Vol.5, No.2, May 2016.                                                                                                               ISSN: 2217-8309

                                                                                                                                                  eISSN: 2217-8333


TEM Journal



Association for Information Communication Technology Education and Science

A Comparative Analysis of University Information Systems within the Scope of the Information Security Risks


Rustu Yilmaz, Yildiray Yalman


© 2016 Rustu Yilmaz, Yildiray Yalman, published by UIKTEN. This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 License. (CC BY-NC-ND 4.0)


Citation Information: TEM Journal. Volume 5, Issue 2, Pages 180–191, ISSN 2217-8309, DOI: 10.18421/TEM52-10, May 2016.




Universities are the leading institutions that are the sources of educated human population who both produce information and ensure to develop new products and new services by using information effectively, and who are needed in every area. Therefore, universities are expected to be institutions where information and information management are used efficiently. In the present study, the topics such as infrastructure, operation, application, information, policy and human-based information security at universities were examined within the scope of the information security standards which are highly required and intended to be available at each university today, and then a comparative analysis was conducted specific to Turkey. Within the present study, the Microsoft Security Assessment Tool developed by Microsoft was used as the risk analysis tool. The analyses aim to enable the universities to compare their information systems with the information systems of other universities within the scope of the information security awareness, and to make suggestions in this regard.


Keywords – Information security, risk analysis, ISO/IEC 27001, university information systems, risk analysis tools, Microsoft security assessment tool



Full text PDF >  



Copyright © 2012-2016 UIKTEN, All Rights reserved
Copyright licence: All articles are licenced via Creative Commons CC BY-NC-ND 4.0 licence