Risk assessment model for organizational information security
Information security risk assessment (RA) plays an important role in the organization’s future strategic planning. Generally there are two types of RA approaches: quantitative RA and qualitative RA. The quantitative RA is an objective study of the risk that use numerical data. On the other hand, the...
| Main Authors: | Dioubate, Balla Mousa, Abdul Molok, Nurul Nuha, Talib, Shuhaili, Md. Tap, Abu Osman |
|---|---|
| Format: | Article |
| Language: | English English |
| Published: |
Asian Research Publishing Network (ARPN)
2015
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/47335/ http://irep.iium.edu.my/47335/1/Dioubate%2C_Abdul_Molok%2C_Talib_%26_Md_Tap_-_Risk_assessment_model_for_organizational_information_security.pdf http://irep.iium.edu.my/47335/4/47335_Risk%20assessment%20model_SCOPUS.pdf |
Similar Items
Disclosure of organizational information by employees on Facebook: Looking at the potential for information security risks
by: Abdul Molok , Nurul Nuha, et al.
Published: (2011)
by: Abdul Molok , Nurul Nuha, et al.
Published: (2011)
Disclosure of organizational information on social media: Perspectives from security managers
by: Abdul Molok , Nurul Nuha, et al.
Published: (2013)
by: Abdul Molok , Nurul Nuha, et al.
Published: (2013)
Exploring the use of online social networking among employees in Malaysian organizations: looking potential threats to information security
by: Abdul Molok , Nurul Nuha
Published: (2013)
by: Abdul Molok , Nurul Nuha
Published: (2013)
Understanding the factors of information leakage through online social networking to safeguard organizational information
by: Abdul Molok, Nurul Nuha, et al.
Published: (2010)
by: Abdul Molok, Nurul Nuha, et al.
Published: (2010)
The information systems integration plan: for satellite remote sensing subsystems
by: Abdul Molok , Nurul Nuha
Published: (2010)
by: Abdul Molok , Nurul Nuha
Published: (2010)
Unintentional information security behavior from the Qur’an
and Hadith’s perspective
by: Barzak, Omar Mokhles, et al.
Published: (2016)
by: Barzak, Omar Mokhles, et al.
Published: (2016)
Unintentional information security behavior from the Qur’an and hadith’s perspective
by: Barzak, Omar Mokhles, et al.
Published: (2015)
by: Barzak, Omar Mokhles, et al.
Published: (2015)
Inadvertent Leakage of Organisational Information through Online Social Networking
by: Abdul Molok, Nurul Nuha
Published: (2014)
by: Abdul Molok, Nurul Nuha
Published: (2014)
Exploring the use of online social networking by employees: Looking at the potential for information leakage
by: Abdul Molok, Nurul Nuha, et al.
Published: (2011)
by: Abdul Molok, Nurul Nuha, et al.
Published: (2011)
Information leakage through online social networking: Opening the doorway for advanced persistence threats
by: Abdul Molok , Nurul Nuha, et al.
Published: (2010)
by: Abdul Molok , Nurul Nuha, et al.
Published: (2010)
Information Leakage through online social networking: opening the doorway for advanced persistence threats
by: Abdul Molok , Nurul Nuha, et al.
Published: (2011)
by: Abdul Molok , Nurul Nuha, et al.
Published: (2011)
Information security policy perceived compliance among staff in Palestine universities: An empirical pilot study
by: Mohammad Iriqat, Yousef, et al.
Published: (2019)
by: Mohammad Iriqat, Yousef, et al.
Published: (2019)
Online social networking: a source of intelligence for advanced persistent threats
by: Abdul Molok , Nurul Nuha, et al.
Published: (2012)
by: Abdul Molok , Nurul Nuha, et al.
Published: (2012)
A case analysis of securing organisations against information leakage through online social networking
by: Abdul Molok, Nurul Nuha, et al.
Published: (2018)
by: Abdul Molok, Nurul Nuha, et al.
Published: (2018)
Information security awareness in university: maintaining learnability, performance and adaptability through roles of responsibility
by: Ahlan, Abdul Rahman, et al.
Published: (2011)
by: Ahlan, Abdul Rahman, et al.
Published: (2011)
Risk Management in Parallel Projects: Analysis & Best Practices and Implications to Generic DBrain (gDBrain) Research Project
by: Ibrahim, Jamaludin, et al.
Published: (2013)
by: Ibrahim, Jamaludin, et al.
Published: (2013)
Socio-technical mitigation effort to combat cyber propaganda: a systematic literature mapping
by: Maseri, Aimi Nadrah, et al.
Published: (2020)
by: Maseri, Aimi Nadrah, et al.
Published: (2020)
Information security and mutual trust as determining factors for information technology outsourcing success
by: Shittu, Abdul Jaleel Kehinde, et al.
Published: (2012)
by: Shittu, Abdul Jaleel Kehinde, et al.
Published: (2012)
Empirical analysis: knowledge management, the human focus and intellectual capital for innovation in smart/future universities
by: Alyami, Nuha, et al.
Published: (2015)
by: Alyami, Nuha, et al.
Published: (2015)
Optimising information systems in business
by: Ahmad Dahlan, Abdul Rahman, et al.
