A Forensic Computing Perspective on the Need for Improved User Education for Information Systems Security Management

A Forensic Computing Perspective on the Need for Improved User Education for Information Systems Security Management

Vlasti Broucek (University of Tasmania, Australia) and Paul Turner (University of Tasmania, Australia)
DOI: 10.4018/978-1-93177-743-8.ch002
OnDemand PDF Download:
$30.00
List Price: $37.50

Abstract

This chapter is divided to two parts. Part one identifies common security and privacy weaknesses that exist in e-mail and WWW browsers and highlights some of the major implications for organisational security that result from employees’ online behaviours. This section aims to raise awareness of these weaknesses amongst users and to encourage administrators to mitigate their consequences through enhanced security and privacy-focused user education and training. Part two makes recommendations for improved user education as a component of information systems security management practices. These recommendations have been generated from a forensic computing perspective that aims to balance the complex set of issues involved in developing effective IS security management policies and practices. From this perspective these policies and practices should improve security of organisation and the privacy of employees without compromising the potential need for future forensic investigation of inappropriate, criminal, or other illegal online behaviours.

Complete Chapter List

Search this Book:
Reset