Information security awareness through the use of social media
The proliferation of online social media use amongst employees has been reported to be incriminating organizational information security. Despite the benefits of social media to organizations, there were cases of information leakage, malware, identity theft, espionage and sabotage through such use....
| Main Authors: | Abdul Molok, Nurul Nuha, Md Ali, Asma, Talib, Shuhaili, Mahmud, Murni |
|---|---|
| Format: | Proceeding Paper |
| Language: | English English English |
| Published: |
IEEE
2015
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/40254/ http://irep.iium.edu.my/40254/1/Information_security_awareness_through_the_use_of_social_media.pdf http://irep.iium.edu.my/40254/2/ICT4M_2014_Prog_Book.pdf http://irep.iium.edu.my/40254/6/40254_Information%20security%20awareness%20through%20the%20use%20of%20social%20media.SCOPUSpdf.pdf |
Similar Items
Exploring the factors influencing top management involvement and participation in information security
by: Abdul Munir, Rufizah, et al.
Published: (2017)
by: Abdul Munir, Rufizah, et al.
Published: (2017)
Responsibility-value alignment in information security governance
by: Abdul Munir, Rufizah, et al.
Published: (2018)
by: Abdul Munir, Rufizah, et al.
Published: (2018)
Social networks privacy policy awareness among undergraduate students: the case of Twitter
by: Talib, Shuhaili, et al.
Published: (2014)
by: Talib, Shuhaili, et al.
Published: (2014)
An analysis of information security awareness within home and work environments
by: Talib, Shuhaili, et al.
Published: (2010)
by: Talib, Shuhaili, et al.
Published: (2010)
Social media usage and awareness of cyber security issues among youths
by: Ahmad, F., et al.
Published: (2020)
by: Ahmad, F., et al.
Published: (2020)
Securing information system & computer security self-efficacy effect
by: Al-Shawabkeh, Mahmoud
Published: (2013)
by: Al-Shawabkeh, Mahmoud
Published: (2013)
Information security for professional counseling in organization
by: Mohamed, Abdikadir Yusuf, et al.
Published: (2016)
by: Mohamed, Abdikadir Yusuf, et al.
Published: (2016)
A comparative review of ISMS implementation based on ISO 27000 Series in organizations of different business sectors
by: Hamdi, Zaidatulnajla, et al.
Published: (2019)
by: Hamdi, Zaidatulnajla, et al.
Published: (2019)
Toward managing security cost for healthcare information
by: Hameed, Shihab A., et al.
Published: (2012)
by: Hameed, Shihab A., et al.
Published: (2012)
Toward user awareness and acceptance of Sudan E-government: adoption and security perspective
by: Khalifa, Othman Omran, et al.
Published: (2016)
by: Khalifa, Othman Omran, et al.
Published: (2016)
A case analysis of securing organisations against information leakage through online social networking
by: Abdul Molok, Nurul Nuha, et al.
Published: (2018)
by: Abdul Molok, Nurul Nuha, et al.
Published: (2018)
Sharing of attacks information across clouds for improving security:a conceptual framework
by: Waqas, Ahmad, et al.
Published: (2014)
by: Waqas, Ahmad, et al.
Published: (2014)
Perception analysis of social networks’ privacy policy: Instagram as a case study
by: Talib, Shuhaili, et al.
Published: (2014)
by: Talib, Shuhaili, et al.
Published: (2014)
Edward Snowden disclosures turn the fears of surveillance into reality: the impact and transformation in information security
by: Mohamed Mahmoud, Fatimetou Zahra, et al.
Published: (2016)
by: Mohamed Mahmoud, Fatimetou Zahra, et al.
Published: (2016)
A conceptual framework for measuring the acceptance of pervasive learning
by: Koondhar, Muhammad Yaqoob, et al.
Published: (2015)
by: Koondhar, Muhammad Yaqoob, et al.
Published: (2015)
Analysis determinants of social media acceptance in higher educational institution of Pakistan
by: Raza, Ali, et al.
Published: (2018)
by: Raza, Ali, et al.
Published: (2018)
A framework for for the analysis of determinants of social media acceptance in higher educational institutions of Pakistan
by: Soomro, Ali Raza, et al.
Published: (2015)
by: Soomro, Ali Raza, et al.
Published: (2015)
Artifact evaluation in information systems design science research: social constructivism environment
by: Ataie, Farib, et al.
Published: (2017)
by: Ataie, Farib, et al.
Published: (2017)
A methodology for modelling and analysis of secure systems using security patterns and mitigation use cases
by: Maher, Zulfikar Ahmad, et al.
Published: (2018)
by: Maher, Zulfikar Ahmad, et al.
