Our privacy: How to be assured in cyberspace

We have tonnes of confidential information digitised and stored in every possible storage media in cyberspace, via both popular applications, being direct cloud-based services and/or social media platform, and applications that are designed for a specific group of professionals. However, one questio...

Full description

Bibliographic Details
Main Author: Zulhuda, Sonny
Format: Proceeding Paper
Language:English
English
Published: 2016
Subjects:
Online Access:http://irep.iium.edu.my/51210/
http://irep.iium.edu.my/51210/1/ISACA_CIAG_2016.pdf
http://irep.iium.edu.my/51210/7/51210.pdf
_version_ 1848783808656048128
author Zulhuda, Sonny
author_facet Zulhuda, Sonny
author_sort Zulhuda, Sonny
building IIUM Repository
collection Online Access
description We have tonnes of confidential information digitised and stored in every possible storage media in cyberspace, via both popular applications, being direct cloud-based services and/or social media platform, and applications that are designed for a specific group of professionals. However, one question remains. What happens to the information after the click of the mouse? Can we forego privacy in return for convenience? Are we assured of our privacy from the one provider who is holding all the confidential information and our own business strategic plans? The panellists will share what it takes to protect privacy in the cyber world without losing the convenience.
first_indexed 2025-11-14T16:27:14Z
format Proceeding Paper
id iium-51210
institution International Islamic University Malaysia
institution_category Local University
language English
English
last_indexed 2025-11-14T16:27:14Z
publishDate 2016
recordtype eprints
repository_type Digital Repository
spelling iium-512102018-05-22T02:59:39Z http://irep.iium.edu.my/51210/ Our privacy: How to be assured in cyberspace Zulhuda, Sonny K Law (General) We have tonnes of confidential information digitised and stored in every possible storage media in cyberspace, via both popular applications, being direct cloud-based services and/or social media platform, and applications that are designed for a specific group of professionals. However, one question remains. What happens to the information after the click of the mouse? Can we forego privacy in return for convenience? Are we assured of our privacy from the one provider who is holding all the confidential information and our own business strategic plans? The panellists will share what it takes to protect privacy in the cyber world without losing the convenience. 2016-05-30 Proceeding Paper NonPeerReviewed application/pdf en http://irep.iium.edu.my/51210/1/ISACA_CIAG_2016.pdf application/pdf en http://irep.iium.edu.my/51210/7/51210.pdf Zulhuda, Sonny (2016) Our privacy: How to be assured in cyberspace. In: Cybersecurity, IT Assurance & Governance Conference 2016, 30th-31st May 2016, Kuala Lumpur, Malaysia. (Unpublished)
spellingShingle K Law (General)
Zulhuda, Sonny
Our privacy: How to be assured in cyberspace
title Our privacy: How to be assured in cyberspace
title_full Our privacy: How to be assured in cyberspace
title_fullStr Our privacy: How to be assured in cyberspace
title_full_unstemmed Our privacy: How to be assured in cyberspace
title_short Our privacy: How to be assured in cyberspace
title_sort our privacy: how to be assured in cyberspace
topic K Law (General)
url http://irep.iium.edu.my/51210/
http://irep.iium.edu.my/51210/1/ISACA_CIAG_2016.pdf
http://irep.iium.edu.my/51210/7/51210.pdf