Edward Snowden disclosures turn the fears of surveillance into reality: the impact and transformation in information security
More than two years passed since the biggest event on information security and privacy which is the disclosure of very sensitive documents on the National Security Agency in United States. Those disclosures had a lot of resonance and impact in term of discussions between people who supported the act...
| Main Authors: | Mohamed Mahmoud, Fatimetou Zahra, Zeki, Akram M. |
|---|---|
| Format: | Article |
| Language: | English English |
| Published: |
Little Lion Scientific Islamabad Pakistan
2016
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/49482/ http://irep.iium.edu.my/49482/1/2Vol83No2.pdf http://irep.iium.edu.my/49482/4/49482_Edward%20snowden%20disclosures_scopus.pdf |
Similar Items
Mobility based surveillance model to facilitate security of individuals’ properties
by: Hameed, Shihab A.
Published: (2013)
by: Hameed, Shihab A.
Published: (2013)
Web user' knowledge and their behavior towards security threats and vulnerabilities
by: Aldossary, Alia Ahmed, et al.
Published: (2016)
by: Aldossary, Alia Ahmed, et al.
Published: (2016)
Securing information system & computer security self-efficacy effect
by: Al-Shawabkeh, Mahmoud
Published: (2013)
by: Al-Shawabkeh, Mahmoud
Published: (2013)
Human activity recognition for video surveillance using sequences of postures
by: Htike, Kyaw Kyaw, et al.
Published: (2014)
by: Htike, Kyaw Kyaw, et al.
Published: (2014)
ISB watermarking embedding: block based model
by: Zeki, Akram M., et al.
Published: (2011)
by: Zeki, Akram M., et al.
Published: (2011)
Image recognition technique of road tax sticker in Malaysia
by: Alharaki, Omarah Omar, et al.
Published: (2012)
by: Alharaki, Omarah Omar, et al.
Published: (2012)
An overview and proposal for analysis of the effectiveness of human factors in Dubai e-banking system
by: Abdulghafor, Rawad, et al.
Published: (2017)
by: Abdulghafor, Rawad, et al.
Published: (2017)
Manpower model for human resource planning management
by: Halim, Siti Sarah A., et al.
Published: (2012)
by: Halim, Siti Sarah A., et al.
Published: (2012)
Improving the robustness of ISB watermarking techniques by repetition of the embedding
by: Zeki, Akram M., et al.
Published: (2011)
by: Zeki, Akram M., et al.
Published: (2011)
Digital image watermarking, analysis of current methods
by: Mohammed, Ghassan N., et al.
Published: (2012)
by: Mohammed, Ghassan N., et al.
Published: (2012)
High image quality watermarking model by using genetic algorithm
by: Mohammed, Ghassan N., et al.
Published: (2012)
by: Mohammed, Ghassan N., et al.
Published: (2012)
The Integration of GPS Navigator Device with Vehicles Tracking System for Rental Cars Firms
by: Alharaki, Omarah Omar, et al.
Published: (2010)
by: Alharaki, Omarah Omar, et al.
Published: (2010)
A methodology for modelling and analysis of secure systems using security patterns and mitigation use cases
by: Maher, Zulfikar Ahmad, et al.
Published: (2018)
by: Maher, Zulfikar Ahmad, et al.
Published: (2018)
Mobile security and privacy in smartphone technology
by: Ibrahim, Mohamed, et al.
Published: (2015)
by: Ibrahim, Mohamed, et al.
Published: (2015)
Information security for professional counseling in organization
by: Mohamed, Abdikadir Yusuf, et al.
Published: (2016)
by: Mohamed, Abdikadir Yusuf, et al.
Published: (2016)
Encryption method for SCADA security enhancement
by: Shahzad, Aamir, et al.
Published: (2014)
by: Shahzad, Aamir, et al.
Published: (2014)
A secure authentication scheme for bluetooth connection
by: Diallo, Alhassane Saliou, et al.
Published: (2014)
by: Diallo, Alhassane Saliou, et al.
Published: (2014)
Security and privacy for IoT and fog computing paradigm
by: Rauf, Abdul, et al.
Published: (2018)
by: Rauf, Abdul, et al.
Published: (2018)
Toward managing security cost for healthcare information
by: Hameed, Shihab A., et al.
Published: (2012)
by: Hameed, Shihab A., et al.
Published: (2012)
Information security awareness through the use of social media
by: Abdul Molok, Nurul Nuha, et al.
Published: (2015)
by: Abdul Molok, Nurul Nuha, et al.
Published: (2015)
The future of data privacy and security concerns in
Internet of things
by: Solangi, Zulfiqar Ali, et al.
