National security in Malaysia's digital economy: redefinition, reaction and legal reform
This paper investigates the need for Malaysia to relook at and redefine the concept of national security amid the changing circumstances especially in relation to the country’s increased reliance on the information and communications technology (ICT). The challenge is, the more a governance system i...
| Main Author: | Zulhuda, Sonny |
|---|---|
| Format: | Proceeding Paper |
| Language: | English |
| Published: |
2011
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/3030/ http://irep.iium.edu.my/3030/1/National_Security_in_Malaysia%27s_Digital_Economy_Sonny_Zulhuda.pdf |
Similar Items
National security in Malaysia's digital economy: redefinition, reaction and legal reform
by: Zulhuda, Sonny
Published: (2011)
by: Zulhuda, Sonny
Published: (2011)
Big data and its legal risks
by: Zulhuda, Sonny
Published: (2014)
by: Zulhuda, Sonny
Published: (2014)
Evaluation of users' awareness and their reaction on information security
by: Zeki, Akram M., et al.
Published: (2016)
by: Zeki, Akram M., et al.
Published: (2016)
Impact of NSA-PRISM to National Information Security
Strategy & Policy
by: Khudayer, Aiesha Y., et al.
Published: (2014)
by: Khudayer, Aiesha Y., et al.
Published: (2014)
Decision to cast a vote: an ordinal regression statistical analysis
by: Lubis, Muharman, et al.
Published: (2014)
by: Lubis, Muharman, et al.
Published: (2014)
Data leak, critical information infrastructure and the legal options: what does Wikileaks teach us?
by: Abdul Ghani Azmi, Ida Madieha, et al.
Published: (2012)
by: Abdul Ghani Azmi, Ida Madieha, et al.
Published: (2012)
ZOOM bahaya ZOOM dipakai
by: Zulhuda, Sonny
Published: (2020)
by: Zulhuda, Sonny
Published: (2020)
Mobile Quran app security vulnerabilities
by: Talib, Shuhaili, et al.
Published: (2015)
by: Talib, Shuhaili, et al.
Published: (2015)
Information security aligned to enterprise management
by: Abdullah, Istikoma, et al.
Published: (2015)
by: Abdullah, Istikoma, et al.
Published: (2015)
Information security in ICT from an Islamic
perspective
by: Ibrahim, Jamaludin, et al.
Published: (2014)
by: Ibrahim, Jamaludin, et al.
Published: (2014)
Malaysia National Library and knowledge management initiative
by: Yaacob, Nurul Ibtisam, et al.
Published: (2011)
by: Yaacob, Nurul Ibtisam, et al.
Published: (2011)
Web users’ knowledge and their behavior towards security threats and vulnerabilities
by: Aldossary, Alia Ahmed, et al.
Published: (2016)
by: Aldossary, Alia Ahmed, et al.
Published: (2016)
The impact of Covid-19 to the Cyber Security and information society – experience of Malaysia = Dampak Covid-19 terhadap keamanan cyber dan masyarakat informasi – pengalaman Malaysia
by: Zulhuda, Sonny
Published: (2020)
by: Zulhuda, Sonny
Published: (2020)
Super Authentication Security System (SASS) to Malaysian community for safety management
by: Ahmad Dahlan, Abdul Rahman, et al.
Published: (2011)
by: Ahmad Dahlan, Abdul Rahman, et al.
Published: (2011)
Steganography: a review of information security research and development in Muslim world
by: Yunus, Yunura Azura, et al.
Published: (2013)
by: Yunus, Yunura Azura, et al.
Published: (2013)
Knowledge management practice in private sector: building
the way for Saudi Arabia strategic growth and transformation to knowledge-based economy
by: Gharamah, Abdulrahman, et al.
Published: (2018)
by: Gharamah, Abdulrahman, et al.
Published: (2018)
In search of a model to explain digital divide in information technology organizations
by: Mohamed, Norshidah, et al.
Published: (2009)
by: Mohamed, Norshidah, et al.
Published: (2009)
Employing information security awareness to minimize over-exposure of average Internet user on social networks
by: Binden, Worawit, et al.
Published: (2014)
by: Binden, Worawit, et al.
