The role of cybersecurity in addressing the rise on cybercrime activities
| Format: | Restricted Document |
|---|
Similar Items
Design and development of Malaysian cybersecurity profiling framework: Towards creating a recommendation system to combat cybercrime
by: Yeo, Han Rong
Published: (2022)
by: Yeo, Han Rong
Published: (2022)
Overview of the Budapest convention on cybercrime
by: Zulhuda, Sonny
Published: (2014)
by: Zulhuda, Sonny
Published: (2014)
Content Analysis of Cybercrime Infographic
by: Zeti Azreen Ahmad,, et al.
Published: (2023)
by: Zeti Azreen Ahmad,, et al.
Published: (2023)
The role of cybersecurity on the performance of Malaysian higher education institutions
by: Balla Moussa Dioubate,, et al.
Published: (2023)
by: Balla Moussa Dioubate,, et al.
Published: (2023)
Ethics, Cybersecurity and the Military
by: Ford, Shannon
Published: (2013)
by: Ford, Shannon
Published: (2013)
Metamorphic testing for cybersecurity
by: Chen, Tsong Yueh, et al.
Published: (2016)
by: Chen, Tsong Yueh, et al.
Published: (2016)
The threat of Cyberterrorism and the applicability of the convention of cybercrime
by: Zulhuda, Sonny
Published: (2020)
by: Zulhuda, Sonny
Published: (2020)
Cybercrime behaviour in the context of youth development
by: Jaya, M. Izham, et al.
Published: (2022)
by: Jaya, M. Izham, et al.
Published: (2022)
Criminal Legality Affecting Cybercrimes in Yemen
Cryptocurrency and cybercrime – the need to strengthen the legal framework
by: Puniran, Mohd Noor Ikram, et al.
Published: (2018)
by: Puniran, Mohd Noor Ikram, et al.
Published: (2018)
Understanding Cybersecurity: Ethical and Conceptual Considerations
by: Ford, Shannon
Published: (2013)
by: Ford, Shannon
Published: (2013)
A Data Analytics Strategy to the Underground Economy of Cybercrime
by: Varun, P.R., et al.
Published: (2024)
by: Varun, P.R., et al.
Published: (2024)
Knowledge management system as the combating tool of cybercrime on organizations
by: Saleh, Burhan, et al.
Published: (2011)
by: Saleh, Burhan, et al.
Published: (2011)
Locating and collecting cybercrime evidences on cloud storage: review
by: Ahmed, Abdulghani Ali, et al.
Published: (2017)
by: Ahmed, Abdulghani Ali, et al.
Published: (2017)
Authentication of electronic evidence in cybercrime cases
based on Malaysian laws
by: Mustapa Sa’di, Mursilalaili, et al.
Published: (2015)
by: Mustapa Sa’di, Mursilalaili, et al.
Published: (2015)
Combating the threats of cybercrimes in Malaysia: the efforts, the cyberlaws and the traditional laws
by: Mohamed, Duryana
Published: (2013)
by: Mohamed, Duryana
Published: (2013)
Proactive Model for Locating and Collecting Cybercrime Evidences on Cloud Computing
by: Ahmed, Abdulghani Ali, et al.
Published: (2017)
by: Ahmed, Abdulghani Ali, et al.
Published: (2017)
Blockchain-enabled cybersecurity framework for healthcare domain
by: Islam, Md Shohidul
Published: (2025)
by: Islam, Md Shohidul
Published: (2025)
The Challenges and Solutions of Cybersecurity Among Malaysian Companies
by: Puteri Fadzline, Muhamad Tamyez
Published: (2019)
by: Puteri Fadzline, Muhamad Tamyez
Published: (2019)
Addressing social isolation in high-rise residential buildings in Kuala Lumpur
by: Lee, Nur Irdina, et al.
Published: (2024)
by: Lee, Nur Irdina, et al.
Published: (2024)
Online shopping satisfaction in Malaysia: A framework for security, trust and cybercrime
by: Imtiaz Ali, Najma, et al.
Published: (2016)
by: Imtiaz Ali, Najma, et al.
Published: (2016)
Acquiring cybercrime evidence on mobile global positioning system (GPS): review
by: Abdullah, Nurul Azma, et al.
Published: (2017)
by: Abdullah, Nurul Azma, et al.
