Computer security and ethics awareness among IIUM students: an empirical study
People's perception and attitude towards computer ethics and information security significantly affect the way they use information technology. This is especially the case among university students who are generally regarded as major violators of computer ethics and computer security. This pap...
| Main Authors: | Aliyu, Mansur, Abdallah, Nahel A. O., Lasisi, Nojeem A., Diyar, Dahir, Zeki, Ahmed M. |
|---|---|
| Format: | Proceeding Paper |
| Language: | English |
| Published: |
2010
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/2525/ http://irep.iium.edu.my/2525/1/irep_id_2451.pdf |
Similar Items
Investigating the student’s awareness on computer security and ethics
by: Aliyu, Mansur, et al.
Published: (2011)
by: Aliyu, Mansur, et al.
Published: (2011)
Comprehensive analysis on the influences of computer ethics on information security
by: Abdul Rahim, Fiza
Published: (2009)
by: Abdul Rahim, Fiza
Published: (2009)
Ethical issues in e-learning.
by: Zeki, Ahmed M., et al.
Published: (2011)
by: Zeki, Ahmed M., et al.
Published: (2011)
Development of computer ethical framework for information security (educational context)
by: Namayander, Meysam
Published: (2009)
by: Namayander, Meysam
Published: (2009)
An improved negative selection algorithm based on the hybridization of cuckoo search and differential evolution for anomaly detection
by: Ayodele Nojeem, Lasisi
Published: (2018)
by: Ayodele Nojeem, Lasisi
Published: (2018)
Secure multi-authority attribute-based encryption access control with cache-aware scheduling in mobile cloud computing
by: Jamal, Fara
Published: (2021)
by: Jamal, Fara
Published: (2021)
Online banking information systems acceptance: an empirical examination of system characteristics and web security
by: Chandio, Fida Hussain, et al.
Published: (2017)
by: Chandio, Fida Hussain, et al.
Published: (2017)
Cyber Security Awareness Among Students In Ump
by: Nur Madihah, Mazlan
Published: (2023)
by: Nur Madihah, Mazlan
Published: (2023)
An ethical assessment of computer ethics using scenario approach
by: Masrom, Maslin, et al.
Published: (2010)
by: Masrom, Maslin, et al.
Published: (2010)
Security of multimedia in the web
by: Zeki, Akram M.
Published: (2011)
by: Zeki, Akram M.
Published: (2011)
Rivisit grid computing security
by: Ismail, Saiful Adli, et al.
Published: (2008)
by: Ismail, Saiful Adli, et al.
Published: (2008)
Security awareness: A lesson from Tcpdump and Ethereal
by: Rohani, Mohd. Fo’ad, et al.
Published: (2005)
by: Rohani, Mohd. Fo’ad, et al.
Published: (2005)
Metrics evaluation for context-aware computing
by: Mantoro, Teddy
Published: (2009)
by: Mantoro, Teddy
Published: (2009)
User awareness on security risks in M-commerce / Mohd Idzham Nawawi
by: Nawawi, Mohd Idzham
Published: (2007)
by: Nawawi, Mohd Idzham
Published: (2007)
Linking Islamic work ethic to computer use ethics, job satisfaction and organisational commitment in Malaysia
by: Mohamed, Norshidah, et al.
Published: (2010)
by: Mohamed, Norshidah, et al.
Published: (2010)
The teaching of ethics at KOE, IIUM
by: Kabbashi, Nassereldeen Ahmed, et al.
Published: (2010)
by: Kabbashi, Nassereldeen Ahmed, et al.
Published: (2010)
Data Security Issues In Cloud Computing: Review
by: Ahmed, Hussam Alddin Shihab, et al.
Published: (2016)
by: Ahmed, Hussam Alddin Shihab, et al.
Published: (2016)
Securing e-learning environment: A study of security awareness and behavior of user
by: Wan Nurul Safawati, Wan Manan, et al.
Published: (2017)
by: Wan Nurul Safawati, Wan Manan, et al.
Published: (2017)
Information security culture guidelines to improve employee’s security behavior: A review of empirical studies
by: Akhyari, N., et al.
Published: (2018)
by: Akhyari, N., et al.
Published: (2018)
A review of challenges and security risks of cloud computing
by: Hussam Alddin S., Ahmed, et al.
Published: (2017)
by: Hussam Alddin S., Ahmed, et al.