Published: (2014)
Privacy policy in Indonesia and Malaysia: from digital economy to personal data protection laws
by: Zulhuda, Sonny
Published: (2017)
by: Zulhuda, Sonny
Published: (2017)
Cabaran perlindingan data dalam ekonomi digital (PDPA and the Challenges of Digital Economy)
by: Zulhuda, Sonny
Published: (2017)
by: Zulhuda, Sonny
Published: (2017)
Cabaran PDPA dalam ekonomi digital (PDPA and the challenges of digital economy)
by: Zulhuda, Sonny
Published: (2017)
by: Zulhuda, Sonny
Published: (2017)
Cabaran PDPA dalam ekonomi digital (Personal Data Protection Act and the challenges of digital economy)
by: Zulhuda, Sonny
Published: (2017)
by: Zulhuda, Sonny
Published: (2017)
The evaluation of information security of hospital information system (his) using cobit 5 framework: case study at Soreang Hospital, Indonesia
by: Nistrina, Khilda
Published: (2019)
by: Nistrina, Khilda
Published: (2019)
The state of e-government security in Malaysia : reassessing the legal and regulatory framework on the threat of information theft
by: Zulhuda, Sonny
Published: (2012)
by: Zulhuda, Sonny
Published: (2012)
E-Payment gateway and Internet banking system as modern business instrument and its legal basis in Malaysia
by: Zulhuda, Sonny
Published: (2012)
by: Zulhuda, Sonny
Published: (2012)
M’sians increasingly aware of risks with data breach
by: Zulhuda, Sonny
Published: (2019)
by: Zulhuda, Sonny
Published: (2019)
Information security threat avoidance behavior: an
empirical investigation
by: Ling, Zhixuan
Published: (2019)
by: Ling, Zhixuan
Published: (2019)
Factors influencing the adoption of digital technology among working millennials
by: Hefvihervina Rohayu, Hariyanto
Published: (2022)
by: Hefvihervina Rohayu, Hariyanto
Published: (2022)
Enhancing the security of RCIA ultra-lightweight
authentication protocol by using random number generator (RNG) technique
by: Yasear, Shaymah Akram
Published: (2015)
by: Yasear, Shaymah Akram
Published: (2015)
Data breach on the critical information infrastructures: lessons from the Wikileaks
by: Abdul Ghani Azmi, Ida Madieha, et al.
Published: (2012)
by: Abdul Ghani Azmi, Ida Madieha, et al.
Published: (2012)
A study on factors influencing users’ intention to use digital wallet: A case study of Universiti Utara Malaysia (UUM)
by: Baihui, Zhan
Published: (2019)
by: Baihui, Zhan
Published: (2019)
Evaluating the visibility and accessibility of world universities websites
by: Abu Bakar, Ahmad Bakeri
Published: (2011)
by: Abu Bakar, Ahmad Bakeri
Published: (2011)
Proposing a framework for evaluating content and design of religion-based : Islamic websites
by: Mahmud, Murni, et al.
Published: (2011)
by: Mahmud, Murni, et al.
Published: (2011)
Evaluating the visibility and accessibility of universities websites in the Muslim world
by: Abu Bakar, Ahmad Bakeri
Published: (2011)
by: Abu Bakar, Ahmad Bakeri
Published: (2011)
Empirical investigation on agile methods usage:
issues identified from early adopters in Malaysia
by: Asnawi, Ani Liza, et al.
Published: (2011)
by: Asnawi, Ani Liza, et al.
Published: (2011)
Android smartphone: Battery saving service
by: Ismail, Zahid, et al.
Published: (2011)
by: Ismail, Zahid, et al.
Published: (2011)
Improving the deployment of broadband content delivery using an open access approach in a high speed broadband environment in the Klang Valley
by: Ismail, Zahid
Published: (2011)
by: Ismail, Zahid
Published: (2011)
Strategy and policy statements on green ICT : an Islamic perspective.
by: Hameed, Shihab A.
Published: (2011)
by: Hameed, Shihab A.
Published: (2011)
Improving subscriber viewing experience via the integration of contents from multiple broadband service providers based on open access policy
by: Ismail, Mohd Zahid
Published: (2011)
by: Ismail, Mohd Zahid
Published: (2011)
Basic emotions verification and identification using Gaussian Mixture Model (GMM) features extraction
by: Abdul Rahman, Abdul Wahab, et al.
Published: (2011)
by: Abdul Rahman, Abdul Wahab, et al.
Published: (2011)
Similar Items
-
National security in Malaysia's digital economy: redefinition, reaction and legal reform
by: Zulhuda, Sonny
Published: (2011) -
Big data and its legal risks
by: Zulhuda, Sonny
Published: (2014) -
Evaluation of users' awareness and their reaction on information security
by: Zeki, Akram M., et al.
Published: (2016) -
Impact of NSA-PRISM to National Information Security
Strategy & Policy
by: Khudayer, Aiesha Y., et al.
Published: (2014) -
Decision to cast a vote: an ordinal regression statistical analysis
by: Lubis, Muharman, et al.
Published: (2014)