IT security consultancy in Malaysia: hindrances and impacts
The dramatic progress in information technology has been followed by a remarkable increase in information security risks. Therefore, companies and organizations especially in developed countries have resorted to security consultant firms to secure their information systems and to help them build an...
| Main Authors: | Adam, Mutasim Elsadig, Rahman, Md. Anisur, Barzak, Omar Mokhles, Salah, Mohammed A. F., Ibrahim, Jamaludin |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
medi+WORLD Internationa
2013
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/38684/ http://irep.iium.edu.my/38684/1/IT_Security_Consultancy_in_Malaysia_Hindrances_and_Impacts.pdf |
Similar Items
Risk management at universities: illegal residents in hostels & fire cases
by: Barzak, Omar Mokhles, et al.
Published: (2014)
by: Barzak, Omar Mokhles, et al.
Published: (2014)
Poverty's no hindrance to success
by: New Sunday Times,
Published: (2004)
by: New Sunday Times,
Published: (2004)
Unintentional information security behavior from the Qur’an and hadith’s perspective
by: Barzak, Omar Mokhles, et al.
Published: (2015)
by: Barzak, Omar Mokhles, et al.
Published: (2015)
Information security behavior among employees from the Islamic perspective
by: Barzak, Omar Mokhles, et al.
Published: (2016)
by: Barzak, Omar Mokhles, et al.
Published: (2016)
Unintentional information security behavior from the Qur’an
and Hadith’s perspective
by: Barzak, Omar Mokhles, et al.
Published: (2016)
by: Barzak, Omar Mokhles, et al.
Published: (2016)
The TRAIL to cancer therapy: hindrances and potential solutions
by: Wong, Sonia How Ming, et al.
Published: (2019)
by: Wong, Sonia How Ming, et al.
Published: (2019)
Visual impairment, paralysis no hindrance to achieving success
by: Daily Express Sabah
Published: (2022)
by: Daily Express Sabah
Published: (2022)
Keeping 1m apart should be no hindrance to bonding
by: Mohd. Hussain, Mohd. Ramzi
Published: (2020)
by: Mohd. Hussain, Mohd. Ramzi
Published: (2020)
Impact of parallel projects management
by: Wani, Sharyar, et al.
Published: (2012)
by: Wani, Sharyar, et al.
Published: (2012)
Examining hindrance factors for hiring people with disabilities (PWDs) in Malaysia: employer’s perspectives
by: Omar, Muhd Khaizer, et al.
Published: (2024)
by: Omar, Muhd Khaizer, et al.
Published: (2024)
Reducing hindrances to enterprise risk management implementation in construction firms
by: Zhao, X., et al.
Published: (2015)
by: Zhao, X., et al.
Published: (2015)
Big data and its impact on IT consultancy
by: Mohamed, Habab, et al.
Published: (2016)
by: Mohamed, Habab, et al.
Published: (2016)
Self-generated drawing: A help or hindrance to learning from animation?
by: Lowe, Ric, et al.
Published: (2017)
by: Lowe, Ric, et al.
Published: (2017)
Visual Impairment No Hindrance To Lass - Syarnissa seeks scholarship to study abroad
by: The Star, Jayagandi Jayaraj
Published: (2008)
by: The Star, Jayagandi Jayaraj
Published: (2008)
Age 83 is not a hindrance Dr. Jahid gets a second PhD
by: Mimi Rabita, Abdul Wahit
Published: (2022)
by: Mimi Rabita, Abdul Wahit
Published: (2022)
Comparative study on the perspective towards the benefits and hindrances of implementing building information modelling (BIM)
by: Ang, Peniel Soon Ern, et al.
Published: (2020)
by: Ang, Peniel Soon Ern, et al.
Published: (2020)
Awareness of social engineering among IIUM students
by: Adam, Mutasim Elsadig, et al.
Published: (2011)
by: Adam, Mutasim Elsadig, et al.
Published: (2011)
Knowledge and hindrances in implementing lean construction by small and medium contractors in Malaysia / Wan Mohd Nurdden Wan Muhammad
by: Wan Muhammad, Wan Mohd Nurdden
Published: (2013)
by: Wan Muhammad, Wan Mohd Nurdden
Published: (2013)
Characterization assessment on nanofiltration membrane using steric-hindrance pore (SHP) and teorell-meyer-sievers (TMS) models
by: Mazrul Nizam Abu Seman,, et al.
Published: (2023)
by: Mazrul Nizam Abu Seman,, et al.
Published: (2023)
Characterization assessment on nanofiltration membrane using steric-hindrance pore (SHP) and teorell-meyer-sievers (TMS) models
by: Mazrul Nizam, Abu Seman, et al.
