Employing information security awareness to minimize over-exposure of average Internet user on social networks
Use of Online Social Networking Sites (OSNs) has become ubiquitous nowadays. In the era of a million user social networking sites throughout the world, it becomes increasingly difficult for people to control what they are exposing to whom. In this paper we analyze the influence of social media inter...
| Main Authors: | Binden, Worawit, Jormae, Maheedeen, Zain, Zakaria, Ibrahim, Jamaludin |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
IJSRP.ORG
2014
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/38397/ http://irep.iium.edu.my/38397/1/Employing_Information_Security_Awareness_to_Minimize_Over-Exposure_of_Average_Internet_User_on_Social_Networks.pdf |
Similar Items
Evaluation of users' awareness and their reaction on information security
by: Zeki, Akram M., et al.
Published: (2016)
by: Zeki, Akram M., et al.
Published: (2016)
User experience:assesing the effectiveness of internet booking service
by: Hussein, Idyawati, et al.
Published: (2010)
by: Hussein, Idyawati, et al.
Published: (2010)
Measuring computer security awareness on internet banking and shopping for internet users
by: Sidi, Fatimah, et al.
Published: (2013)
by: Sidi, Fatimah, et al.
Published: (2013)
Web users’ knowledge and their behavior towards security threats and vulnerabilities
by: Aldossary, Alia Ahmed, et al.
Published: (2016)
by: Aldossary, Alia Ahmed, et al.
Published: (2016)
Information security aligned to enterprise management
by: Abdullah, Istikoma, et al.
Published: (2015)
by: Abdullah, Istikoma, et al.
Published: (2015)
Information security in ICT from an Islamic
perspective
by: Ibrahim, Jamaludin, et al.
Published: (2014)
by: Ibrahim, Jamaludin, et al.
Published: (2014)
Effect of age on information security awareness level among young internet users in Malaysia
by: Omar, Siti Zobidah, et al.
Published: (2021)
by: Omar, Siti Zobidah, et al.
Published: (2021)
Survey on mobile and wireless security awareness: user perspectives
by: Nazri, Nadhirah, et al.
Published: (2015)
by: Nazri, Nadhirah, et al.
Published: (2015)
Steganography: a review of information security research and development in Muslim world
by: Yunus, Yunura Azura, et al.
Published: (2013)
by: Yunus, Yunura Azura, et al.
Published: (2013)
Impact of NSA-PRISM to National Information Security
Strategy & Policy
by: Khudayer, Aiesha Y., et al.
Published: (2014)
by: Khudayer, Aiesha Y., et al.
Published: (2014)
User Experience Design (UXD): a survey of user interface development practices in Malaysia
by: Hussein, Idyawati, et al.
Published: (2012)
by: Hussein, Idyawati, et al.
Published: (2012)
Skala ketagihan internet Chen (CIAS)
by: Al-Ani, Ali Sabri Radeef, et al.
Published: (2020)
by: Al-Ani, Ali Sabri Radeef, et al.
Published: (2020)
Information security awareness at the knowledge-based institution: its antecedents and measures
by: Ahlan, Abdul Rahman, et al.
Published: (2015)
by: Ahlan, Abdul Rahman, et al.
Published: (2015)
User generated content and the Muslim consumer in Cyberspace
by: Saidin, Aznan Zuhid, et al.
Published: (2012)
by: Saidin, Aznan Zuhid, et al.
Published: (2012)
Mobile Quran app security vulnerabilities
by: Talib, Shuhaili, et al.
Published: (2015)
by: Talib, Shuhaili, et al.
Published: (2015)
Impersonate affecting users' attitude toward facebook in Egypt
by: Hassan El Hoby, Hany Mohamed, et al.
Published: (2016)
by: Hassan El Hoby, Hany Mohamed, et al.
Published: (2016)
Minimum completion time for power-aware scheduling in cloud computing
by: Mehdi, Nawfal A., et al.
Published: (2012)
by: Mehdi, Nawfal A., et al.
Published: (2012)
Critical information security challenges: an appraisal
by: Shuhaib Mir, Mohammad, et al.
Published: (2013)
by: Shuhaib Mir, Mohammad, et al.
Published: (2013)
Super Authentication Security System (SASS) to Malaysian community for safety management
by: Ahmad Dahlan, Abdul Rahman, et al.
Published: (2011)
by: Ahmad Dahlan, Abdul Rahman, et al.
Published: (2011)
Securing e-learning environment: A study of security awareness and behavior of user
by: Wan Nurul Safawati, Wan Manan, et al.
