Mobile Quran app security vulnerabilities
The security threats and vulnerabilities of mobile Quran appli-cations can be viewed from both developers’ and a service perspective. Sim-ilar to other apps categories like entertainment apps, games apps, banking apps and many others, understanding the threats and vulnerabilities of mobile Quran app...
| Main Authors: | Talib, Shuhaili, Mahmud, Murni, Abd Rahman, Emilia Sarah, Songib, Anis Suraya, Ibrahim, Adamu Abubakar |
|---|---|
| Format: | Proceeding Paper |
| Language: | English English |
| Published: |
School of Computing, Universiti Utara Malaysia
2015
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/46377/ http://irep.iium.edu.my/46377/1/46377_edited.pdf http://irep.iium.edu.my/46377/4/46377_Mobile%20Quran%20app%20security%20vulnerabilities_WOS.pdf |
Similar Items
Mobile Quran app security vulnerabilities
by: Talib, Shuhaili, et al.
Published: (2015)
by: Talib, Shuhaili, et al.
Published: (2015)
User awareness in the authenticity of mobile Quran apps
by: Talib, Shuhaili, et al.
Published: (2016)
by: Talib, Shuhaili, et al.
Published: (2016)
Web users’ knowledge and their behavior towards security threats and vulnerabilities
by: Aldossary, Alia Ahmed, et al.
Published: (2016)
by: Aldossary, Alia Ahmed, et al.
Published: (2016)
A study of the use of mobile phones by older persons
by: Kurniawan, Sri, et al.
Published: (2006)
by: Kurniawan, Sri, et al.
Published: (2006)
An evaluation of mobile Quran apps
by: Mahmud, Murni, et al.
Published: (2015)
by: Mahmud, Murni, et al.
Published: (2015)
A mixed method for evaluating input devices with older persons
by: Mahmud, Murni
Published: (2006)
by: Mahmud, Murni
Published: (2006)
Information security aligned to enterprise management
by: Abdullah, Istikoma, et al.
Published: (2015)
by: Abdullah, Istikoma, et al.
Published: (2015)
Evaluating the accessibility and visibility of Quranic websites
by: Abu Bakar, Ahmad Bakeri
Published: (2010)
by: Abu Bakar, Ahmad Bakeri
Published: (2010)
Unintentional information security behavior from the Qur’an
and Hadith’s perspective
by: Barzak, Omar Mokhles, et al.
Published: (2016)
by: Barzak, Omar Mokhles, et al.
Published: (2016)
Information security in ICT from an Islamic
perspective
by: Ibrahim, Jamaludin, et al.
Published: (2014)
by: Ibrahim, Jamaludin, et al.
Published: (2014)
Involving Psychometric Tests for Input Device Evaluation with Older People
by: Mahmud, Murni, et al.
Published: (2005)
by: Mahmud, Murni, et al.
Published: (2005)
Unintentional information security behavior from the Qur’an and hadith’s perspective
by: Barzak, Omar Mokhles, et al.
Published: (2015)
by: Barzak, Omar Mokhles, et al.
Published: (2015)
Impact of NSA-PRISM to National Information Security
Strategy & Policy
by: Khudayer, Aiesha Y., et al.
Published: (2014)
by: Khudayer, Aiesha Y., et al.
Published: (2014)
Steganography: a review of information security research and development in Muslim world
by: Yunus, Yunura Azura, et al.
Published: (2013)
by: Yunus, Yunura Azura, et al.
Published: (2013)
An information retrieval system for Quranic texts: a proposed system design
by: Noordin, Mohamad Fauzan, et al.
Published: (2006)
by: Noordin, Mohamad Fauzan, et al.
Published: (2006)
The mediating effect of teamwork toward organizational readiness for Business Intelligence (BI) implementation
by: Anjariny, Ahmed H., et al.
Published: (2016)
by: Anjariny, Ahmed H., et al.
Published: (2016)
Evaluation of users' awareness and their reaction on information security
by: Zeki, Akram M., et al.
Published: (2016)
by: Zeki, Akram M., et al.
Published: (2016)
HCI practice in Malaysia : a reflection of ICT professionals' perspective
by: Hussein, Idyawati, et al.
Published: (2010)
by: Hussein, Idyawati, et al.
Published: (2010)
The role of IT consulting practice: a successful enterprise mobility solution
by: Fakhri, Nurul Fahimah, et al.
Published: (2015)
by: Fakhri, Nurul Fahimah, et al.
Published: (2015)
Employing information security awareness to minimize over-exposure of average Internet user on social networks
by: Binden, Worawit, et al.
