
Developing Security Climate in Educational Organizations in the Cyber Era
Author(s) -
Endah Kumala Dewi,
Fathul Himam,
Achmad Sobirin
Publication year - 2020
Publication title -
iop conference series. earth and environmental science
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.179
H-Index - 26
eISSN - 1755-1307
pISSN - 1755-1315
DOI - 10.1088/1755-1315/448/1/012123
Subject(s) - commit , information security , information technology , public relations , work (physics) , accountability , sanctions , globalization , business , information security management , political science , knowledge management , computer security , engineering , cloud computing , computer science , cloud computing security , security information and event management , mechanical engineering , database , law
The rapid development of information technology opens the barriers between regions and countries. These developments urge globalization. In educational organizations the involvement of information and communication technology in the world of education is a necessity to improve quality and competitiveness. On the other hand the development of information technology also provides threats including the desire of the parties to take a number of valuable information that is transacted on the internet. This study aims to overcome the problem of information security preventively by developing climate security in information technology-based educational organizations. This study uses a qualitative approach with a grounded theory method. Case organizations are faculty X and faculty Y at university Z. Data collection using interviews. Subjects interviewed were heads of academic fields, heads of information technology units, information technology officers. The results of the study are found manifestation of climate security. In case organizations that develop climate security, caution, accountability, ethical compliance and integrity are found. With these behaviors employees and leaders show an atmosphere of safety at work in the form of an atmosphere of mutual remembrance, compliance not to commit fraud, modeling to work safely, strictness of rules and sanctions, and leadership that prioritizes information safety.