Impersonate affecting users' attitude toward facebook in Egypt
Social networking sites such as Facebook have mushroomed very rapidly. Anyone with an email address can make an account as long as he accepts the terms and conditions of the website regarding privacy. There are several pages of celebrities, public figures and famous personalities being tricked by ha...
| Main Authors: | Hassan El Hoby, Hany Mohamed, Zeki, Akram M. |
|---|---|
| Format: | Proceeding Paper |
| Language: | English English |
| Published: |
The Institute of Electrical and Electronics Engineers, Inc.
2016
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/51271/ http://irep.iium.edu.my/51271/1/51271_Impersonate_Affecting.pdf http://irep.iium.edu.my/51271/4/51271_Impersonate%20affecting%20users%27%20attitude_scopus.pdf |
Similar Items
Web users’ knowledge and their behavior towards security threats and vulnerabilities
by: Aldossary, Alia Ahmed, et al.
Published: (2016)
by: Aldossary, Alia Ahmed, et al.
Published: (2016)
Evaluation of users' awareness and their reaction on information security
by: Zeki, Akram M., et al.
Published: (2016)
by: Zeki, Akram M., et al.
Published: (2016)
Attitude towards information privacy issues among students of IIUM
by: Mohamud, Ibrahim Kalif, et al.
Published: (2016)
by: Mohamud, Ibrahim Kalif, et al.
Published: (2016)
The mediating effect of teamwork toward organizational readiness for Business Intelligence (BI) implementation
by: Anjariny, Ahmed H., et al.
Published: (2016)
by: Anjariny, Ahmed H., et al.
Published: (2016)
Positive impact of smartphone application: whatsapp &
facebook for online business
by: Ibrahim, Jamaludin, et al.
Published: (2014)
by: Ibrahim, Jamaludin, et al.
Published: (2014)
User Experience Design (UXD): a survey of user interface development practices in Malaysia
by: Hussein, Idyawati, et al.
Published: (2012)
by: Hussein, Idyawati, et al.
Published: (2012)
User generated content and the Muslim consumer in Cyberspace
by: Saidin, Aznan Zuhid, et al.
Published: (2012)
by: Saidin, Aznan Zuhid, et al.
Published: (2012)
User experience:assesing the effectiveness of internet booking service
by: Hussein, Idyawati, et al.
Published: (2010)
by: Hussein, Idyawati, et al.
Published: (2010)
User attitude, organizational learning and dynamic capability in government-to-business success
by: Kassim, Erne Suzila, et al.
Published: (2010)
by: Kassim, Erne Suzila, et al.
Published: (2010)
The extreme doubly stochastic quadratic operators on two dimensional simplex
by: Abdulghafor, Rawad Abdulkhaleq Abdulmolla, et al.
Published: (2016)
by: Abdulghafor, Rawad Abdulkhaleq Abdulmolla, et al.
Published: (2016)
Employing information security awareness to minimize over-exposure of average Internet user on social networks
by: Binden, Worawit, et al.
Published: (2014)
by: Binden, Worawit, et al.
Published: (2014)
Preliminary investigation of Islamic websites design & content feature: A heuristic evaluation from user perspective
by: Aliyu, Mansur, et al.
Published: (2010)
by: Aliyu, Mansur, et al.
Published: (2010)
Privacy concern and perceived benefits towards privacy and election in Indonesia
by: Lubis, Muharman, et al.
Published: (2014)
by: Lubis, Muharman, et al.
Published: (2014)
Collaboration system towards Program Anak Emas in Malaysia (SPANE)
by: Ahmad Dahlan, Abdul Rahman, et al.
Published: (2011)
by: Ahmad Dahlan, Abdul Rahman, et al.
Published: (2011)
The inclination of Information and Communication Technology (ICT) students towards entrepreneurship
by: Mior Nazri, Mior Nasir, et al.
Published: (2014)
by: Mior Nazri, Mior Nasir, et al.
Published: (2014)
Enhancing the security of RCIA ultra-lightweight
authentication protocol by using random number generator (RNG) technique
by: Yasear, Shaymah Akram
Published: (2015)
by: Yasear, Shaymah Akram
Published: (2015)
Analysis of ISB watermarking model : block based methods vs Embedding repetition methods
by: Zeki, Akram M., et al.
Published: (2011)
by: Zeki, Akram M., et al.
Published: (2011)
User-centered web development for GMI alumni website
by: Zakaria, N. A., et al.
Published: (2010)
by: Zakaria, N. A., et al.
Published: (2010)
Kajian terhadap kepadanan Facebook sebagai teknologi untuk berkongsi maklumat semasa banjir
by: Siti Hasanah, Ishak
Published: (2015)
by: Siti Hasanah, Ishak
Published: (2015)
An integrated model for predicting users’ continuance intention towards using open government data in Qatar state
by: Al-Jamili, Omar Naji Mohammed
Published: (2023)
by: Al-Jamili, Omar Naji Mohammed
Published: (2023)
Mobile user location prediction: genetic algorithm-based approach
by: Mantoro, Teddy, et al.