Published: (2023)
by: Mazrul Nizam, Abu Seman, et al.
Published: (2023)
Genetic Studies and Backcross Breeding for Shelf Life and Yield in Long Bean (Vigna Sesquipedalis (L.) Fruw)
by: Rahman, Md. Anisur
Published: (1997)
by: Rahman, Md. Anisur
Published: (1997)
The role of IT consulting practice: a successful enterprise mobility solution
by: Fakhri, Nurul Fahimah, et al.
Published: (2015)
by: Fakhri, Nurul Fahimah, et al.
Published: (2015)
Risk Management in Parallel Projects: Analysis & Best Practices and Implications to Generic DBrain (gDBrain) Research Project
by: Ibrahim, Jamaludin, et al.
Published: (2013)
by: Ibrahim, Jamaludin, et al.
Published: (2013)
Investigating the impact of Instructional Consultation on the practice of Teaching Assistants
by: Gill, Randeep Kaur
Published: (2016)
by: Gill, Randeep Kaur
Published: (2016)
The impact of using measurement software in the quantity surveying consultancy
by: Lim, Meow Ying
Published: (2020)
by: Lim, Meow Ying
Published: (2020)
Aligning cloud computing security with business strategy
by: Mohamed Hassan El-Hoby, Hany, et al.
Published: (2014)
by: Mohamed Hassan El-Hoby, Hany, et al.
Published: (2014)
Potential use of data mining techniques in information technology consulting operations
by: Qadri, Mehran, et al.
Published: (2015)
by: Qadri, Mehran, et al.
Published: (2015)
Biological Inspired Approach in Parallel Immunology System for Network
Security
by: muna, elsadig, et al.
Published: (2010)
by: muna, elsadig, et al.
Published: (2010)
Hybrid Biological Intrusion Prevention and Selfhealing System for Network Security
by: Muna, Elsadig, et al.
Published: (2010)
by: Muna, Elsadig, et al.
Published: (2010)
Biological Intrusion Prevention and Self-Healing Model for Network Security
by: Muna, Elsadig, et al.
Published: (2010)
by: Muna, Elsadig, et al.
Published: (2010)
Bio Inspired Intrusion Prevention and Self-healing Architecture for Network Security
by: Muna , Elsadig, et al.
by: Muna , Elsadig, et al.
The rituals of medicine : exploring the General Practice Consultation using simulated consultations
by: Arnet, Hayley Ruth
Published: (2012)
by: Arnet, Hayley Ruth
Published: (2012)
Business intelligence as a knowledge management tool in providing financial consultancy services
by: Muhammad, Gul, et al.
Published: (2014)
by: Muhammad, Gul, et al.
Published: (2014)
Comparison of consulting contract
by: Khalid, Farial Hanum Nurul 'Ain
Published: (2007)
by: Khalid, Farial Hanum Nurul 'Ain
Published: (2007)
Investigating the impact of extraneous distractions on consultations in general practice: Lessons learned
by: Jiwa, Moyez, et al.
Published: (2009)
by: Jiwa, Moyez, et al.
Published: (2009)
A study of roles and impact of project management consultancy in construction project
by: Nur Syahidah, Abu Bakar
Published: (2017)
by: Nur Syahidah, Abu Bakar
Published: (2017)
Biological Inspired Intrusion Prevention and Self-healing System for Network Security Based on Danger Theory
by: Muna, Elsadig, et al.
Published: (2009)
by: Muna, Elsadig, et al.
Published: (2009)
Examining the consulting services delivery at Microsoft Consulting Services (MCS) Singapore and recommendations for improvement
by: Chee, Wah Keat
Published: (2009)
by: Chee, Wah Keat
Published: (2009)
Comparison of Business Model Canvas (BMC) among the three consulting companies
by: Azhar Amanullah, Ayn Nur Azhana, et al.
Published: (2015)
by: Azhar Amanullah, Ayn Nur Azhana, et al.
Published: (2015)
Technical services & consultancy UMP
by: UMP, PNC
Published: (2010)
by: UMP, PNC
Published: (2010)
Similar Items
-
Risk management at universities: illegal residents in hostels & fire cases
by: Barzak, Omar Mokhles, et al.
Published: (2014) -
Poverty's no hindrance to success
by: New Sunday Times,
Published: (2004) -
Unintentional information security behavior from the Qur’an and hadith’s perspective
by: Barzak, Omar Mokhles, et al.
Published: (2015) -
Information security behavior among employees from the Islamic perspective
by: Barzak, Omar Mokhles, et al.
Published: (2016) -
Unintentional information security behavior from the Qur’an
and Hadith’s perspective
by: Barzak, Omar Mokhles, et al.
Published: (2016)