Investigating the student’s awareness on computer security and ethics
| Main Authors: | Aliyu, Mansur, Abdallah, Nahel A. O., Lasisi, Nojeem A., Diyar, Dahir, Zeki, Ahmed M., Zeki, Akram M. |
|---|---|
| Format: | Book Chapter |
| Language: | English |
| Published: |
IIUM Press
2011
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/20210/ http://irep.iium.edu.my/20210/1/13.pdf |
Similar Items
Computer security and ethics awareness among IIUM students: an empirical study
by: Aliyu, Mansur, et al.
Published: (2010)
by: Aliyu, Mansur, et al.
Published: (2010)
Evaluation of users' awareness and their reaction on information security
by: Zeki, Akram M., et al.
Published: (2016)
by: Zeki, Akram M., et al.
Published: (2016)
Ethical issues in e-learning.
by: Zeki, Ahmed M., et al.
Published: (2011)
by: Zeki, Ahmed M., et al.
Published: (2011)
An overview of ATM systems security
by: Alharaki, Omarah Omar, et al.
Published: (2011)
by: Alharaki, Omarah Omar, et al.
Published: (2011)
Users' awareness of and perception on information security issues: a case study of kulliyyah of ICT postgraduate students
by: Hamid, Habiba, et al.
Published: (2015)
by: Hamid, Habiba, et al.
Published: (2015)
Security of multimedia in the web
by: Zeki, Akram M.
Published: (2011)
by: Zeki, Akram M.
Published: (2011)
Comprehensive analysis on the influences of computer ethics on information security
by: Abdul Rahim, Fiza
Published: (2009)
by: Abdul Rahim, Fiza
Published: (2009)
Introduction to computer graphics
by: Zeki, Akram M.
Published: (2015)
by: Zeki, Akram M.
Published: (2015)
An improved negative selection algorithm based on the hybridization of cuckoo search and differential evolution for anomaly detection
by: Ayodele Nojeem, Lasisi
Published: (2018)
by: Ayodele Nojeem, Lasisi
Published: (2018)
The influence of students’ knowledge on security towards their behavior with security risks within the context of Saudi Arabia
by: Ahmed, Aldossary Alia, et al.
Published: (2014)
by: Ahmed, Aldossary Alia, et al.
Published: (2014)
A secure audio steganography approach
by: Zamani, Mazdak, et al.
Published: (2009)
by: Zamani, Mazdak, et al.
Published: (2009)
Security issues with health care information technology
by: Mahmoud, Ahmed Mohamed, et al.
Published: (2015)
by: Mahmoud, Ahmed Mohamed, et al.
Published: (2015)
Multimedia security and the internet
by: Zeki, Akram M., et al.
Published: (2015)
by: Zeki, Akram M., et al.
Published: (2015)
Web user' knowledge and their behavior towards security threats and vulnerabilities
by: Aldossary, Alia Ahmed, et al.
Published: (2016)
by: Aldossary, Alia Ahmed, et al.
Published: (2016)
Web users’ knowledge and their behavior towards security threats and vulnerabilities
by: Aldossary, Alia Ahmed, et al.
Published: (2016)
by: Aldossary, Alia Ahmed, et al.
Published: (2016)
Framework for Evaluating Programming Languages for Computer Graphics
by: Akram, Mohammed Zeki
Published: (2003)
by: Akram, Mohammed Zeki
Published: (2003)
The most principle security issues in e-Commerce
by: Mohamed, Abdikadir Yusuf, et al.
Published: (2016)
by: Mohamed, Abdikadir Yusuf, et al.
Published: (2016)
An ethical assessment of computer ethics using scenario approach
by: Masrom, Maslin, et al.
Published: (2010)
by: Masrom, Maslin, et al.
Published: (2010)
Fundamentals of computer networks: wired/wireless
by: Abubakar, Adamu, et al.
Published: (2015)
by: Abubakar, Adamu, et al.
Published: (2015)
Mini-ATX Computer System in Vehicle
by: Sami, Muhammad, et al.
Published: (2015)
by: Sami, Muhammad, et al.
Published: (2015)
Feature extraction techniques of online handwriting arabic text recognition
by: Abuzaraida, Mustafa Ali, et al.
Published: (2013)
by: Abuzaraida, Mustafa Ali, et al.
Published: (2013)
A novel digital watermarking technique based on ISB (Intermediate Significant Bit)
by: Zeki, Akram M., et al.