Published: (2017)
by: Wan Nurul Safawati, Wan Manan, et al.
Published: (2017)
Computer security self-efficacy factors influencing e-banking utilization and user satisfaction
by: Al-Shawabkeh, Mahmoud, et al.
Published: (2012)
by: Al-Shawabkeh, Mahmoud, et al.
Published: (2012)
Metrics evaluation for context-aware computing
by: Mantoro, Teddy
Published: (2009)
by: Mantoro, Teddy
Published: (2009)
A survey of usability awareness in IT industry
by: Hussein, Idyawati, et al.
Published: (2011)
by: Hussein, Idyawati, et al.
Published: (2011)
Internet impact on education
by: Hameed, Shihab A.
Published: (2011)
by: Hameed, Shihab A.
Published: (2011)
Preliminary investigation of Islamic websites design & content feature: A heuristic evaluation from user perspective
by: Aliyu, Mansur, et al.
Published: (2010)
by: Aliyu, Mansur, et al.
Published: (2010)
Transpacific partnership agreement and Internet policing?
by: Ismail, Suzi Fadhilah, et al.
Published: (2016)
by: Ismail, Suzi Fadhilah, et al.
Published: (2016)
User-centered web development for GMI alumni website
by: Zakaria, N. A., et al.
Published: (2010)
by: Zakaria, N. A., et al.
Published: (2010)
Mobile user location prediction: genetic algorithm-based approach
by: Mantoro, Teddy, et al.
Published: (2010)
by: Mantoro, Teddy, et al.
Published: (2010)
Making location-aware computing working accurately in smart spaces
by: Mantoro, Teddy, et al.
Published: (2011)
by: Mantoro, Teddy, et al.
Published: (2011)
User attitude, organizational learning and dynamic capability in government-to-business success
by: Kassim, Erne Suzila, et al.
Published: (2010)
by: Kassim, Erne Suzila, et al.
Published: (2010)
The Malaysian public's awareness of S&T
by: Mohd. Asraf, Ratnawati, et al.
Published: (2011)
by: Mohd. Asraf, Ratnawati, et al.
Published: (2011)
User awareness on security risks in M-commerce / Mohd Idzham Nawawi
by: Nawawi, Mohd Idzham
Published: (2007)
by: Nawawi, Mohd Idzham
Published: (2007)
Improving the accuracy of indoor user location using IEEE 802.11 signals
by: Mantoro, Teddy, et al.
Published: (2010)
by: Mantoro, Teddy, et al.
Published: (2010)
National security in Malaysia's digital economy: redefinition, reaction and legal reform
by: Zulhuda, Sonny
Published: (2011)
by: Zulhuda, Sonny
Published: (2011)
Toward user awareness and acceptance of Sudan E-government: adoption and security perspective
by: Khalifa, Othman Omran, et al.
Published: (2016)
by: Khalifa, Othman Omran, et al.
Published: (2016)
Self-organizing map approach for determining mobile user location using IEEE 802.11 signals
by: Mantoro, Teddy, et al.
Published: (2010)
by: Mantoro, Teddy, et al.
Published: (2010)
Final examination time table scheduling using integer programming with average time slot gap minimization
by: Nur Hidayah Abdul Jamil,, et al.
Published: (2024)
by: Nur Hidayah Abdul Jamil,, et al.
Published: (2024)
Final examination time table scheduling using integer programming with average time slot gap minimization
by: Abdul Jamil, Nur Hidayah, et al.
Published: (2024)
by: Abdul Jamil, Nur Hidayah, et al.
Published: (2024)
A Decentralized Multi-Factor User Authentication Scheme For The Internet Of Things System
by: Chiadighikaobi, Ikenna Rene
Published: (2024)
by: Chiadighikaobi, Ikenna Rene
Published: (2024)
Cloud computing: cloud adoption in professional practice
by: Nazri, Nadhirah, et al.
Published: (2015)
by: Nazri, Nadhirah, et al.
Published: (2015)
Similar Items
-
Evaluation of users' awareness and their reaction on information security
by: Zeki, Akram M., et al.
Published: (2016) -
User experience:assesing the effectiveness of internet booking service
by: Hussein, Idyawati, et al.
Published: (2010) -
Measuring computer security awareness on internet banking and shopping for internet users
by: Sidi, Fatimah, et al.
Published: (2013) -
Web users’ knowledge and their behavior towards security threats and vulnerabilities
by: Aldossary, Alia Ahmed, et al.
Published: (2016) -
Information security aligned to enterprise management
by: Abdullah, Istikoma, et al.
Published: (2015)