Published: (2018)
Predicting the fraud volume in personal computer using different web browsers
by: Z, Nuha, et al.
Published: (2017)
by: Z, Nuha, et al.
Published: (2017)
User awareness in the authenticity of mobile Quran apps
by: Talib, Shuhaili, et al.
Published: (2016)
by: Talib, Shuhaili, et al.
Published: (2016)
Mobile security and privacy in smartphone technology
by: Ibrahim, Mohamed, et al.
Published: (2015)
by: Ibrahim, Mohamed, et al.
Published: (2015)
Encryption method for SCADA security enhancement
by: Shahzad, Aamir, et al.
Published: (2014)
by: Shahzad, Aamir, et al.
Published: (2014)
Empirical investigation of the factors influencing the usage mobile government services: case study of Saudi Arabia
by: Zamzami, Ikhlas, et al.
Published: (2016)
by: Zamzami, Ikhlas, et al.
Published: (2016)
Taxonomies of User Experience (UX) evaluation methods
by: Sugu, Rajeshkumar, et al.
Published: (2013)
by: Sugu, Rajeshkumar, et al.
Published: (2013)
Predicting the fraud volume in the advent of internet enabled handheld devices
by: Zammarah, Nuha Abdullah, et al.
Published: (2015)
by: Zammarah, Nuha Abdullah, et al.
Published: (2015)
A secure authentication scheme for bluetooth connection
by: Diallo, Alhassane Saliou, et al.
Published: (2014)
by: Diallo, Alhassane Saliou, et al.
Published: (2014)
Security and privacy for IoT and fog computing paradigm
by: Rauf, Abdul, et al.
Published: (2018)
by: Rauf, Abdul, et al.
Published: (2018)
Evaluation of university teaching hospital websites in Nigeria
by: Mahmud, Murni, et al.
Published: (2013)
by: Mahmud, Murni, et al.
Published: (2013)
The future of data privacy and security concerns in
Internet of things
by: Solangi, Zulfiqar Ali, et al.
Published: (2018)
by: Solangi, Zulfiqar Ali, et al.
Published: (2018)
Netnography approach for UX research
by: Hussein, Idyawati, et al.
Published: (2016)
by: Hussein, Idyawati, et al.
Published: (2016)
Robust and secure image steganography based on elliptic curve cryptography
by: Ahmed, Diaa Eldein Mustafa, et al.
Published: (2014)
by: Ahmed, Diaa Eldein Mustafa, et al.
Published: (2014)
Bayesian signaling game based efficient security model for MANETs
by: Olanrewaju, Rashidah Funke, et al.
Published: (2020)
by: Olanrewaju, Rashidah Funke, et al.
Published: (2020)
Offline OTP based solution for secure internet banking access
by: Khan, Burhan ul Islam, et al.
Published: (2019)
by: Khan, Burhan ul Islam, et al.
Published: (2019)
Web user' knowledge and their behavior towards security threats and vulnerabilities
by: Aldossary, Alia Ahmed, et al.
Published: (2016)
by: Aldossary, Alia Ahmed, et al.
Published: (2016)
Mobility based surveillance model to facilitate security of individuals’ properties
by: Hameed, Shihab A.
Published: (2013)
by: Hameed, Shihab A.
Published: (2013)
MARKCLOUD - Software for data confidentiality and security in cloud computing environments
by: Olanrewaju, Rashidah Funke, et al.
Published: (2014)
by: Olanrewaju, Rashidah Funke, et al.
Published: (2014)
Deployment of new dynamic cryptography buffer for SCADA security enhancement
by: Aamir, Shahzad, et al.
Published: (2014)
by: Aamir, Shahzad, et al.
Published: (2014)
Citizen experience towards humanizing digital government: a case in Malaysia
by: Hussein, Idyawati, et al.
Published: (2017)
by: Hussein, Idyawati, et al.
Published: (2017)
Critical socio-technical issues surrounding mobile computing
by: Mohamed, Norshidah, et al.
Published: (2016)
by: Mohamed, Norshidah, et al.
Published: (2016)
Similar Items
-
Exploring the factors influencing top management involvement and participation in information security
by: Abdul Munir, Rufizah, et al.
Published: (2017) -
Responsibility-value alignment in information security governance
by: Abdul Munir, Rufizah, et al.
Published: (2018) -
Social networks privacy policy awareness among undergraduate students: the case of Twitter
by: Talib, Shuhaili, et al.
Published: (2014) -
An analysis of information security awareness within home and work environments
by: Talib, Shuhaili, et al.
Published: (2010) -
Social media usage and awareness of cyber security issues among youths
by: Ahmad, F., et al.
Published: (2020)