Published: (2014)
by: Binden, Worawit, et al.
Published: (2014)
Perceptions on interaction design in Malaysia
by: Hussein, Idayawati, et al.
Published: (2009)
by: Hussein, Idayawati, et al.
Published: (2009)
Why thinking aloud matters for usability evaluation?
by: Abu Seman, Esmadi Abu, et al.
Published: (2010)
by: Abu Seman, Esmadi Abu, et al.
Published: (2010)
Preliminary investigation of Islamic websites design & content feature: A heuristic evaluation from user perspective
by: Aliyu, Mansur, et al.
Published: (2010)
by: Aliyu, Mansur, et al.
Published: (2010)
User experience:assesing the effectiveness of internet booking service
by: Hussein, Idyawati, et al.
Published: (2010)
by: Hussein, Idyawati, et al.
Published: (2010)
User Experience Design (UXD): a survey of user interface development practices in Malaysia
by: Hussein, Idyawati, et al.
Published: (2012)
by: Hussein, Idyawati, et al.
Published: (2012)
A comparative longitudinal study of non-verbal mouse pointer
by: Mahmud, Murni, et al.
Published: (2007)
by: Mahmud, Murni, et al.
Published: (2007)
Super Authentication Security System (SASS) to Malaysian community for safety management
by: Ahmad Dahlan, Abdul Rahman, et al.
Published: (2011)
by: Ahmad Dahlan, Abdul Rahman, et al.
Published: (2011)
The extreme doubly stochastic quadratic operators on two dimensional simplex
by: Abdulghafor, Rawad Abdulkhaleq Abdulmolla, et al.
Published: (2016)
by: Abdulghafor, Rawad Abdulkhaleq Abdulmolla, et al.
Published: (2016)
Non-speech input and speech recognition for real-time control of computer games
by: Sporka, Adam J, et al.
Published: (2006)
by: Sporka, Adam J, et al.
Published: (2006)
Proposing a framework for evaluating content and design of religion-based : Islamic websites
by: Mahmud, Murni, et al.
Published: (2011)
by: Mahmud, Murni, et al.
Published: (2011)
Content evaluation of Islamic websites
by: Mahmud, Murni, et al.
Published: (2012)
by: Mahmud, Murni, et al.
Published: (2012)
Computer-supported cooperative work in Malaysian tourism industry
by: Abd Aziz, Puteri Noor Ruzanna, et al.
Published: (2013)
by: Abd Aziz, Puteri Noor Ruzanna, et al.
Published: (2013)
Evaluating heuristic for EG portal design model
by: Mahmud, Murni, et al.
Published: (2010)
by: Mahmud, Murni, et al.
Published: (2010)
Mobile phone appropriation of students and staff at an institution of higher learning
by: Abdul Karim, Nor Shariza, et al.
Published: (2010)
by: Abdul Karim, Nor Shariza, et al.
Published: (2010)
A conceptual model of customer relationship management alignment
by: Mohamed, Norshidah, et al.
Published: (2012)
by: Mohamed, Norshidah, et al.
Published: (2012)
Students' intention to use in-app advertisements in Pakistan
by: Qureshi, Qasim Ali
Published: (2022)
by: Qureshi, Qasim Ali
Published: (2022)
The evaluation of information security of hospital information system (his) using cobit 5 framework: case study at Soreang Hospital, Indonesia
by: Nistrina, Khilda
Published: (2019)
by: Nistrina, Khilda
Published: (2019)
Durian Farm Threats Identification through Convolution Neural
Networks and Multimedia Mobile Development
by: Yusoff, Aiman, et al.
by: Yusoff, Aiman, et al.
A survey of usability awareness in IT industry
by: Hussein, Idyawati, et al.
Published: (2011)
by: Hussein, Idyawati, et al.
Published: (2011)
Critical information security challenges: an appraisal
by: Shuhaib Mir, Mohammad, et al.
Published: (2013)
by: Shuhaib Mir, Mohammad, et al.
Published: (2013)
Similar Items
-
Mobile Quran app security vulnerabilities
by: Talib, Shuhaili, et al.
Published: (2015) -
User awareness in the authenticity of mobile Quran apps
by: Talib, Shuhaili, et al.
Published: (2016) -
Web users’ knowledge and their behavior towards security threats and vulnerabilities
by: Aldossary, Alia Ahmed, et al.
Published: (2016) -
A study of the use of mobile phones by older persons
by: Kurniawan, Sri, et al.
Published: (2006) -
An evaluation of mobile Quran apps
by: Mahmud, Murni, et al.
Published: (2015)