Published: (2017)
2020_Legal Framework Affecting Cybercrimes in Yemen with Special Reference to Malaysia
Cybersecurity behavior among government employees: The role of protection motivation theory and responsibility in mitigating cyberattacks
by: Noor Suhani, Sulaiman, et al.
Published: (2022)
by: Noor Suhani, Sulaiman, et al.
Published: (2022)
Leveraging web and behavioural data for usable adaptive cybersecurity
by: Addae, Joyce Hoese
Published: (2019)
by: Addae, Joyce Hoese
Published: (2019)
Measuring attitude towards personal data for adaptive cybersecurity
by: Addae, Joyce Hoese, et al.
Published: (2017)
by: Addae, Joyce Hoese, et al.
Published: (2017)
Cybersecurity, Trustworthiness and Resilient Systems: Guiding Values for Policy
by: Henschke, A., et al.
Published: (2017)
by: Henschke, A., et al.
Published: (2017)
Exploring the use of blockchain technology in cybersecurity and data science
by: Rahmat, Robaisya, et al.
Published: (2023)
by: Rahmat, Robaisya, et al.
Published: (2023)
Authentication of electronic evidence in cybercrime cases based on Malaysian laws and Islamic laws
by: Mustapha Sa'di, Mursilalaili, et al.
Published: (2014)
by: Mustapha Sa'di, Mursilalaili, et al.
Published: (2014)
Investigating cybercrimes under the Malaysian cyberlaws and the criminal procedure code: issues and challenges
by: Mohamed, Duryana
Published: (2012)
by: Mohamed, Duryana
Published: (2012)
Integration of information systems and cybersecurity countermeasures: An exposure to risk perspective
by: Baskerville, Richard, et al.
Published: (2018)
by: Baskerville, Richard, et al.
Published: (2018)
Implementation of serious games for data privacy and protection awareness in Cybersecurity
by: Siti Normaziah, Ihsan, et al.
Published: (2023)
by: Siti Normaziah, Ihsan, et al.
Published: (2023)
UMP, CyberSecurity tingkat keupayaan pakar keselamatan siber
by: Nor Salwana, Mohammad Idris
Published: (2021)
by: Nor Salwana, Mohammad Idris
Published: (2021)
Securing the IoT frontier: exploring the limitation and future directions in cybersecurity
by: Mahmoud Ahmed, Moustafa Abdelrahman, et al.
Published: (2024)
by: Mahmoud Ahmed, Moustafa Abdelrahman, et al.
Published: (2024)
Experts - more effective measures needed to address rising food prices supply hiccups
by: The Borneo Post Sarawak
Published: (2022)
by: The Borneo Post Sarawak
Published: (2022)
Cybersecurity behavioural model for students in the tertiary institutions / Fatokun Faith Boluwatife
by: Fatokun Faith , Boluwatife
Published: (2020)
by: Fatokun Faith , Boluwatife
Published: (2020)
A framework for cybersecurity strategy for developing countries: case study of Afghanistan
by: Salamzada, Khosraw, et al.
Published: (2015)
by: Salamzada, Khosraw, et al.
Published: (2015)
Impact of training on cybersecurity awareness / Zuriani Ahmad Zukarnain ... [et al].
by: Ahmad Zukarnain, Zuriani, et al.
Published: (2020)
by: Ahmad Zukarnain, Zuriani, et al.
Published: (2020)
Incremental learning for large-scale stream data and its application to cybersecurity
by: Ali, Siti Hajar Aminah
Published: (2015)
by: Ali, Siti Hajar Aminah
Published: (2015)
The cybersecurity governance in changing the security psychology and security posture: insights into e-procurement
by: Dawood Gani, Anisha Banu, et al.
Published: (2021)
by: Dawood Gani, Anisha Banu, et al.
Published: (2021)
Similar Items
-
Design and development of Malaysian cybersecurity profiling framework: Towards creating a recommendation system to combat cybercrime
by: Yeo, Han Rong
Published: (2022) -
Overview of the Budapest convention on cybercrime
by: Zulhuda, Sonny
Published: (2014) -
Content Analysis of Cybercrime Infographic
by: Zeti Azreen Ahmad,, et al.
Published: (2023) -
The role of cybersecurity on the performance of Malaysian higher education institutions
by: Balla Moussa Dioubate,, et al.
Published: (2023) -
Ethics, Cybersecurity and the Military
by: Ford, Shannon
Published: (2013)