TTs080515_289395_3
TTs080515_289395_3
My name is Mohamed Munser Saleh, a student at the Islamic Science University of Malaysia. I am currently pursuing a Master of Computer Science Information and Security Assurance. My research title is“security risk assessment in my university ”. As far as any research is concerned, some findings are needed for it. The aim of this research is to examine the adoption of e-learning approach in Libya universities, in order to evaluate the awareness of e-learning usage among educators and students, and to recommend the appropriate security method for e-learning materials in Libyan universities. I hope you can read the questions below carefully and tick or fill the appropriate answers which will help me in my research findings. Your suggestions and cooperation are highly appreciated.
Thank you.
Section A: Personal Information
This section is to gather personal information from the respondents.
Please tick where appropriate.
A1. What is your gender?
Male | |
Female |
A2. What is your age?
Below 21 years | |
21-30 years | |
30-39 years | |
40-49 years | |
Above 50 years |
A3. What is your education level?
Diploma | |
Bachelor degree | |
Master degree | |
Doctorate Degree |
Others (Please specify):______________________________________________
Information security threats(Alwi and Hayaati 2012) | |||||||
Strongly agree | agree | neutral | disagree | Strongly disagree | |||
Q1- | The e-learning environment is prone to information security threats. | ||||||
Q2 | My e-learning institution is highly secured. | ||||||
Q3 | My e-learning institution has information that is highly confidential. | ||||||
Q4 | My e-learning institution would face significant business disruption if the information were corrupted. | ||||||
Q5 | My e-learning institution would face significant business disruption if the information were not available. | ||||||
Q6 | My e-learning institution spends a lot on security controls. | ||||||
Q7 | My e-learning institution spends a lot on security solutions and recovery. | ||||||
Q8 | Good security management practices are important in ensuring a high level of security awareness amongst staff and students? | ||||||
Q9 | Good security management is important in ensuring successful a high level of security awareness amongst staff and students implementation of appropriate security control? |
Section: Perceived Threats to the System disclosure, corruption)? | ||
Q1- | Who poses the most likely threat (ie theft, loss, disclosure, corruption)?Internal
External |
(Bennett and Kailay 1992) |
Q2 | What area of the system do you perceive to be the most vulnerable?Hardware
Software Data information Transmission media |
|
Q3 | What is a most important security requirement for this information asset?Confidentiality
Integrity Availability Other |
Tan WaiBeng, June 2011. All rights reserved |
To what extent did the security incident give impact to the data and information in the e-learning environment? | |||||||
Very major impact | Major impact | minor impact | Very minor impact | No impact | unknown | ||
Lost of privacy confidentiality | (Alwi and Hayaati 2012) | ||||||
Loss of availability | |||||||
Lost of integrity |
To what extent did the security incident damage the reputation of the e-learning environment? | |||||||
Very major impact | Major impact | minor impact | Very minor impact | No impact | unknown | ||
brand devolution | (Alwi and Hayaati 2012) | ||||||
customer complaint | |||||||
number of student | |||||||
adverse media coverage | |||||||
shareholder commitment |
Is this the question you were looking for? If so, place your order here to get started!