Inadvertent Leakage of Organisational Information through Online Social Networking
The advent of online social networking (OSN) amongst employees represents new fundamental challenges to organisations. As employees are bringing their own mobile devices to the workplace, which allow them to engage in social media activities at for organisations to protect the confidentiality of the...
| Main Author: | Abdul Molok, Nurul Nuha |
|---|---|
| Format: | Proceeding Paper |
| Language: | English |
| Published: |
2014
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/37614/ http://irep.iium.edu.my/37614/1/37614_Inadvertent%20Leakage%20of%20Organisational%20Information.pdf |
Similar Items
Understanding the factors of information leakage through online social networking to safeguard organizational information
by: Abdul Molok, Nurul Nuha, et al.
Published: (2010)
by: Abdul Molok, Nurul Nuha, et al.
Published: (2010)
Information leakage through online social networking: Opening the doorway for advanced persistence threats
by: Abdul Molok , Nurul Nuha, et al.
Published: (2010)
by: Abdul Molok , Nurul Nuha, et al.
Published: (2010)
Information Leakage through online social networking: opening the doorway for advanced persistence threats
by: Abdul Molok , Nurul Nuha, et al.
Published: (2011)
by: Abdul Molok , Nurul Nuha, et al.
Published: (2011)
A case analysis of securing organisations against information leakage through online social networking
by: Abdul Molok, Nurul Nuha, et al.
Published: (2018)
by: Abdul Molok, Nurul Nuha, et al.
Published: (2018)
Exploring the use of online social networking by employees: Looking at the potential for information leakage
by: Abdul Molok, Nurul Nuha, et al.
Published: (2011)
by: Abdul Molok, Nurul Nuha, et al.
Published: (2011)
Online social networking: a source of intelligence for advanced persistent threats
by: Abdul Molok , Nurul Nuha, et al.
Published: (2012)
by: Abdul Molok , Nurul Nuha, et al.
Published: (2012)
Disclosure of organizational information on social media: Perspectives from security managers
by: Abdul Molok , Nurul Nuha, et al.
Published: (2013)
by: Abdul Molok , Nurul Nuha, et al.
Published: (2013)
Disclosure of organizational information by employees on Facebook: Looking at the potential for information security risks
by: Abdul Molok , Nurul Nuha, et al.
Published: (2011)
by: Abdul Molok , Nurul Nuha, et al.
Published: (2011)
Socio-technical mitigation effort to combat cyber propaganda: a systematic literature mapping
by: Maseri, Aimi Nadrah, et al.
Published: (2020)
by: Maseri, Aimi Nadrah, et al.
Published: (2020)
Exploring the use of online social networking among employees in Malaysian organizations: looking potential threats to information security
by: Abdul Molok , Nurul Nuha
Published: (2013)
by: Abdul Molok , Nurul Nuha
Published: (2013)
Codification or personalization: a consideration on the suitable approach for organizations
by: Supar, Norizah
Published: (2013)
by: Supar, Norizah
Published: (2013)
Critical information security challenges: an appraisal
by: Shuhaib Mir, Mohammad, et al.
Published: (2013)
by: Shuhaib Mir, Mohammad, et al.
Published: (2013)
The information systems integration plan: for satellite remote sensing subsystems
by: Abdul Molok , Nurul Nuha
Published: (2010)
by: Abdul Molok , Nurul Nuha
Published: (2010)
Fault tolerant cloud auditing
by: Muhammed Yusof, Zulkefli, et al.
Published: (2013)
by: Muhammed Yusof, Zulkefli, et al.
Published: (2013)
Should we be concerned with spam emails? A look at its impacts and implications
by: Bujang, Yanti Rosmunie, et al.
Published: (2013)
by: Bujang, Yanti Rosmunie, et al.
Published: (2013)
Managing IT innovation: a study of information technology
implementations in Malaysian banks
by: Ahlan, Abdul Rahman
Published: (2005)
by: Ahlan, Abdul Rahman
Published: (2005)
Information security policy perceived compliance among staff in Palestine universities: An empirical pilot study
by: Mohammad Iriqat, Yousef, et al.
Published: (2019)
by: Mohammad Iriqat, Yousef, et al.
Published: (2019)
Privasi vs data peribadi (Privacy To Personal Data Protection: Conceptual and Contextual Landscape)
by: Zulhuda, Sonny
Published: (2017)
by: Zulhuda, Sonny
Published: (2017)
Cabaran PDPA dalam ekonomi digital (PDPA and the challenges of digital economy)
by: Zulhuda, Sonny
Published: (2017)
by: Zulhuda, Sonny
Published: (2017)
Big data, cloud and "bring your own device": how the data protection law addresses the impact of 'datafication'
by: Zulhuda, Sonny, et al.
Published: (2015)
by: Zulhuda, Sonny, et al.
