Information security in ICT from an Islamic perspective
The primary objective of the study is to link, Islamic work ethics to computer use ethics. This paper will give intention and look at; to review the underlying concepts of ethics and Islamic ethics for computer usage. To find out some extremely related ethical issues of computer use such security an...
| Main Authors: | Ibrahim, Jamaludin, Ahmed Mohamed, Fatima, Abdulaziz, Nuha, Altaf Haqani, Alyami Effra |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
International Journal of Science and Research
2014
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/45387/ http://irep.iium.edu.my/45387/2/2014-Infosec_in_ICT_from_Islamic_Perspective-www.ijsr.net_archive_v3i12_U1VCMTQ1MzA%3D.pdf |
Similar Items
Review of knowledge management in higher education
by: Altaf Haqani, Alyami Effra, et al.
Published: (2015)
by: Altaf Haqani, Alyami Effra, et al.
Published: (2015)
Strategy and policy statements on green ICT : an Islamic perspective.
by: Hameed, Shihab A.
Published: (2011)
by: Hameed, Shihab A.
Published: (2011)
Information security aligned to enterprise management
by: Abdullah, Istikoma, et al.
Published: (2015)
by: Abdullah, Istikoma, et al.
Published: (2015)
Steganography: a review of information security research and development in Muslim world
by: Yunus, Yunura Azura, et al.
Published: (2013)
by: Yunus, Yunura Azura, et al.
Published: (2013)
Impact of NSA-PRISM to National Information Security
Strategy & Policy
by: Khudayer, Aiesha Y., et al.
Published: (2014)
by: Khudayer, Aiesha Y., et al.
Published: (2014)
Employing information security awareness to minimize over-exposure of average Internet user on social networks
by: Binden, Worawit, et al.
Published: (2014)
by: Binden, Worawit, et al.
Published: (2014)
The inclination of Information and Communication Technology (ICT) students towards entrepreneurship
by: Mior Nazri, Mior Nasir, et al.
Published: (2014)
by: Mior Nazri, Mior Nasir, et al.
Published: (2014)
HCI practice in Malaysia : a reflection of ICT professionals' perspective
by: Hussein, Idyawati, et al.
Published: (2010)
by: Hussein, Idyawati, et al.
Published: (2010)
Evaluation of users' awareness and their reaction on information security
by: Zeki, Akram M., et al.
Published: (2016)
by: Zeki, Akram M., et al.
Published: (2016)
Critical information security challenges: an appraisal
by: Shuhaib Mir, Mohammad, et al.
Published: (2013)
by: Shuhaib Mir, Mohammad, et al.
Published: (2013)
Potential use of data mining techniques in information technology consulting operations
by: Qadri, Mehran, et al.
Published: (2015)
by: Qadri, Mehran, et al.
Published: (2015)
Young learners' use of ICT facilities and the development of their language skills
by: Mat Daud, Nuraihan
Published: (2012)
by: Mat Daud, Nuraihan
Published: (2012)
The evaluation of information security of hospital information system (his) using cobit 5 framework: case study at Soreang Hospital, Indonesia
by: Nistrina, Khilda
Published: (2019)
by: Nistrina, Khilda
Published: (2019)
Mobile Quran app security vulnerabilities
by: Talib, Shuhaili, et al.
Published: (2015)
by: Talib, Shuhaili, et al.
Published: (2015)
Web users’ knowledge and their behavior towards security threats and vulnerabilities
by: Aldossary, Alia Ahmed, et al.
Published: (2016)
by: Aldossary, Alia Ahmed, et al.
Published: (2016)
Information security policy perceived compliance among staff in Palestine universities: An empirical pilot study
by: Mohammad Iriqat, Yousef, et al.
Published: (2019)
by: Mohammad Iriqat, Yousef, et al.
Published: (2019)
Motivation to learn ICT among senior public service officials in Malaysia : A conceptual framework in Khalid Soliman
by: Hussein, Ramlah, et al.
Published: (2009)
by: Hussein, Ramlah, et al.
Published: (2009)
Preliminary investigation of Islamic websites design & content feature: A heuristic evaluation from user perspective
by: Aliyu, Mansur, et al.
Published: (2010)
by: Aliyu, Mansur, et al.
Published: (2010)
The knowledge management strategies used as a tool within and through strategic consulting firms to increase the organisational performance
by: Mohamed Mahmoud, Fatimetou Zahra, et al.
Published: (2015)
by: Mohamed Mahmoud, Fatimetou Zahra, et al.
Published: (2015)
Super Authentication Security System (SASS) to Malaysian community for safety management
by: Ahmad Dahlan, Abdul Rahman, et al.
