Establishing a personalized information security culture
Good security cannot be achieved through technical means alone and a solid understanding of the issues and how to protect one’s self is required from users. Whilst many initiatives, programs and strategies have been proposed to improve the level of information security awareness, most have been dire...
| Main Authors: | Talib, Shuhaili, Clarke, Nathan L., Furnell, Steven M. |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
IGI Global
2011
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/21830/ http://irep.iium.edu.my/21830/1/Establishing_A_Personalized_Information_Security_Culture.pdf |
Similar Items
An analysis of information security awareness within home and work environments
by: Talib, Shuhaili, et al.
Published: (2010)
by: Talib, Shuhaili, et al.
Published: (2010)
Responsibility-value alignment in information security governance
by: Abdul Munir, Rufizah, et al.
Published: (2018)
by: Abdul Munir, Rufizah, et al.
Published: (2018)
Unintentional information security behavior from the Qur’an
and Hadith’s perspective
by: Barzak, Omar Mokhles, et al.
Published: (2016)
by: Barzak, Omar Mokhles, et al.
Published: (2016)
Information security culture concept towards information security compliance: A comparison between it and non-it professionals
by: Akhyari, Nasir, et al.
Published: (2022)
by: Akhyari, Nasir, et al.
Published: (2022)
Information security culture for guiding employee’s security behaviour: A pilot study
by: Akhyari, Nasir, et al.
Published: (2020)
by: Akhyari, Nasir, et al.
Published: (2020)
Information security awareness through the use of social media
by: Abdul Molok, Nurul Nuha, et al.
Published: (2015)
by: Abdul Molok, Nurul Nuha, et al.
Published: (2015)
Risk assessment model for organizational information security
by: Dioubate, Balla Mousa, et al.
Published: (2015)
by: Dioubate, Balla Mousa, et al.
Published: (2015)
Exploring the factors influencing top management involvement and participation in information security
by: Abdul Munir, Rufizah, et al.
Published: (2017)
by: Abdul Munir, Rufizah, et al.
Published: (2017)
Unintentional information security behavior from the Qur’an and hadith’s perspective
by: Barzak, Omar Mokhles, et al.
Published: (2015)
by: Barzak, Omar Mokhles, et al.
Published: (2015)
Information security behavior among employees from the Islamic perspective
by: Barzak, Omar Mokhles, et al.
Published: (2016)
by: Barzak, Omar Mokhles, et al.
Published: (2016)
The Formulation of Comprehensive Information Security Culture Dimensions for Information Security Policy Compliance Study
by: Nasir, Akhyari, et al.
Published: (2018)
by: Nasir, Akhyari, et al.
Published: (2018)
Information Security Policy Compliance Behavior Based on Comprehensive Dimensions of Information Security Culture: A Conceptual Framework
by: Nasir, Akhyari, et al.
Published: (2017)
by: Nasir, Akhyari, et al.
Published: (2017)
Exploring Studies of Information Security Culture in Malaysia
by: Nasir, Akhyari, et al.
Published: (2016)
by: Nasir, Akhyari, et al.
Published: (2016)
Personal innovativeness based self-esteem: establishing construct and predictive validity
by: Mahmood, Anwar
Published: (2022)
by: Mahmood, Anwar
Published: (2022)
Personal Information Security Awareness The Influencing Factors And The Awareness Level
by: Keong, Yew Wei
Published: (2006)
by: Keong, Yew Wei
Published: (2006)
Information security culture guidelines to improve employee’s security behavior: A review of empirical studies
by: Akhyari, N., et al.
Published: (2018)
by: Akhyari, N., et al.
Published: (2018)
Mobile Quran app security vulnerabilities
by: Talib, Shuhaili, et al.
Published: (2015)
by: Talib, Shuhaili, et al.
Published: (2015)
Security issues with health care information technology
by: Mahmoud, Ahmed Mohamed, et al.
Published: (2015)
by: Mahmoud, Ahmed Mohamed, et al.
Published: (2015)
UMP and CIDB established Building Information Model (BIM) ecosystem
by: UMP, PNC
Published: (2019)
by: UMP, PNC
Published: (2019)
Coding, cryptography, information security and OFDM
Published: (2011)
Published: (2011)
E-Government - an information security perspective
by: Hassan, Rasha G., et al.
Published: (2016)
by: Hassan, Rasha G., et al.
Published: (2016)
Information security culture model for Malaysian organizations: A review
by: Akhyari, Nasir, et al.
