journal of Computer Applications, Vol 176 ( 13), 975 – 8887.
  22. Almabruk, S., & Khaled, E., (2023), The Digital Infrastructure Standard for Assessing the Quality of Higher Education Institutions: A Case Study of Libyan State Universities. In Proceedings of The Second International Conference 2023 on Quality of Education and Digital Transformation: Reality and Future Bets, Special Issue, Benghazi, Libya, 1-9.
Index Terms

Computer Science
Information Sciences

Keywords

Information security Information security awareness Information security policy Information security practices.