Published: (2018)
by: Solangi, Zulfiqar Ali, et al.
Published: (2018)
A watermarking authentication system for medical images
by: Zeki, Akram M., et al.
Published: (2011)
by: Zeki, Akram M., et al.
Published: (2011)
Robust and secure image steganography based on elliptic curve cryptography
by: Ahmed, Diaa Eldein Mustafa, et al.
Published: (2014)
by: Ahmed, Diaa Eldein Mustafa, et al.
Published: (2014)
Bayesian signaling game based efficient security model for MANETs
by: Olanrewaju, Rashidah Funke, et al.
Published: (2020)
by: Olanrewaju, Rashidah Funke, et al.
Published: (2020)
Offline OTP based solution for secure internet banking access
by: Khan, Burhan ul Islam, et al.
Published: (2019)
by: Khan, Burhan ul Islam, et al.
Published: (2019)
MARKCLOUD - Software for data confidentiality and security in cloud computing environments
by: Olanrewaju, Rashidah Funke, et al.
Published: (2014)
by: Olanrewaju, Rashidah Funke, et al.
Published: (2014)
Deployment of new dynamic cryptography buffer for SCADA security enhancement
by: Aamir, Shahzad, et al.
Published: (2014)
by: Aamir, Shahzad, et al.
Published: (2014)
Linear and nonlinear stochastic distribution for consensus problem in multi-agent systems
by: Abdulghafor, Rawad, et al.
Published: (2020)
by: Abdulghafor, Rawad, et al.
Published: (2020)
Similarities and dissimilarities between character frequencies of written text of Melayu, English and Indonesian languages
by: Shah, Asadullah, et al.
Published: (2013)
by: Shah, Asadullah, et al.
Published: (2013)
Exploring the factors influencing top management involvement and participation in information security
by: Abdul Munir, Rufizah, et al.
Published: (2017)
by: Abdul Munir, Rufizah, et al.
Published: (2017)
Preliminary study for customer’s online shopping satisfaction from security perspective
by: Imtiaz Ali, Najma, et al.
Published: (2018)
by: Imtiaz Ali, Najma, et al.
Published: (2018)
Factors affecting secure software development practices among developers- an investigation
by: Ahmed Maher, Zulfikar, et al.
Published: (2019)
by: Ahmed Maher, Zulfikar, et al.
Published: (2019)
Online shopping satisfaction in Malaysia: A framework for security, trust and cybercrime
by: Imtiaz Ali, Najma, et al.
Published: (2016)
by: Imtiaz Ali, Najma, et al.
Published: (2016)
Using biometric techniques to secure online student assessment: Comparative study
by: Ibrahim, Jamaludin, et al.
Published: (2011)
by: Ibrahim, Jamaludin, et al.
Published: (2011)
ICT in telemedicine: conquering privacy and security issues in health care services
by: Olanrewaju, Rashidah Funke, et al.
Published: (2012)
by: Olanrewaju, Rashidah Funke, et al.
Published: (2012)
Sharing of attacks information across clouds for improving security:a conceptual framework
by: Waqas, Ahmad, et al.
Published: (2014)
by: Waqas, Ahmad, et al.
Published: (2014)
Mobile agent based multi-layer security framework for cloud data centers
by: Uddin, Mueen, et al.
Published: (2015)
by: Uddin, Mueen, et al.
Published: (2015)
Toward user awareness and acceptance of Sudan E-government: adoption and security perspective
by: Khalifa, Othman Omran, et al.
Published: (2016)
by: Khalifa, Othman Omran, et al.
Published: (2016)
Determining watermark embedding strength using complex valued neural network
by: Olanrewaju, Rashidah Funke, et al.
Published: (2011)
by: Olanrewaju, Rashidah Funke, et al.
Published: (2011)
Adopting a knowledge management concept in securing the privacy of electronic medical record systems
by: Samsuri, Suhaila, et al.
Published: (2013)
by: Samsuri, Suhaila, et al.
Published: (2013)
Similar Items
-
Mobility based surveillance model to facilitate security of individuals’ properties
by: Hameed, Shihab A.
Published: (2013) -
Web user' knowledge and their behavior towards security threats and vulnerabilities
by: Aldossary, Alia Ahmed, et al.
Published: (2016) -
Securing information system & computer security self-efficacy effect
by: Al-Shawabkeh, Mahmoud
Published: (2013) -
Human activity recognition for video surveillance using sequences of postures
by: Htike, Kyaw Kyaw, et al.
Published: (2014) -
ISB watermarking embedding: block based model
by: Zeki, Akram M., et al.
Published: (2011)