@article{Oguk_2018, title={IMPACTS OF ICT SECURITY TRAINING ON MALWARE CONTROL AND POLICY IMPLEMENTATION IN UNIVERSITIES’ COMPUTER NETWORKS.}, volume={4}, url={https://ijrdo.org/index.php/cse/article/view/2461}, DOI={10.53555/cse.v4i9.2461}, abstractNote={<p><em>The study determined</em><em> the effects of ICT personnel training on malware control and security implementation within public Universities in Kenyan.&nbsp; Malware infestation and unauthorized practices in information systems have been in the rise in Kenyan universities, thereby compromising integrity of critical information therein. &nbsp;studies indicate that malware causes breaches of data integrity and availability.&nbsp; While universities and other institutions conduct employee security training in order to lessen the impact of such information systems’ security breaches, the effectiveness of such trainings with respect to security elements have not been established. The desire to assess the real effects of such training on the intended purpose has led to a focused attention in ICT security Training and its effects on malware control and implementation of&nbsp; security policies within public Universities in Kenyan.&nbsp; The study objectives have been; to investigate the effects of ICT personnel training on malware control ; to determine the effects of ICT personnel training on implementation of security policies in computer networks within universities in Kenya. Out of &nbsp;31 public Universities in Kenya, with &nbsp;a population of 409 network related personnel, a sampling formula was employed that yielded 203 personnel as a sample. Questionnaires were administered to &nbsp;the sample for data collection. Data &nbsp;analysis was mainly through c</em><em>orreration and regression model in Tobin’s Q equation in &nbsp;relation to Likert model. The major outcome of the study was&nbsp; a positive correlation between ICT security training and all the features &nbsp;of malware control and security policy.&nbsp; The findings could be significant ICT managers for boosting IT security management.</em></p&gt;}, number={9}, journal={IJRDO -Journal of Computer Science Engineering}, author={Oguk, Charles ’ Ochieng}, year={2018}, month={Sep.}, pages={47-62} }