Impact of NSA-PRISM to National Information Security Strategy & Policy
Due to the higher concern of information security and daily threats which could make a tremendous impact on businesses and consumers this paper will discuss information security surveillance programs called PRISM, which affects the national information security. Detailed information will be provid...
| Main Authors: | Khudayer, Aiesha Y., Abdulsalam, Rasha M., Alshaibani, Suha M., Ibrahim, Jamaludin |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
IRPN Publishers
2014
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/38398/ http://irep.iium.edu.my/38398/1/Impact_of_NSA-PRISM_to_National_Information_Security_Strategy_%26_Policy.pdf |
Similar Items
Information security aligned to enterprise management
by: Abdullah, Istikoma, et al.
Published: (2015)
by: Abdullah, Istikoma, et al.
Published: (2015)
Information security in ICT from an Islamic
perspective
by: Ibrahim, Jamaludin, et al.
Published: (2014)
by: Ibrahim, Jamaludin, et al.
Published: (2014)
Evaluation of users' awareness and their reaction on information security
by: Zeki, Akram M., et al.
Published: (2016)
by: Zeki, Akram M., et al.
Published: (2016)
Steganography: a review of information security research and development in Muslim world
by: Yunus, Yunura Azura, et al.
Published: (2013)
by: Yunus, Yunura Azura, et al.
Published: (2013)
Employing information security awareness to minimize over-exposure of average Internet user on social networks
by: Binden, Worawit, et al.
Published: (2014)
by: Binden, Worawit, et al.
Published: (2014)
Strategy and policy statements on green ICT : an Islamic perspective.
by: Hameed, Shihab A.
Published: (2011)
by: Hameed, Shihab A.
Published: (2011)
Critical information security challenges: an appraisal
by: Shuhaib Mir, Mohammad, et al.
Published: (2013)
by: Shuhaib Mir, Mohammad, et al.
Published: (2013)
Information security policy perceived compliance among staff in Palestine universities: An empirical pilot study
by: Mohammad Iriqat, Yousef, et al.
Published: (2019)
by: Mohammad Iriqat, Yousef, et al.
Published: (2019)
The evaluation of information security of hospital information system (his) using cobit 5 framework: case study at Soreang Hospital, Indonesia
by: Nistrina, Khilda
Published: (2019)
by: Nistrina, Khilda
Published: (2019)
Performance evaluation of caching placement algorithms in named data network for video on demand service
by: Abbas, Rasha Salem
Published: (2016)
by: Abbas, Rasha Salem
Published: (2016)
National security in Malaysia's digital economy: redefinition, reaction and legal reform
by: Zulhuda, Sonny
Published: (2011)
by: Zulhuda, Sonny
Published: (2011)
Web users’ knowledge and their behavior towards security threats and vulnerabilities
by: Aldossary, Alia Ahmed, et al.
Published: (2016)
by: Aldossary, Alia Ahmed, et al.
Published: (2016)
Potential use of data mining techniques in information technology consulting operations
by: Qadri, Mehran, et al.
Published: (2015)
by: Qadri, Mehran, et al.
Published: (2015)
Mobile Quran app security vulnerabilities
by: Talib, Shuhaili, et al.
Published: (2015)
by: Talib, Shuhaili, et al.
Published: (2015)
Malaysia National Library and knowledge management initiative
by: Yaacob, Nurul Ibtisam, et al.
Published: (2011)
by: Yaacob, Nurul Ibtisam, et al.
Published: (2011)
The knowledge management strategies used as a tool within and through strategic consulting firms to increase the organisational performance
by: Mohamed Mahmoud, Fatimetou Zahra, et al.
Published: (2015)
by: Mohamed Mahmoud, Fatimetou Zahra, et al.
Published: (2015)
Super Authentication Security System (SASS) to Malaysian community for safety management
by: Ahmad Dahlan, Abdul Rahman, et al.
Published: (2011)
by: Ahmad Dahlan, Abdul Rahman, et al.
Published: (2011)
Attitude towards information privacy issues among students of IIUM
by: Mohamud, Ibrahim Kalif, et al.
Published: (2016)
by: Mohamud, Ibrahim Kalif, et al.
Published: (2016)
Enterprise information architecture of a Malaysian institute of higher learning management information system: an experience
by: Suhaimi, Mohd Adam, et al.
Published: (2014)
by: Suhaimi, Mohd Adam, et al.
Published: (2014)
Managers' perception of Information Management (IM) and Knowledge Management (KM) and the role of information and knowledge managers
by: Abdul Karim, Nor Shahriza, et al.
