Web users’ knowledge and their behavior towards security threats and vulnerabilities
Most of web users today are university students. They become more familiar with Information Security (IS) because it is a taught course in the university curriculum. However, there are many students whose level of awareness on this subject is still not enough considering the occurrence of security r...
| Main Authors: | Aldossary, Alia Ahmed, Zeki, Akram M. |
|---|---|
| Format: | Proceeding Paper |
| Language: | English English |
| Published: |
The Institute of Electrical and Electronics Engineers, Inc.
2016
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/51288/ http://irep.iium.edu.my/51288/1/51288_web_user.pdf http://irep.iium.edu.my/51288/4/51288_Web%20users%E2%80%99%20knowledge%20and%20their%20behavior%20towards%20security%20threats%20and%20vulnerabilities_SCOPUS.pdf |
Similar Items
Web user' knowledge and their behavior towards security threats and vulnerabilities
by: Aldossary, Alia Ahmed, et al.
Published: (2016)
by: Aldossary, Alia Ahmed, et al.
Published: (2016)
Evaluation of users' awareness and their reaction on information security
by: Zeki, Akram M., et al.
Published: (2016)
by: Zeki, Akram M., et al.
Published: (2016)
Mobile Quran app security vulnerabilities
by: Talib, Shuhaili, et al.
Published: (2015)
by: Talib, Shuhaili, et al.
Published: (2015)
Impersonate affecting users' attitude toward facebook in Egypt
by: Hassan El Hoby, Hany Mohamed, et al.
Published: (2016)
by: Hassan El Hoby, Hany Mohamed, et al.
Published: (2016)
The mediating effect of teamwork toward organizational readiness for Business Intelligence (BI) implementation
by: Anjariny, Ahmed H., et al.
Published: (2016)
by: Anjariny, Ahmed H., et al.
Published: (2016)
Attitude towards information privacy issues among students of IIUM
by: Mohamud, Ibrahim Kalif, et al.
Published: (2016)
by: Mohamud, Ibrahim Kalif, et al.
Published: (2016)
Employing information security awareness to minimize over-exposure of average Internet user on social networks
by: Binden, Worawit, et al.
Published: (2014)
by: Binden, Worawit, et al.
Published: (2014)
Language teachers' web surfing skills: teachers' knowledge of metasearch engines and advanced search facilities
by: Mat Daud, Nuraihan
Published: (2012)
by: Mat Daud, Nuraihan
Published: (2012)
Encouraging knowledge sharing using web 2.0 technologies in higher education: a survey
by: Oyefolahan, Ishaq Oyebisi
Published: (2014)
by: Oyefolahan, Ishaq Oyebisi
Published: (2014)
User-centered web development for GMI alumni website
by: Zakaria, N. A., et al.
Published: (2010)
by: Zakaria, N. A., et al.
Published: (2010)
Information security threat avoidance behavior: an
empirical investigation
by: Ling, Zhixuan
Published: (2019)
by: Ling, Zhixuan
Published: (2019)
Durian Farm Threats Identification through Convolution Neural
Networks and Multimedia Mobile Development
by: Yusoff, Aiman, et al.
by: Yusoff, Aiman, et al.
User Experience Design (UXD): a survey of user interface development practices in Malaysia
by: Hussein, Idyawati, et al.
Published: (2012)
by: Hussein, Idyawati, et al.
Published: (2012)
Information security in ICT from an Islamic
perspective
by: Ibrahim, Jamaludin, et al.
Published: (2014)
by: Ibrahim, Jamaludin, et al.
Published: (2014)
e-Life web-based application of birth and death certificate
by: Ahmad Dahlan, Abdul Rahman, et al.
Published: (2011)
by: Ahmad Dahlan, Abdul Rahman, et al.
Published: (2011)
User generated content and the Muslim consumer in Cyberspace
by: Saidin, Aznan Zuhid, et al.
Published: (2012)
by: Saidin, Aznan Zuhid, et al.
Published: (2012)
Information security aligned to enterprise management
by: Abdullah, Istikoma, et al.
Published: (2015)
by: Abdullah, Istikoma, et al.
Published: (2015)
User experience:assesing the effectiveness of internet booking service
by: Hussein, Idyawati, et al.
Published: (2010)
by: Hussein, Idyawati, et al.
Published: (2010)
The influence of students’ knowledge on security towards their behavior with security risks within the context of Saudi Arabia
by: Ahmed, Aldossary Alia, et al.
Published: (2014)
by: Ahmed, Aldossary Alia, et al.
Published: (2014)
The extreme doubly stochastic quadratic operators on two dimensional simplex
by: Abdulghafor, Rawad Abdulkhaleq Abdulmolla, et al.
Published: (2016)
by: Abdulghafor, Rawad Abdulkhaleq Abdulmolla, et al.
Published: (2016)
Impact of NSA-PRISM to National Information Security
Strategy & Policy
by: Khudayer, Aiesha Y., et al.
Published: (2014)
by: Khudayer, Aiesha Y., et al.
Published: (2014)
Web-based physical activity interventions for older adults: A review
by: Mohd Mohadis, Hazwani, et al.
Published: (2015)
by: Mohd Mohadis, Hazwani, et al.
Published: (2015)
1 touch I-care system: collaborative web-based solution
by: Ahmad Dahlan, Abdul Rahman, et al.
Published: (2011)
by: Ahmad Dahlan, Abdul Rahman, et al.
Published: (2011)
Steganography: a review of information security research and development in Muslim world
by: Yunus, Yunura Azura, et al.
Published: (2013)
by: Yunus, Yunura Azura, et al.
Published: (2013)
Super Authentication Security System (SASS) to Malaysian community for safety management
by: Ahmad Dahlan, Abdul Rahman, et al.
Published: (2011)
by: Ahmad Dahlan, Abdul Rahman, et al.
Published: (2011)
Security threats of finger print biometric in network system environment
by: Taha, Imad, et al.
Published: (2011)
by: Taha, Imad, et al.
Published: (2011)
IslamicGRID and knowledge management
by: Abdul Wahid, Al-Abrar, et al.
Published: (2011)
by: Abdul Wahid, Al-Abrar, et al.
Published: (2011)
Managers' perception of Information Management (IM) and Knowledge Management (KM) and the role of information and knowledge managers
by: Abdul Karim, Nor Shahriza, et al.
Published: (2003)
by: Abdul Karim, Nor Shahriza, et al.
Published: (2003)
Preliminary investigation of Islamic websites design & content feature: A heuristic evaluation from user perspective
by: Aliyu, Mansur, et al.
Published: (2010)
by: Aliyu, Mansur, et al.
Published: (2010)
1001 resipi: laman web perkongsian resipi
by: Pau, Nazrin Seng Kiat, et al.
Published: (2020)
by: Pau, Nazrin Seng Kiat, et al.
Published: (2020)
Enhancing the security of RCIA ultra-lightweight
authentication protocol by using random number generator (RNG) technique
by: Yasear, Shaymah Akram
Published: (2015)
by: Yasear, Shaymah Akram
Published: (2015)
Knowledge management practice in private sector: building
the way for Saudi Arabia strategic growth and transformation to knowledge-based economy
by: Gharamah, Abdulrahman, et al.
Published: (2018)
by: Gharamah, Abdulrahman, et al.
Published: (2018)
Web-based e-learning systems acceptance and success: a review of contributing factors from the instructors’ perception
by: Oyefolahan, Ishaq Oyebisi, et al.
Published: (2014)
by: Oyefolahan, Ishaq Oyebisi, et al.
Published: (2014)
The knowledge management strategies used as a tool within and through strategic consulting firms to increase the organisational performance
by: Mohamed Mahmoud, Fatimetou Zahra, et al.
Published: (2015)
by: Mohamed Mahmoud, Fatimetou Zahra, et al.
Published: (2015)
Kid website assessment using knowledge discovery
by: Noordin, Mohamad Fauzan, et al.
Published: (2012)
by: Noordin, Mohamad Fauzan, et al.
Published: (2012)
Malaysia National Library and knowledge management initiative
by: Yaacob, Nurul Ibtisam, et al.
Published: (2011)
by: Yaacob, Nurul Ibtisam, et al.
Published: (2011)
The current state of information management and knowledge management in the Malaysian construction industry
by: Noordin, Mohamad Fauzan, et al.
Published: (2012)
by: Noordin, Mohamad Fauzan, et al.
Published: (2012)
Privacy concern and perceived benefits towards privacy and election in Indonesia
by: Lubis, Muharman, et al.
Published: (2014)
by: Lubis, Muharman, et al.
Published: (2014)
Collaboration system towards Program Anak Emas in Malaysia (SPANE)
by: Ahmad Dahlan, Abdul Rahman, et al.
Published: (2011)
by: Ahmad Dahlan, Abdul Rahman, et al.
Published: (2011)
The inclination of Information and Communication Technology (ICT) students towards entrepreneurship
by: Mior Nazri, Mior Nasir, et al.
Published: (2014)
by: Mior Nazri, Mior Nasir, et al.
Published: (2014)
Similar Items
-
Web user' knowledge and their behavior towards security threats and vulnerabilities
by: Aldossary, Alia Ahmed, et al.
Published: (2016) -
Evaluation of users' awareness and their reaction on information security
by: Zeki, Akram M., et al.
Published: (2016) -
Mobile Quran app security vulnerabilities
by: Talib, Shuhaili, et al.
Published: (2015) -
Impersonate affecting users' attitude toward facebook in Egypt
by: Hassan El Hoby, Hany Mohamed, et al.
Published: (2016) -
The mediating effect of teamwork toward organizational readiness for Business Intelligence (BI) implementation
by: Anjariny, Ahmed H., et al.
Published: (2016)