Our privacy: How to be assured in cyberspace
We have tonnes of confidential information digitised and stored in every possible storage media in cyberspace, via both popular applications, being direct cloud-based services and/or social media platform, and applications that are designed for a specific group of professionals. However, one questio...
| Main Author: | |
|---|---|
| Format: | Proceeding Paper |
| Language: | English English |
| Published: |
2016
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/51210/ http://irep.iium.edu.my/51210/1/ISACA_CIAG_2016.pdf http://irep.iium.edu.my/51210/7/51210.pdf |
| _version_ | 1848783808656048128 |
|---|---|
| author | Zulhuda, Sonny |
| author_facet | Zulhuda, Sonny |
| author_sort | Zulhuda, Sonny |
| building | IIUM Repository |
| collection | Online Access |
| description | We have tonnes of confidential information digitised and stored in every possible storage media in cyberspace, via both popular applications, being direct cloud-based services and/or social media platform, and applications that are designed for a specific group of professionals. However, one question remains. What happens to the information after the click of the mouse? Can we forego privacy in return for convenience? Are we assured of our privacy from the one provider who is holding all the confidential information and our own business strategic plans? The panellists will share what it takes to protect privacy in the cyber world without losing the convenience. |
| first_indexed | 2025-11-14T16:27:14Z |
| format | Proceeding Paper |
| id | iium-51210 |
| institution | International Islamic University Malaysia |
| institution_category | Local University |
| language | English English |
| last_indexed | 2025-11-14T16:27:14Z |
| publishDate | 2016 |
| recordtype | eprints |
| repository_type | Digital Repository |
| spelling | iium-512102018-05-22T02:59:39Z http://irep.iium.edu.my/51210/ Our privacy: How to be assured in cyberspace Zulhuda, Sonny K Law (General) We have tonnes of confidential information digitised and stored in every possible storage media in cyberspace, via both popular applications, being direct cloud-based services and/or social media platform, and applications that are designed for a specific group of professionals. However, one question remains. What happens to the information after the click of the mouse? Can we forego privacy in return for convenience? Are we assured of our privacy from the one provider who is holding all the confidential information and our own business strategic plans? The panellists will share what it takes to protect privacy in the cyber world without losing the convenience. 2016-05-30 Proceeding Paper NonPeerReviewed application/pdf en http://irep.iium.edu.my/51210/1/ISACA_CIAG_2016.pdf application/pdf en http://irep.iium.edu.my/51210/7/51210.pdf Zulhuda, Sonny (2016) Our privacy: How to be assured in cyberspace. In: Cybersecurity, IT Assurance & Governance Conference 2016, 30th-31st May 2016, Kuala Lumpur, Malaysia. (Unpublished) |
| spellingShingle | K Law (General) Zulhuda, Sonny Our privacy: How to be assured in cyberspace |
| title | Our privacy: How to be assured in cyberspace |
| title_full | Our privacy: How to be assured in cyberspace |
| title_fullStr | Our privacy: How to be assured in cyberspace |
| title_full_unstemmed | Our privacy: How to be assured in cyberspace |
| title_short | Our privacy: How to be assured in cyberspace |
| title_sort | our privacy: how to be assured in cyberspace |
| topic | K Law (General) |
| url | http://irep.iium.edu.my/51210/ http://irep.iium.edu.my/51210/1/ISACA_CIAG_2016.pdf http://irep.iium.edu.my/51210/7/51210.pdf |