Published: (2010)
by: Mantoro, Teddy, et al.
Published: (2010)
Hybrid features for detection of malicious user in YouTube
by: Sadoon, Omar Hadeb
Published: (2017)
by: Sadoon, Omar Hadeb
Published: (2017)
Improving the accuracy of indoor user location using IEEE 802.11 signals
by: Mantoro, Teddy, et al.
Published: (2010)
by: Mantoro, Teddy, et al.
Published: (2010)
The knowledge management strategies used as a tool within and through strategic consulting firms to increase the organisational performance
by: Mohamed Mahmoud, Fatimetou Zahra, et al.
Published: (2015)
by: Mohamed Mahmoud, Fatimetou Zahra, et al.
Published: (2015)
Assessing user satisfaction of smart parking payment system in Selangor
by: Siti Aslinda, Mahat
Published: (2025)
by: Siti Aslinda, Mahat
Published: (2025)
In search of a model to explain digital divide in information technology organizations
by: Mohamed, Norshidah, et al.
Published: (2009)
by: Mohamed, Norshidah, et al.
Published: (2009)
Mosque-based Collaborative Healthcare System (MCHS): Malaysia case study
by: Hassan, Azizah, et al.
Published: (2011)
by: Hassan, Azizah, et al.
Published: (2011)
E-filing users’ satisfaction: A study on Malaysia petroleum upstream taxpayers
by: Jaimin, Hairul Salveson
Published: (2020)
by: Jaimin, Hairul Salveson
Published: (2020)
A Decentralized Multi-Factor User Authentication Scheme For The Internet Of Things System
by: Chiadighikaobi, Ikenna Rene
Published: (2024)
by: Chiadighikaobi, Ikenna Rene
Published: (2024)
Multi-layered alert filtration and feedback cycle using Brahms model
by: Ghaffar, Abid, et al.
Published: (2016)
by: Ghaffar, Abid, et al.
Published: (2016)
Information security in ICT from an Islamic
perspective
by: Ibrahim, Jamaludin, et al.
Published: (2014)
by: Ibrahim, Jamaludin, et al.
Published: (2014)
Comparison of key enablers for the successful comercialization of bioinformatics products in Malaysia and Singapore
by: Nagaretham, Revathi, et al.
Published: (2012)
by: Nagaretham, Revathi, et al.
Published: (2012)
Factors affecting the use of cloud storage in Xi’an of
China
by: Liu, Shuyan
Published: (2019)
by: Liu, Shuyan
Published: (2019)
Evaluating heuristic for EG portal design model
by: Mahmud, Murni, et al.
Published: (2010)
by: Mahmud, Murni, et al.
Published: (2010)
Green IT attitude and behaviour in higher education institution: a gender perspective
by: Kartiwi, Mira, et al.
Published: (2014)
by: Kartiwi, Mira, et al.
Published: (2014)
A conceptual model of customer relationship management alignment
by: Mohamed, Norshidah, et al.
Published: (2012)
by: Mohamed, Norshidah, et al.
Published: (2012)
E-Brochure : User's Satisfaction and It's Influence to Communities (A Case Study at RIC Balik Pulau, Penang)
by: Mornizawati, Abdullah
Published: (2004)
by: Mornizawati, Abdullah
Published: (2004)
Factors affecting information technology (IT) competency among auditors in Kedah
by: PUTRI AMIRAH, MEGAT AZAMUDDIN
Published: (2020)
by: PUTRI AMIRAH, MEGAT AZAMUDDIN
Published: (2020)
Factors affecting instructors’ adoption of learning management systems: The case of Palestine
by: Abdallah, Nahel A. O., et al.
Published: (2019)
by: Abdallah, Nahel A. O., et al.
Published: (2019)
Self-organizing map approach for determining mobile user location using IEEE 802.11 signals
by: Mantoro, Teddy, et al.
Published: (2010)
by: Mantoro, Teddy, et al.
Published: (2010)
Similar Items
-
Web users’ knowledge and their behavior towards security threats and vulnerabilities
by: Aldossary, Alia Ahmed, et al.
Published: (2016) -
Evaluation of users' awareness and their reaction on information security
by: Zeki, Akram M., et al.
Published: (2016) -
Attitude towards information privacy issues among students of IIUM
by: Mohamud, Ibrahim Kalif, et al.
Published: (2016) -
The mediating effect of teamwork toward organizational readiness for Business Intelligence (BI) implementation
by: Anjariny, Ahmed H., et al.
Published: (2016) -
Positive impact of smartphone application: whatsapp &
facebook for online business
by: Ibrahim, Jamaludin, et al.
Published: (2014)