Published: (2011)
by: Ahmad Dahlan, Abdul Rahman, et al.
Published: (2011)
Attitude towards information privacy issues among students of IIUM
by: Mohamud, Ibrahim Kalif, et al.
Published: (2016)
by: Mohamud, Ibrahim Kalif, et al.
Published: (2016)
Transformational and Transactional Leadership on Information Communication Technology (ICT) Implementation in UUM an International UUM Postgraduate Perspectives
by: Dakhil, Mohamed Hamed
Published: (2008)
by: Dakhil, Mohamed Hamed
Published: (2008)
Enterprise information architecture of a Malaysian institute of higher learning management information system: an experience
by: Suhaimi, Mohd Adam, et al.
Published: (2014)
by: Suhaimi, Mohd Adam, et al.
Published: (2014)
Managers' perception of Information Management (IM) and Knowledge Management (KM) and the role of information and knowledge managers
by: Abdul Karim, Nor Shahriza, et al.
Published: (2003)
by: Abdul Karim, Nor Shahriza, et al.
Published: (2003)
In search of a model to explain digital divide in information technology organizations
by: Mohamed, Norshidah, et al.
Published: (2009)
by: Mohamed, Norshidah, et al.
Published: (2009)
Islamic perspective on information & communication technology and education
by: Noordin, Mohamad Fauzan
Published: (2018)
by: Noordin, Mohamad Fauzan
Published: (2018)
The Use of Information and Communication Technology (ICT) Tools in Decision Making
by: Noreha, Mohamed Yusof
Published: (2003)
by: Noreha, Mohamed Yusof
Published: (2003)
Collaboration, communities, well-beings and information systems
Published: (2011)
Published: (2011)
Cloud computing: cloud adoption in professional practice
by: Nazri, Nadhirah, et al.
Published: (2015)
by: Nazri, Nadhirah, et al.
Published: (2015)
Using socio-ecological model to inform the design of persuasive applications
by: Mohd Mohadis, Hazwani, et al.
Published: (2015)
by: Mohd Mohadis, Hazwani, et al.
Published: (2015)
Information technology issues and applications in Malaysia : a collection of articles.
Published: (2011)
Published: (2011)
The role of IT consulting practice: a successful enterprise mobility solution
by: Fakhri, Nurul Fahimah, et al.
Published: (2015)
by: Fakhri, Nurul Fahimah, et al.
Published: (2015)
Seeking access to health information: the dilemma of woman community in rural Malaysia
by: Abu Bakar, Ahmad Bakeri, et al.
Published: (2009)
by: Abu Bakar, Ahmad Bakeri, et al.
Published: (2009)
The current state of information management and knowledge management in the Malaysian construction industry
by: Noordin, Mohamad Fauzan, et al.
Published: (2012)
by: Noordin, Mohamad Fauzan, et al.
Published: (2012)
Real time information sharing and remote sensing for disaster management and prevention
by: Ahmad Dahlan, Abdul Rahman, et al.
Published: (2011)
by: Ahmad Dahlan, Abdul Rahman, et al.
Published: (2011)
An information retrieval system for Quranic texts: a proposed system design
by: Noordin, Mohamad Fauzan, et al.
Published: (2006)
by: Noordin, Mohamad Fauzan, et al.
Published: (2006)
ICT and Islam
by: Noordin, Mohamad Fauzan
Published: (2009)
by: Noordin, Mohamad Fauzan
Published: (2009)
A case analysis of securing organisations against information leakage through online social networking
by: Abdul Molok, Nurul Nuha, et al.
Published: (2018)
by: Abdul Molok, Nurul Nuha, et al.
Published: (2018)
Content evaluation of Islamic websites
by: Mahmud, Murni, et al.
Published: (2012)
by: Mahmud, Murni, et al.
Published: (2012)
IslamicGRID and knowledge management
by: Abdul Wahid, Al-Abrar, et al.
Published: (2011)
by: Abdul Wahid, Al-Abrar, et al.
Published: (2011)
Similar Items
-
Review of knowledge management in higher education
by: Altaf Haqani, Alyami Effra, et al.
Published: (2015) -
Strategy and policy statements on green ICT : an Islamic perspective.
by: Hameed, Shihab A.
Published: (2011) -
Information security aligned to enterprise management
by: Abdullah, Istikoma, et al.
Published: (2015) -
Steganography: a review of information security research and development in Muslim world
by: Yunus, Yunura Azura, et al.
Published: (2013) -
Impact of NSA-PRISM to National Information Security
Strategy & Policy
by: Khudayer, Aiesha Y., et al.
Published: (2014)