Data leak, critical information infrastructure and the legal options: what does Wikileaks teach us?
The massive data leaks by Wikileaks suggest how fragile a national security is from the perspective of information system and network sustainability. What Wikileaks have done and achieved raises some causes of concern. How do we view such leaks? Are they an act of whistle-blowing or disclosure of go...
| Main Authors: | Abdul Ghani Azmi, Ida Madieha, Zulhuda, Sonny, Jarot, Sigit Puspito Wigati |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
The Society of Digital Information and Wireless Communications (SDIWC)
2012
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/27232/ http://irep.iium.edu.my/27232/1/IJCSDF_2012_Wikileaks.pdf |
Similar Items
Data breach on the critical information infrastructures: lessons from the Wikileaks
by: Abdul Ghani Azmi, Ida Madieha, et al.
Published: (2012)
by: Abdul Ghani Azmi, Ida Madieha, et al.
Published: (2012)
Wikileaks'e sağduyulu yaklaşım (Discreet approach to Wikileaks)
by: Kayadibi, Saim
Published: (2010)
by: Kayadibi, Saim
Published: (2010)
Zigzag codes: high rate low complexity iterative codes
by: Jarot, Sigit Puspito Wigati
Published: (2011)
by: Jarot, Sigit Puspito Wigati
Published: (2011)
Convolutional coded OFDM in broadband mobile communication
by: Jarot, Sigit Puspito Wigati
Published: (2011)
by: Jarot, Sigit Puspito Wigati
Published: (2011)
Securing OFDM-based systems from the physical layer
by: Jarot, Sigit Puspito Wigati
Published: (2011)
by: Jarot, Sigit Puspito Wigati
Published: (2011)
Big data and its legal risks
by: Zulhuda, Sonny
Published: (2014)
by: Zulhuda, Sonny
Published: (2014)
National security in Malaysia's digital economy: redefinition, reaction and legal reform
by: Zulhuda, Sonny
Published: (2011)
by: Zulhuda, Sonny
Published: (2011)
Critical data leak analysis in educational environment
by: Abdul Ghani Azmi, Ida Madieha, et al.
Published: (2016)
by: Abdul Ghani Azmi, Ida Madieha, et al.
Published: (2016)
Intelligent decision support system for degree selection using AHP technique
by: Jamil, Rokiah, et al.
Published: (2012)
by: Jamil, Rokiah, et al.
Published: (2012)
Simulation of artificial noise based physical layer security
by: Zurkiple, Muhammad Izzat, et al.
Published: (2011)
by: Zurkiple, Muhammad Izzat, et al.
Published: (2011)
Study on security of IPv6 address management in enterprise WLAN
by: Jarot, Sigit Puspito Wigati, et al.
Published: (2012)
by: Jarot, Sigit Puspito Wigati, et al.
Published: (2012)
马来西亚社交媒体监管:选择与挑战 (Regulating Social Media in Malaysia: Options and Challenges)
by: Zulhuda, Sonny, et al.
Published: (2017)
by: Zulhuda, Sonny, et al.
Published: (2017)
E-Payment gateway and Internet banking system as modern business instrument and its legal basis in Malaysia
by: Zulhuda, Sonny
Published: (2012)
by: Zulhuda, Sonny
Published: (2012)
Wireless physical layer security using encryption and channel pre-compensation
by: Tahir, Mohammad, et al.
Published: (2010)
by: Tahir, Mohammad, et al.
Published: (2010)
Wireless physical layer security using channel state information
by: Tahir, Mohammad, et al.
Published: (2010)
by: Tahir, Mohammad, et al.
Published: (2010)
Noise modulated cryptographic generation for use in UWB wireless communication
by: Yaacob, Siti Hazwani, et al.
Published: (2011)
by: Yaacob, Siti Hazwani, et al.
Published: (2011)
Recent approaches to wireless physical layer security
by: -, M.Tahir, et al.
Published: (2011)
by: -, M.Tahir, et al.
Published: (2011)
Secure IPv6 address generation
by: -, Nashrul Hakiem, et al.
Published: (2011)
by: -, Nashrul Hakiem, et al.
Published: (2011)
Smart grid communication layer
by: Lokeman, Norulhuda, et al.
Published: (2011)
by: Lokeman, Norulhuda, et al.
Published: (2011)
An ideal legal system to combat cyber crime: issues and way forward
by: Abdul Ghani Azmi, Ida Madieha, et al.
