Information security aligned to enterprise management
This paper illustrates business aligned security approach as a key element of an enterprises’s overall business strategy. Business information security is a crucial concern in enterprise management for risk handling operation. The modern era of technology security for businesses is...
| Main Authors: | Abdullah, Istikoma, Fakhri, Nurul Fahimah, Mastoi, Qurat-ul-ain, Ibrahim, Jamaludin |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
medi+WORLD Internationa
2015
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/45401/ http://irep.iium.edu.my/45401/1/2015-1-Information_Security_Aligned_To_Enterprise_Management.pdf |
Similar Items
The role of IT consulting practice: a successful enterprise mobility solution
by: Fakhri, Nurul Fahimah, et al.
Published: (2015)
by: Fakhri, Nurul Fahimah, et al.
Published: (2015)
Information security in ICT from an Islamic
perspective
by: Ibrahim, Jamaludin, et al.
Published: (2014)
by: Ibrahim, Jamaludin, et al.
Published: (2014)
Enterprise information architecture of a Malaysian institute of higher learning management information system: an experience
by: Suhaimi, Mohd Adam, et al.
Published: (2014)
by: Suhaimi, Mohd Adam, et al.
Published: (2014)
Steganography: a review of information security research and development in Muslim world
by: Yunus, Yunura Azura, et al.
Published: (2013)
by: Yunus, Yunura Azura, et al.
Published: (2013)
Impact of NSA-PRISM to National Information Security
Strategy & Policy
by: Khudayer, Aiesha Y., et al.
Published: (2014)
by: Khudayer, Aiesha Y., et al.
Published: (2014)
A conceptual model of customer relationship management alignment
by: Mohamed, Norshidah, et al.
Published: (2012)
by: Mohamed, Norshidah, et al.
Published: (2012)
Employing information security awareness to minimize over-exposure of average Internet user on social networks
by: Binden, Worawit, et al.
Published: (2014)
by: Binden, Worawit, et al.
Published: (2014)
Evaluation of users' awareness and their reaction on information security
by: Zeki, Akram M., et al.
Published: (2016)
by: Zeki, Akram M., et al.
Published: (2016)
Managers' perception of Information Management (IM) and Knowledge Management (KM) and the role of information and knowledge managers
by: Abdul Karim, Nor Shahriza, et al.
Published: (2003)
by: Abdul Karim, Nor Shahriza, et al.
Published: (2003)
The transformation of an agriculture to an industrial-based economy through crowd sourcing in Malaysia
by: Abdullah, Istikoma, et al.
Published: (2015)
by: Abdullah, Istikoma, et al.
Published: (2015)
Critical information security challenges: an appraisal
by: Shuhaib Mir, Mohammad, et al.
Published: (2013)
by: Shuhaib Mir, Mohammad, et al.
Published: (2013)
Super Authentication Security System (SASS) to Malaysian community for safety management
by: Ahmad Dahlan, Abdul Rahman, et al.
Published: (2011)
by: Ahmad Dahlan, Abdul Rahman, et al.
Published: (2011)
Potential use of data mining techniques in information technology consulting operations
by: Qadri, Mehran, et al.
Published: (2015)
by: Qadri, Mehran, et al.
Published: (2015)
The current state of information management and knowledge management in the Malaysian construction industry
by: Noordin, Mohamad Fauzan, et al.
Published: (2012)
by: Noordin, Mohamad Fauzan, et al.
Published: (2012)
The evaluation of information security of hospital information system (his) using cobit 5 framework: case study at Soreang Hospital, Indonesia
by: Nistrina, Khilda
Published: (2019)
by: Nistrina, Khilda
Published: (2019)
Mobile Quran app security vulnerabilities
by: Talib, Shuhaili, et al.
Published: (2015)
by: Talib, Shuhaili, et al.
Published: (2015)
Real time information sharing and remote sensing for disaster management and prevention
by: Ahmad Dahlan, Abdul Rahman, et al.
Published: (2011)
by: Ahmad Dahlan, Abdul Rahman, et al.
Published: (2011)
Information technology: a tool for effective SME material management practices
by: Ibrahim, Magaji Umar, et al.
Published: (2019)
by: Ibrahim, Magaji Umar, et al.
Published: (2019)
AGW 616 - MANAGEMENT INFORMATION SYSTEM APRIL 08.
by: PPP, Pusat Pengajian Pengurusan
Published: (2008)
by: PPP, Pusat Pengajian Pengurusan
Published: (2008)
Understanding components of IT risks and enterprise risk management
by: Ahlan, Abdul Rahman, et al.
