Approaches in Information System Security in Universities in Mobile Computing Environment

Approaches in Information System Security in Universities in Mobile Computing Environment

Daniel Otanga; Kibabii University
Frankin Wabwoba; Kibabii University

@IJRIT International Journal of Research in Information Technology, Volume 4, Issue 9, September 2016, Pg 19-30

ABSTRACT

Universities are shifting from partially computerized to fully automated environments and technology is equally shifting from point to point to broadcasting options. These trends are resulting in mobile computing for most university users with systems accumulating enormous amount of public, private as well as confidential data on employee, students and the institution. However, mobile computing systems normally come with security issues and different vulnerabilities that make users hesitate adopting them despite the many benefits they bring. The purpose of thispart of the study was to establish the security approaches on mobile computing environment in universities. This part of the study was undertaken using survey design and scrutiny of literature review. Stratified random sampling and purposeful sampling was used to select respondents from six public and two private universities. The study found that the security approaches in mobile computing in universities to be varying and mostly rely on established security standards. The findings will help the university management determine the best security approaches and also enhance the existing security approaches to mobile computing in universities and mitigate on the future trends in security for information systems.

Key words: Information System Security, Information Technology, Trends, Security Approaches, Threats, Vulnerability.

Application Forms
Download Abstract: Approaches in Information System Security in Universities in Mobile Computing Environment

Leave us a Comment