Published: (2015)
An alternative method for determining critical success factors of information system project
by: Subiyakto, A'ang, et al.
Published: (2014)
by: Subiyakto, A'ang, et al.
Published: (2014)
Re-emphasizing the dimensions and impacts of complementary IT resources through governance
by: Ajayi, Binyamin, et al.
Published: (2016)
by: Ajayi, Binyamin, et al.
Published: (2016)
Introducing learner infrastructural capabilities into information systems success model using e-learning
by: Atanda, Balogun Naeem, et al.
Published: (2017)
by: Atanda, Balogun Naeem, et al.
Published: (2017)
A coherent framework for understanding the success of an information system project: a revised version
by: Jaya Putra, Sopiyanshah, et al.
Published: (2016)
by: Jaya Putra, Sopiyanshah, et al.
Published: (2016)
A confirmatory factor analysis of the information technology governance effectiveness: evidence from Malaysia
by: Jasber, Kaur, et al.
Published: (2011)
by: Jasber, Kaur, et al.
Published: (2011)
Evaluating the design features of Islamic website: a Muslim user perception
by: Aliyu, Mansur, et al.
Published: (2013)
by: Aliyu, Mansur, et al.
Published: (2013)
Use of Social Network Sites (SNS), career success and information power
by: Wok, Saodah, et al.
Published: (2017)
by: Wok, Saodah, et al.
Published: (2017)
Exploring the use of social media for information sharing during the 2014 flood in Malaysia
by: Tengku Mohd Azzman, Tengku Siti Aisha, et al.
Published: (2015)
by: Tengku Mohd Azzman, Tengku Siti Aisha, et al.
Published: (2015)
Assessing the relationships between information seeking, motives of using social media, and information sharing on haze and air pollution among IIUM students
by: Kasirye, Faiswal, et al.
Published: (2020)
by: Kasirye, Faiswal, et al.
Published: (2020)
Purchasing intention, family values and social media usage affecting online purchasing habits among youths
by: Hussain, Souhaila, et al.
Published: (2018)
by: Hussain, Souhaila, et al.
Published: (2018)
Impact of social media for educational use and educational information-sharing on students’ academic performance
by: Jamalludin, Nur Hafifah, et al.
Published: (2018)
by: Jamalludin, Nur Hafifah, et al.
Published: (2018)
Risk assessment model for organizational information security
by: Dioubate, Balla Mousa, et al.
Published: (2015)
by: Dioubate, Balla Mousa, et al.
Published: (2015)
Situational social support groups for information sharing in times of disaster: a case of 2014 floods in Malaysia
by: Ismail, Rizalawati, et al.
Published: (2018)
by: Ismail, Rizalawati, et al.
Published: (2018)
Inculcating ethical values in the students through e-Learning platform
by: M., Abdul Hafeez, et al.
Published: (2013)
by: M., Abdul Hafeez, et al.
Published: (2013)
Internal customer satisfaction towards HRM practices and its influence on external customers and organisational
outcomes
by: Wok, Saodah, et al.
Published: (2011)
by: Wok, Saodah, et al.
Published: (2011)
Green IT attitude and behaviour in higher education institution: a gender perspective
by: Kartiwi, Mira, et al.
Published: (2014)
by: Kartiwi, Mira, et al.
Published: (2014)
A comprehensive adoption model of M-government services among citizens in developing countries
by: Sultana, Mst Rebeka, et al.
Published: (2015)
by: Sultana, Mst Rebeka, et al.
Published: (2015)
Review of knowledge management in higher education
by: Altaf Haqani, Alyami Effra, et al.
Published: (2015)
by: Altaf Haqani, Alyami Effra, et al.
Published: (2015)
Managers perceptions towards the success of E-performance reporting system
by: Subiyakto, A'ang, et al.
Published: (2017)
by: Subiyakto, A'ang, et al.
Published: (2017)
Factors affecting instructors’ adoption of learning management systems: A theoretical framework
by: Abdallah, Nahel A. O., et al.
Published: (2016)
by: Abdallah, Nahel A. O., et al.
Published: (2016)
Similar Items
-
Understanding the factors of information leakage through online social networking to safeguard organizational information
by: Abdul Molok, Nurul Nuha, et al.
Published: (2010) -
Information leakage through online social networking: Opening the doorway for advanced persistence threats
by: Abdul Molok , Nurul Nuha, et al.
Published: (2010) -
Information Leakage through online social networking: opening the doorway for advanced persistence threats
by: Abdul Molok , Nurul Nuha, et al.
Published: (2011) -
A case analysis of securing organisations against information leakage through online social networking
by: Abdul Molok, Nurul Nuha, et al.
Published: (2018) -
Exploring the use of online social networking by employees: Looking at the potential for information leakage
by: Abdul Molok, Nurul Nuha, et al.
Published: (2011)