Published: (2010)
by: Abdul Ghani Azmi, Ida Madieha, et al.
Published: (2010)
ZOOM bahaya ZOOM dipakai
by: Zulhuda, Sonny
Published: (2020)
by: Zulhuda, Sonny
Published: (2020)
Experimental implementation of dynamic spectrum access for video transmission using USRP
by: Tahir, Mohammad, et al.
Published: (2012)
by: Tahir, Mohammad, et al.
Published: (2012)
Decision to cast a vote: an ordinal regression statistical analysis
by: Lubis, Muharman, et al.
Published: (2014)
by: Lubis, Muharman, et al.
Published: (2014)
The Nigerian policy on critical information infrastructure
by: Saulawa, Mu'azu Abdullahi, et al.
Published: (2017)
by: Saulawa, Mu'azu Abdullahi, et al.
Published: (2017)
Collision probability of one-to-many reversible mapping for IPV6 address generation
by: Nashrul Hakiem, Nashrul Hakiem, et al.
Published: (2012)
by: Nashrul Hakiem, Nashrul Hakiem, et al.
Published: (2012)
The impact of Covid-19 to the Cyber Security and information society – experience of Malaysia = Dampak Covid-19 terhadap keamanan cyber dan masyarakat informasi – pengalaman Malaysia
by: Zulhuda, Sonny
Published: (2020)
by: Zulhuda, Sonny
Published: (2020)
Spectrum sensing for cognitive radios
by: Abu Hanifah, Izyan munyati, et al.
Published: (2011)
by: Abu Hanifah, Izyan munyati, et al.
Published: (2011)
Manage the legal risks
by: Zulhuda, Sonny
Published: (2020)
by: Zulhuda, Sonny
Published: (2020)
Cyberlaw and Data Protection Law
by: Zulhuda, Sonny
Published: (2016)
by: Zulhuda, Sonny
Published: (2016)
Citizen, cyber government and the legal aspects
by: Zulhuda, Sonny
Published: (2014)
by: Zulhuda, Sonny
Published: (2014)
US Degree transfer options
Published: (2009)
Published: (2009)
Integrating information security policies into domestic legislation: the Malaysian experience
by: Azmi, Ida Madieha, et al.
Published: (2013)
by: Azmi, Ida Madieha, et al.
Published: (2013)
The Law of information age : quo vadis?
by: Zulhuda, Sonny
Published: (2012)
by: Zulhuda, Sonny
Published: (2012)
Post Covid-19: the future of legal studies
by: Zulhuda, Sonny
Published: (2020)
by: Zulhuda, Sonny
Published: (2020)
What You Need to Know about the PDPA
by: Zulhuda, Sonny
Published: (2012)
by: Zulhuda, Sonny
Published: (2012)
Legal basis for Corona lockdown worldwide : The case in Malaysia
by: Zulhuda, Sonny
Published: (2020)
by: Zulhuda, Sonny
Published: (2020)
Law and legal education in the information age: quo vadis?
by: Zulhuda, Sonny
Published: (2011)
by: Zulhuda, Sonny
Published: (2011)
Legal redress for identity theft in Malaysia : hope or hype?
by: Zulhuda, Sonny
Published: (2012)
by: Zulhuda, Sonny
Published: (2012)
Twenty years of surveillance in Rett syndrome: what does this tell us?
by: Anderson, A., et al.
Published: (2014)
by: Anderson, A., et al.
Published: (2014)
What is This Thing Called Social Justice and What Does it Have to Do with Us in the Context of Globalisation?
by: Atweh, Bill
Published: (2009)
by: Atweh, Bill
Published: (2009)
Similar Items
-
Data breach on the critical information infrastructures: lessons from the Wikileaks
by: Abdul Ghani Azmi, Ida Madieha, et al.
Published: (2012) -
Wikileaks'e sağduyulu yaklaşım (Discreet approach to Wikileaks)
by: Kayadibi, Saim
Published: (2010) -
Zigzag codes: high rate low complexity iterative codes
by: Jarot, Sigit Puspito Wigati
Published: (2011) -
Convolutional coded OFDM in broadband mobile communication
by: Jarot, Sigit Puspito Wigati
Published: (2011) -
Securing OFDM-based systems from the physical layer
by: Jarot, Sigit Puspito Wigati
Published: (2011)