Published: (2003)
by: Abdul Karim, Nor Shahriza, et al.
Published: (2003)
Collaboration, communities, well-beings and information systems
Published: (2011)
Published: (2011)
Information security awareness at the knowledge-based institution: its antecedents and measures
by: Ahlan, Abdul Rahman, et al.
Published: (2015)
by: Ahlan, Abdul Rahman, et al.
Published: (2015)
Using socio-ecological model to inform the design of persuasive applications
by: Mohd Mohadis, Hazwani, et al.
Published: (2015)
by: Mohd Mohadis, Hazwani, et al.
Published: (2015)
Information technology issues and applications in Malaysia : a collection of articles.
Published: (2011)
Published: (2011)
The inclination of Information and Communication Technology (ICT) students towards entrepreneurship
by: Mior Nazri, Mior Nasir, et al.
Published: (2014)
by: Mior Nazri, Mior Nasir, et al.
Published: (2014)
Seeking access to health information: the dilemma of woman community in rural Malaysia
by: Abu Bakar, Ahmad Bakeri, et al.
Published: (2009)
by: Abu Bakar, Ahmad Bakeri, et al.
Published: (2009)
In search of a model to explain digital divide in information technology organizations
by: Mohamed, Norshidah, et al.
Published: (2009)
by: Mohamed, Norshidah, et al.
Published: (2009)
The current state of information management and knowledge management in the Malaysian construction industry
by: Noordin, Mohamad Fauzan, et al.
Published: (2012)
by: Noordin, Mohamad Fauzan, et al.
Published: (2012)
Real time information sharing and remote sensing for disaster management and prevention
by: Ahmad Dahlan, Abdul Rahman, et al.
Published: (2011)
by: Ahmad Dahlan, Abdul Rahman, et al.
Published: (2011)
An information retrieval system for Quranic texts: a proposed system design
by: Noordin, Mohamad Fauzan, et al.
Published: (2006)
by: Noordin, Mohamad Fauzan, et al.
Published: (2006)
Improving subscriber viewing experience via the integration of contents from multiple broadband service providers based on open access policy
by: Ismail, Mohd Zahid
Published: (2011)
by: Ismail, Mohd Zahid
Published: (2011)
AGW 616 - MANAGEMENT INFORMATION SYSTEM APRIL 08.
by: PPP, Pusat Pengajian Pengurusan
Published: (2008)
by: PPP, Pusat Pengajian Pengurusan
Published: (2008)
Information security threat avoidance behavior: an
empirical investigation
by: Ling, Zhixuan
Published: (2019)
by: Ling, Zhixuan
Published: (2019)
Implementing content personalization strategy for Malaysian broadband service providers to enhance subscriber satisfaction
by: Ismail, Zahid
Published: (2013)
by: Ismail, Zahid
Published: (2013)
Is disclosure of information technology (IT) internal control weaknesses worthwhile for firms?
by: Kusumaningtias, Rohmawati, et al.
Published: (2020)
by: Kusumaningtias, Rohmawati, et al.
Published: (2020)
Information technology: a tool for effective SME material management practices
by: Ibrahim, Magaji Umar, et al.
Published: (2019)
by: Ibrahim, Magaji Umar, et al.
Published: (2019)
Cloud computing: cloud adoption in professional practice
by: Nazri, Nadhirah, et al.
Published: (2015)
by: Nazri, Nadhirah, et al.
Published: (2015)
The role of IT consulting practice: a successful enterprise mobility solution
by: Fakhri, Nurul Fahimah, et al.
Published: (2015)
by: Fakhri, Nurul Fahimah, et al.
Published: (2015)
Effectiveness of Information Technology Strategy in an Organization: A Case Study
by: Ratri, Ubai
Published: (2010)
by: Ratri, Ubai
Published: (2010)
The Determinants of Information Technology Audit in Iraq Listed Companies
by: Karim, Haitham M
Published: (2011)
by: Karim, Haitham M
Published: (2011)
Similar Items
-
Information security aligned to enterprise management
by: Abdullah, Istikoma, et al.
Published: (2015) -
Information security in ICT from an Islamic
perspective
by: Ibrahim, Jamaludin, et al.
Published: (2014) -
Evaluation of users' awareness and their reaction on information security
by: Zeki, Akram M., et al.
Published: (2016) -
Steganography: a review of information security research and development in Muslim world
by: Yunus, Yunura Azura, et al.
Published: (2013) -
Employing information security awareness to minimize over-exposure of average Internet user on social networks
by: Binden, Worawit, et al.
Published: (2014)