Published: (2020)
by: Akhyari, Nasir, et al.
Published: (2020)
An analysis on the dimensions of information security culture concept: A review
by: Akhyari, Nasir, et al.
Published: (2019)
by: Akhyari, Nasir, et al.
Published: (2019)
A dimension-based information security culture model for information security policy compliance behavior in Malaysian public universities
by: Akhyari, Nasir
Published: (2019)
by: Akhyari, Nasir
Published: (2019)
Technique to establish microalgae into pure culture
by: Mohammad Noor, Normawaty, et al.
Published: (2011)
by: Mohammad Noor, Normawaty, et al.
Published: (2011)
Establishing an organisational safety culture system in the Malaysian Mining Industry
by: Siti Noraishah, Ismail, et al.
Published: (2022)
by: Siti Noraishah, Ismail, et al.
Published: (2022)
ICT readiness and information security policies in OIC Countries
by: Abd Hadi, Nurafiqah Hanis, et al.
Published: (2016)
by: Abd Hadi, Nurafiqah Hanis, et al.
Published: (2016)
Establishment Of The Callus And Cell Suspension Cultures For The Growth Of Pogostemon Cablin
by: Che Saad, Norlia
Published: (2014)
by: Che Saad, Norlia
Published: (2014)
Information technology security
by: Selamat, Siti Rahayu, et al.
Published: (2006)
by: Selamat, Siti Rahayu, et al.
Published: (2006)
Evaluation of users' awareness and their reaction on information security
by: Zeki, Akram M., et al.
Published: (2016)
by: Zeki, Akram M., et al.
Published: (2016)
Information security aligned to enterprise management
by: Abdullah, Istikoma, et al.
Published: (2015)
by: Abdullah, Istikoma, et al.
Published: (2015)
Evaluation of Security Mechanisms for Information Dissemination in Wireless Sensor Networks
by: Mohamad Nazim, Jambli, et al.
Published: (2013)
by: Mohamad Nazim, Jambli, et al.
Published: (2013)
A conceptual framework of info structure for
information security risk assessment (ISRA)
by: Shamala, Palaniappan, et al.
Published: (2013)
by: Shamala, Palaniappan, et al.
Published: (2013)
Pharmacological Studies And Establishment Of Tissue Culture For Hymenocallis Litoralis
by: Sundarasekar, Jeevandran
Published: (2012)
by: Sundarasekar, Jeevandran
Published: (2012)
Establishment of callus culture of aquilaria microcarpa baill
by: Rofiah, Binti Junaidi
Published: (2012)
by: Rofiah, Binti Junaidi
Published: (2012)
The influence of information security culture towards employee’s intention to comply with information security policy: The mediation effect of attitude, normative belief and self-efficacy
by: Mohd Rashid, Ab Hamid, et al.
Published: (2020)
by: Mohd Rashid, Ab Hamid, et al.
Published: (2020)
Conceptualizing and Validating Information Security Culture as a Multidimensional Second-Order Formative Construct
by: Nasir, Akhyari, et al.
Published: (2018)
by: Nasir, Akhyari, et al.
Published: (2018)
Information security and mutual trust as determining factors for information technology outsourcing success
by: Shittu, Abdul Jaleel Kehinde, et al.
Published: (2012)
by: Shittu, Abdul Jaleel Kehinde, et al.
Published: (2012)
Persuasive technology for improving information security awareness and behavior: literature review
by: Bawazir, Mohammed Abdullah, et al.
Published: (2016)
by: Bawazir, Mohammed Abdullah, et al.
Published: (2016)
Persuasive technology contributions toward enhance information security awareness in an organization
by: Qudaih, Hani A., et al.
Published: (2014)
by: Qudaih, Hani A., et al.
Published: (2014)
Similar Items
-
An analysis of information security awareness within home and work environments
by: Talib, Shuhaili, et al.
Published: (2010) -
Responsibility-value alignment in information security governance
by: Abdul Munir, Rufizah, et al.
Published: (2018) -
Unintentional information security behavior from the Qur’an
and Hadith’s perspective
by: Barzak, Omar Mokhles, et al.
Published: (2016) -
Information security culture concept towards information security compliance: A comparison between it and non-it professionals
by: Akhyari, Nasir, et al.
Published: (2022) -
Information security culture for guiding employee’s security behaviour: A pilot study
by: Akhyari, Nasir, et al.
Published: (2020)