Published: (2016)
by: Ahmad Dahlan, Abdul Rahman, et al.
Published: (2016)
Research framework on KMS use: an approach anchored on the interplays between engineered and emergent organizational factors
by: Oyebisi, Ishaq Oyefolahan, et al.
Published: (2013)
by: Oyebisi, Ishaq Oyefolahan, et al.
Published: (2013)
The relative success of alternative approaches to strategic information systems: an empirical analysis
by: Doherty, Neil. F, et al.
Published: (1999)
by: Doherty, Neil. F, et al.
Published: (1999)
Information system outsourcing: motivations and the implementation strategy in a Malaysian bank
by: Suhaimi, Mohd Adam, et al.
Published: (2007)
by: Suhaimi, Mohd Adam, et al.
Published: (2007)
Information Sharing among the government, university, and industry: a CIS approach
by: Hasan, Muhammad Rabiul, et al.
Published: (2013)
by: Hasan, Muhammad Rabiul, et al.
Published: (2013)
Evaluating the success factors of Information Systems (IS) -case study of Malaysian public sector
by: Fuad Zamzami, Ikhlas, et al.
Published: (2011)
by: Fuad Zamzami, Ikhlas, et al.
Published: (2011)
Modeling the impact of information technology governance effectiveness using partial least square
by: Kaur, Jasber, et al.
Published: (2012)
by: Kaur, Jasber, et al.
Published: (2012)
Risk management at universities: illegal residents in hostels & fire cases
by: Barzak, Omar Mokhles, et al.
Published: (2014)
by: Barzak, Omar Mokhles, et al.
Published: (2014)
The influence of organizational factors on information systems success in e-government agencies in Malaysia
by: Hussein, Ramlah, et al.
Published: (2007)
by: Hussein, Ramlah, et al.
Published: (2007)
The importance and effectiveness of information technology governance practices: A Malaysian private organizations perspective
by: Jasber, Kaur, et al.
Published: (2012)
by: Jasber, Kaur, et al.
Published: (2012)
Study on database management system security issues
by: Mohd Yunus, Mohd Amin, et al.
Published: (2017)
by: Mohd Yunus, Mohd Amin, et al.
Published: (2017)
Conceptualization of Strategic Information Systems Planning (SISP) success model in public sector: an absorptive capacity approach
by: Abu Bakar, Fazidah, et al.
Published: (2009)
by: Abu Bakar, Fazidah, et al.
Published: (2009)
The success factors in Government Information Sharing (GIS)
- empirical findings from the Malaysian’s natural disaster management context
by: Ahmad Dahlan, Abdul Rahman, et al.
Published: (2014)
by: Ahmad Dahlan, Abdul Rahman, et al.
Published: (2014)
Information security and data protection: Selected issues
by: Zulhuda, Sonny
Published: (2013)
by: Zulhuda, Sonny
Published: (2013)
Self awareness before social networking: exploring the user behavior and information security vulnerability in Malaysia
by: Hussin, Husnayati, et al.
Published: (2010)
by: Hussin, Husnayati, et al.
Published: (2010)
Information technology risk management: the case of the
International Islamic University Malaysia
by: Ahlan, Abdul Rahman, et al.
Published: (2012)
by: Ahlan, Abdul Rahman, et al.
Published: (2012)
AGW 616 - MANAGEMENT INFORMATION SYSTEM SEPT. 1999.
by: PPP, Pusat Pengajian Pengurusan
Published: (1999)
by: PPP, Pusat Pengajian Pengurusan
Published: (1999)
APW 302E - MANAGEMENT INFORMATION SYSTEM APRIL 08.
by: PPP, Pusat Pengajian Pengurusan
Published: (2008)
by: PPP, Pusat Pengajian Pengurusan
Published: (2008)
AGW 604 - MANAGEMENT INFORMATION SYSTEM OKT-NOV 1996
by: PPP, Pusat Pengajian Pengurusan
Published: (1996)
by: PPP, Pusat Pengajian Pengurusan
Published: (1996)
Enhancing education and skill building through eduskill program
by: Ahmad Dahlan, Abdul Rahman, et al.
Published: (2015)
by: Ahmad Dahlan, Abdul Rahman, et al.
Published: (2015)
MySmartSolution Platform – a conceptual solution in
enhancing the societal wellbeing through smart-based
technology services
by: Ahmad Dahlan, Abdul Rahman, et al.
Published: (2015)
by: Ahmad Dahlan, Abdul Rahman, et al.
Published: (2015)
Similar Items
-
Disclosure of organizational information by employees on Facebook: Looking at the potential for information security risks
by: Abdul Molok , Nurul Nuha, et al.
Published: (2011) -
Disclosure of organizational information on social media: Perspectives from security managers
by: Abdul Molok , Nurul Nuha, et al.
Published: (2013) -
Exploring the use of online social networking among employees in Malaysian organizations: looking potential threats to information security
by: Abdul Molok , Nurul Nuha
Published: (2013) -
Understanding the factors of information leakage through online social networking to safeguard organizational information
by: Abdul Molok, Nurul Nuha, et al.
Published: (2010) -
The information systems integration plan: for satellite remote sensing subsystems
by: Abdul Molok , Nurul Nuha
Published: (2010)