Published: (2017)
Analyzing trust and security in computing and communications systems
by: Pathan, Al-Sakib Khan
Published: (2013)
by: Pathan, Al-Sakib Khan
Published: (2013)
Network security situation awareness based on indicators extracted
by: Xie, Zeqiang
Published: (2016)
by: Xie, Zeqiang
Published: (2016)
Enabling security for service discovery in pervasive computing environments
by: Sharifi, Mahdi
Published: (2009)
by: Sharifi, Mahdi
Published: (2009)
Evaluating Cyber Security Awareness Levels For Employees In DRB-Hicom Auto Solutions
by: Mohd Fadli Kasim,
Published: (2021)
by: Mohd Fadli Kasim,
Published: (2021)
A Study in Data Security in Cloud Computing
by: Mazlina, Abdul Majid, et al.
Published: (2014)
by: Mazlina, Abdul Majid, et al.
Published: (2014)
A review on cloud computing security
by: Teo, Marry, et al.
Published: (2018)
by: Teo, Marry, et al.
Published: (2018)
Editorial article: on the boundaries of trust and security in computing and communications systems
by: Pathan, Al-Sakib Khan
Published: (2014)
by: Pathan, Al-Sakib Khan
Published: (2014)
Improved security of Rijndael key expansion function
by: Hussien, Al-Abadi Hassan Mansur
Published: (2017)
by: Hussien, Al-Abadi Hassan Mansur
Published: (2017)
Framework for Evaluating Programming Languages for Computer Graphics
by: Akram, Mohammed Zeki
Published: (2003)
by: Akram, Mohammed Zeki
Published: (2003)
Study of Islamic perspectives of professional code of ethics in the field of computing and informatics
by: Shuriye, Abdi Omar
Published: (2008)
by: Shuriye, Abdi Omar
Published: (2008)
Security Everywhere Cloud: An Intensive Review of DoS and DDoS Attacks in Cloud Computing
by: Mazlina, Abdul Majid, et al.
Published: (2014)
by: Mazlina, Abdul Majid, et al.
Published: (2014)
Ethical awareness of computer use among undergraduate
students
by: Masrom, Maslin, et al.
Published: (2009)
by: Masrom, Maslin, et al.
Published: (2009)
CCS523 – COMPUTER SECURITY AND CRYPTOGRAPHY NOV 2010
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2010)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2010)
CCS523- COMPUTER SECURITY AND CRYPTOGRAPHY JANUARI 2012
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2012)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2012)
Information Security Management Systems (ISMS) and Computer Security Self-Efficacy (CSSE) model comparison
by: Al-Shawabkeh, Mahmoud M. M., et al.
Published: (2016)
by: Al-Shawabkeh, Mahmoud M. M., et al.
Published: (2016)
The use of SAS for enterprise data management
by: Aliyu, Mansur, et al.
Published: (2011)
by: Aliyu, Mansur, et al.
Published: (2011)
Novel approach for secure cover file of hidden data in the unused area within EXE file using computation between cryptography and steganography
by: Naji, Ahmed Wathik, et al.
Published: (2009)
by: Naji, Ahmed Wathik, et al.
Published: (2009)
Computer security factors effects towards online usage of internet banking system
by: Al-Shawabkeh, Mahmoud M. M., et al.
Published: (2014)
by: Al-Shawabkeh, Mahmoud M. M., et al.
Published: (2014)
Computer security factors effects towards online usage of internet banking system
by: Al-Shawabkeh, Mahmoud, et al.
Published: (2015)
by: Al-Shawabkeh, Mahmoud, et al.
Published: (2015)
Evaluation of users' awareness and their reaction on information security
by: Zeki, Akram M., et al.
Published: (2016)
by: Zeki, Akram M., et al.
Published: (2016)
Similar Items
-
Investigating the student’s awareness on computer security and ethics
by: Aliyu, Mansur, et al.
Published: (2011) -
Comprehensive analysis on the influences of computer ethics on information security
by: Abdul Rahim, Fiza
Published: (2009) -
Ethical issues in e-learning.
by: Zeki, Ahmed M., et al.
Published: (2011) -
Development of computer ethical framework for information security (educational context)
by: Namayander, Meysam
Published: (2009) -
An improved negative selection algorithm based on the hybridization of cuckoo search and differential evolution for anomaly detection
by: Ayodele Nojeem, Lasisi
Published: (2018)