Published: (2011)
by: Ahlan, Abdul Rahman, et al.
Published: (2011)
Web users’ knowledge and their behavior towards security threats and vulnerabilities
by: Aldossary, Alia Ahmed, et al.
Published: (2016)
by: Aldossary, Alia Ahmed, et al.
Published: (2016)
The knowledge management strategies used as a tool within and through strategic consulting firms to increase the organisational performance
by: Mohamed Mahmoud, Fatimetou Zahra, et al.
Published: (2015)
by: Mohamed Mahmoud, Fatimetou Zahra, et al.
Published: (2015)
Attitude towards information privacy issues among students of IIUM
by: Mohamud, Ibrahim Kalif, et al.
Published: (2016)
by: Mohamud, Ibrahim Kalif, et al.
Published: (2016)
Collaboration, communities, well-beings and information systems
Published: (2011)
Published: (2011)
Cloud computing: cloud adoption in professional practice
by: Nazri, Nadhirah, et al.
Published: (2015)
by: Nazri, Nadhirah, et al.
Published: (2015)
Using socio-ecological model to inform the design of persuasive applications
by: Mohd Mohadis, Hazwani, et al.
Published: (2015)
by: Mohd Mohadis, Hazwani, et al.
Published: (2015)
Information technology issues and applications in Malaysia : a collection of articles.
Published: (2011)
Published: (2011)
The inclination of Information and Communication Technology (ICT) students towards entrepreneurship
by: Mior Nazri, Mior Nasir, et al.
Published: (2014)
by: Mior Nazri, Mior Nasir, et al.
Published: (2014)
Management disaster for charity donation system to Malaysian community
by: Ahmad Dahlan, Abdul Rahman, et al.
Published: (2011)
by: Ahmad Dahlan, Abdul Rahman, et al.
Published: (2011)
Seeking access to health information: the dilemma of woman community in rural Malaysia
by: Abu Bakar, Ahmad Bakeri, et al.
Published: (2009)
by: Abu Bakar, Ahmad Bakeri, et al.
Published: (2009)
In search of a model to explain digital divide in information technology organizations
by: Mohamed, Norshidah, et al.
Published: (2009)
by: Mohamed, Norshidah, et al.
Published: (2009)
An information retrieval system for Quranic texts: a proposed system design
by: Noordin, Mohamad Fauzan, et al.
Published: (2006)
by: Noordin, Mohamad Fauzan, et al.
Published: (2006)
Information technology club management system
by: Ibrahim, Mohd Shukri, et al.
Published: (2018)
by: Ibrahim, Mohd Shukri, et al.
Published: (2018)
Evaluating the effect of using IP version and physical media on the ICMP throughput of a LAN
by: Dar, Humaira, et al.
Published: (2013)
by: Dar, Humaira, et al.
Published: (2013)
Malaysia National Library and knowledge management initiative
by: Yaacob, Nurul Ibtisam, et al.
Published: (2011)
by: Yaacob, Nurul Ibtisam, et al.
Published: (2011)
Positive impact of smartphone application: whatsapp &
facebook for online business
by: Ibrahim, Jamaludin, et al.
Published: (2014)
by: Ibrahim, Jamaludin, et al.
Published: (2014)
Towards successful improvement of students’ residential management processes using the enterprise architecture maturity model
by: Moses, Golooba, et al.
Published: (2012)
by: Moses, Golooba, et al.
Published: (2012)
How much privacy we still have on social network?
by: Chewae, Mafaisu, et al.
Published: (2015)
by: Chewae, Mafaisu, et al.
Published: (2015)
IslamicGRID and knowledge management
by: Abdul Wahid, Al-Abrar, et al.
Published: (2011)
by: Abdul Wahid, Al-Abrar, et al.
Published: (2011)
Information security threat avoidance behavior: an
empirical investigation
by: Ling, Zhixuan
Published: (2019)
by: Ling, Zhixuan
Published: (2019)
Similar Items
-
The role of IT consulting practice: a successful enterprise mobility solution
by: Fakhri, Nurul Fahimah, et al.
Published: (2015) -
Information security in ICT from an Islamic
perspective
by: Ibrahim, Jamaludin, et al.
Published: (2014) -
Enterprise information architecture of a Malaysian institute of higher learning management information system: an experience
by: Suhaimi, Mohd Adam, et al.
Published: (2014) -
Steganography: a review of information security research and development in Muslim world
by: Yunus, Yunura Azura, et al.
Published: (2013) -
Impact of NSA-PRISM to National Information Security
Strategy & Policy
by: Khudayer, Aiesha Y., et al.
Published: (2014)