Published: (2009)
by: Zeki, Akram M., et al.
Published: (2009)
Mini-ATX computer system in vehicle
by: shihab, m.sami, et al.
Published: (2014)
by: shihab, m.sami, et al.
Published: (2014)
A review of challenges and security risks of cloud computing
by: Hussam Alddin S., Ahmed, et al.
Published: (2017)
by: Hussam Alddin S., Ahmed, et al.
Published: (2017)
Arabic-Malay cognates as a computer assisted language learning
by: Shehab, Roaya, et al.
Published: (2014)
by: Shehab, Roaya, et al.
Published: (2014)
Investigation of Security Awareness on e-Learning System Among Lecturers and Students in Higher Education Institution
by: Hasmanizam, Abdul Majid, et al.
Published: (2015)
by: Hasmanizam, Abdul Majid, et al.
Published: (2015)
ICT readiness and information security policies in OIC Countries
by: Abd Hadi, Nurafiqah Hanis, et al.
Published: (2016)
by: Abd Hadi, Nurafiqah Hanis, et al.
Published: (2016)
An intermediate significant bit (ISB) watermarking technique using neural networks
by: Zeki, Akram M., et al.
Published: (2016)
by: Zeki, Akram M., et al.
Published: (2016)
Threats and solutions for ATM security systems
by: Alharaki, Omarah Omar, et al.
Published: (2011)
by: Alharaki, Omarah Omar, et al.
Published: (2011)
Data Security Issues In Cloud Computing: Review
by: Ahmed, Hussam Alddin Shihab, et al.
Published: (2016)
by: Ahmed, Hussam Alddin Shihab, et al.
Published: (2016)
Securing e-learning environment: A study of security awareness and behavior of user
by: Wan Nurul Safawati, Wan Manan, et al.
Published: (2017)
by: Wan Nurul Safawati, Wan Manan, et al.
Published: (2017)
التقنيات الحديث في خدمة ضيوف الرحمن = Al-Taqniyāh al-ḥadīthah fi khidmah ḍuyūf al-raḥman.
by: Zeki, Akram M., et al.
Published: (2011)
by: Zeki, Akram M., et al.
Published: (2011)
A comparison of watermarking image quality based on dual intermediate significant bit with genetic algorithm
by: Yasin, Azman, et al.
Published: (2013)
by: Yasin, Azman, et al.
Published: (2013)
A new robust image watermarking method using Dual Intermediate Significant Bits
by: Mohammed, Ghassan N., et al.
Published: (2014)
by: Mohammed, Ghassan N., et al.
Published: (2014)
Security failures in EMV smart card payment systems
by: Ahmad, Zubair, et al.
Published: (2016)
by: Ahmad, Zubair, et al.
Published: (2016)
Ethical awareness of computer use among undergraduate
students
by: Masrom, Maslin, et al.
Published: (2009)
by: Masrom, Maslin, et al.
Published: (2009)
Edward Snowden disclosures turn the fears of surveillance into reality: the impact and transformation in information security
by: Mohamed Mahmoud, Fatimetou Zahra, et al.
Published: (2016)
by: Mohamed Mahmoud, Fatimetou Zahra, et al.
Published: (2016)
A review on cloud computing security
by: Teo, Marry, et al.
Published: (2018)
by: Teo, Marry, et al.
Published: (2018)
Enhanced mechanism to handle missing data of Hadith classifier
by: Aldhlan, Kawther A., et al.
Published: (2011)
by: Aldhlan, Kawther A., et al.
Published: (2011)
Datamining and Islamic knowledge extraction: Alhadith as a knowledge resources
by: Aldhlan, Kawther A., et al.
Published: (2010)
by: Aldhlan, Kawther A., et al.
Published: (2010)
Similar Items
-
Computer security and ethics awareness among IIUM students: an empirical study
by: Aliyu, Mansur, et al.
Published: (2010) -
Evaluation of users' awareness and their reaction on information security
by: Zeki, Akram M., et al.
Published: (2016) -
Ethical issues in e-learning.
by: Zeki, Ahmed M., et al.
Published: (2011) -
An overview of ATM systems security
by: Alharaki, Omarah Omar, et al.
Published: (2011) -
Users' awareness of and perception on information security issues: a case study of kulliyyah of ICT postgraduate students
by: Hamid, Habiba, et al.
Published: (2015)