Skip to main content

The Human Aspect in Data Leakage Prevention in Academia

  • Chapter
  • First Online:
ISSE 2012 Securing Electronic Business Processes

Abstract

The traditional concept of work has changed towards working anywhere at any time with portable networking devices using electronic collaboration and many other tools. New risks introduced by this new working style should be assessed and counterbalanced by data management procedures. But management procedures are rarely found and applied in academia. Especially European universities are proud of open exchange culture and are neither prepared nor aware for protecting their intellectual asset: this situation has the potential to weaken competitiveness and – as a consequence – our future economy

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Literature

  1. Application Security, Inc.An Examination of Database BreachesatHigherEducation Institutions, 2010

    Google Scholar 

  2. BeliefNetworks:Semantically Secure Unstructured Data Classification, Charleston South Carolina, 2009.

    Google Scholar 

  3. Media Statement: Chaminade University, Honolulu 2009. (http://www.chaminade.edu/infosecure/retrievedJuly 14th 2012)

  4. Davies,John L: The dialogue of universities with their stakeholders:comparisons between different regions of Europe, 1998.

    Google Scholar 

  5. Day,Glen: Strategic Information Management Through Data Classification, 2010.

    Google Scholar 

  6. The Department of Trade and Industry (DTI) in the U.S: Defining Data Loss, 2010.

    Google Scholar 

  7. Filkins,Barbara &Radcliff,Deb: Data Leakage Landscape: Where Data Leaks and How Next Generation Tools Apply, 2008.

    Google Scholar 

  8. Financial Services Authority (FSA): Data Security in Financial Services. Firm’s Controls to Prevent Data Loss by their Employees and Third-Party Suppliers, 2008.

    Google Scholar 

  9. Identity Finder (IF): Data Loss Prevention: Data-at-Rest vs. Data-in-Motion,2011.

    Google Scholar 

  10. IRONPORT SYST EMS (IROS): Data Loss Prevention Best Practices, 2010.

    Google Scholar 

  11. ISACA: RISK IT PRACTITIONER GUIDE, 2011, P.20.

    Google Scholar 

  12. Joint Universities Computer Centre Limited (JUCC): Information Security and challenges, 2009.

    Google Scholar 

  13. Kanagasingham,Prathaben: Data Leakage Prevention a newsletter for IT professionals, 2008.

    Google Scholar 

  14. Lacey,David: Managing the Human Factor in Information Security, 2009.

    Google Scholar 

  15. PALISADE SYSTEMS (PALS): Why DLP? A Report on Data Loss Prevention. 2011.

    Google Scholar 

  16. Raman Preeti, KayacıkHilmiGünes, Somayaji Anil: Understanding Data Leak Prevention, 2009

    Google Scholar 

  17. Watson, Hall Ltd: Information security due diligence, 2009.

    Google Scholar 

  18. ZilbermanPolina, ShabtaiAsaf, RokachLior:Analyzing Group Communication for Preventing Data Leakage via Email, 2008.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Elham Rajabian Noghondar .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer Fachmedien Wiesbaden

About this chapter

Cite this chapter

Noghondar, E., Marfurt, K., Haemmerli, B. (2012). The Human Aspect in Data Leakage Prevention in Academia. In: Reimer, H., Pohlmann, N., Schneider, W. (eds) ISSE 2012 Securing Electronic Business Processes. Springer Vieweg, Wiesbaden. https://doi.org/10.1007/978-3-658-00333-3_14

Download citation

  • DOI: https://doi.org/10.1007/978-3-658-00333-3_14

  • Published:

  • Publisher Name: Springer Vieweg, Wiesbaden

  • Print ISBN: 978-3-658-00332-6

  • Online ISBN: 978-3-658-00333-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics