Critical infrastructure protection of ICT in Muslim world
This paper explain about many Muslim world get cyber cyberattack ,how vulnerable critical infrastructure protection especially in cyber in Muslim country such as Malaysia, Saudi Arabia, Turkey, and UAE compare to the west country , in this paper we know that most Muslim country are more vulnerable t...
| Main Authors: | Abdulrahman Ali, Sami Mohammed, Abdu, Muhammad, Ibrahim, Jamaludin |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
International Journal of Science and Research (IJSR)
2016
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/53513/ http://irep.iium.edu.my/53513/7/53513.pdf |
Similar Items
ICT in telemedicine: conquering privacy and security issues in health care services
by: Olanrewaju, Rashidah Funke, et al.
Published: (2012)
by: Olanrewaju, Rashidah Funke, et al.
Published: (2012)
Protecting personal medical information: Asian perspectives
by: Samsuri, Suhaila, et al.
Published: (2013)
by: Samsuri, Suhaila, et al.
Published: (2013)
Critical insight for MAPReduce optimization in Hadoop
by: Khan, Burhan ul Islam, et al.
Published: (2014)
by: Khan, Burhan ul Islam, et al.
Published: (2014)
Librocide: destruction of libraries, museum, and archives in the Muslim world
by: Mansor, Yushiana, et al.
Published: (2012)
by: Mansor, Yushiana, et al.
Published: (2012)
Privacy models for protecting personal medical information: a preliminary study
by: Samsuri, Suhaila, et al.
Published: (2011)
by: Samsuri, Suhaila, et al.
Published: (2011)
Critical socio-technical issues surrounding mobile computing
by: Mohamed, Norshidah, et al.
Published: (2016)
by: Mohamed, Norshidah, et al.
Published: (2016)
Using biometric techniques to secure online student assessment: Comparative study
by: Ibrahim, Jamaludin, et al.
Published: (2011)
by: Ibrahim, Jamaludin, et al.
Published: (2011)
Mobile security and privacy in smartphone technology
by: Ibrahim, Mohamed, et al.
Published: (2015)
by: Ibrahim, Mohamed, et al.
Published: (2015)
Approach for successful knowledge management system deployment for organizations
by: Gharamah, Abdulrahman, et al.
Published: (2018)
by: Gharamah, Abdulrahman, et al.
Published: (2018)
How IT can enhance professional practice with regards to smart-phones and social networks?
by: Hassan, Nuradin Ibrahim, et al.
Published: (2016)
by: Hassan, Nuradin Ibrahim, et al.
Published: (2016)
Prevalence of mobile usage among university students: a case study of International Islamic University Malaysia
by: Qadri, Mehran, et al.
Published: (2015)
by: Qadri, Mehran, et al.
Published: (2015)
Information security for professional counseling in organization
by: Mohamed, Abdikadir Yusuf, et al.
Published: (2016)
by: Mohamed, Abdikadir Yusuf, et al.
Published: (2016)
Ethical communication in IT project from an Islamic perspective
by: Nizam, Mohamed, et al.
Published: (2012)
by: Nizam, Mohamed, et al.
Published: (2012)
Big data and its impact on IT consultancy
by: Mohamed, Habab, et al.
Published: (2016)
by: Mohamed, Habab, et al.
Published: (2016)
Cyber risk management for wireless communication in organization
by: Mutakin, Darul, et al.
Published: (2016)
by: Mutakin, Darul, et al.
Published: (2016)
Evaluation of an enhanced scheme for high-level nested network mobility
by: Ali Mohammed, Mohammed Babiker, et al.
Published: (2015)
by: Ali Mohammed, Mohammed Babiker, et al.
Published: (2015)
Evaluation of nested network mobility approaches
by: Ali Mohammed, Mohammed Babiker, et al.
Published: (2014)
by: Ali Mohammed, Mohammed Babiker, et al.
Published: (2014)
SmartCrowd: novel approach to big crowd management using mobile cloud computing
by: Ali, Mohammed Fazil, et al.
Published: (2015)
by: Ali, Mohammed Fazil, et al.
Published: (2015)
Improving message delay, handoff latency and binding update in high level nested network mobility
by: Babiker, Mohammed Ali, et al.
Published: (2015)
by: Babiker, Mohammed Ali, et al.
Published: (2015)
Ethical based mathematical model to evaluate software engineering
by: Hameed, Shihab A., et al.
Published: (2013)
by: Hameed, Shihab A., et al.
Published: (2013)
Statistical techniques to serve quality of software
by: Hameed, Shihab A., et al.
Published: (2013)
by: Hameed, Shihab A., et al.
Published: (2013)
Ethical based mathematical model to evaluate software engineering
by: Hameed, Shihab A., et al.
Published: (2012)
by: Hameed, Shihab A., et al.
Published: (2012)
Literature Survey on Enhancement of MOM for Intelligent Cross-Platform Communications in Service Oriented Architecture
by: Muhamad Ibrahim, Najhan
Published: (2018)
by: Muhamad Ibrahim, Najhan
Published: (2018)
Mathematical modeling using coordination mechanisms for multi-agent systems in service oriented architecture
by: Muhamad Ibrahim, Najhan
Published: (2019)
by: Muhamad Ibrahim, Najhan
Published: (2019)
Digital image watermarking, analysis of current methods
by: Mohammed, Ghassan N., et al.
Published: (2012)
by: Mohammed, Ghassan N., et al.
Published: (2012)
High image quality watermarking model by using genetic algorithm
by: Mohammed, Ghassan N., et al.
Published: (2012)
by: Mohammed, Ghassan N., et al.
Published: (2012)
Offline printed Sindhi optical text recognition: survey
by: Solangi, Yasir Ali, et al.
Published: (2019)
by: Solangi, Yasir Ali, et al.
Published: (2019)
A comprehensive comparative study of MOM for adaptive interoperability communications in service oriented architecture
by: Muhamad Ibrahim, Najhan, et al.
Published: (2019)
by: Muhamad Ibrahim, Najhan, et al.
Published: (2019)
The design of a speech delay screening mobile application for Malaysian parents
by: Mohammed, Siti Asma, et al.
Published: (2019)
by: Mohammed, Siti Asma, et al.
Published: (2019)
New estimates of single photon parameters for satellite-based QKD
by: Ali, Sellami, et al.
Published: (2009)
by: Ali, Sellami, et al.
Published: (2009)
Fiber and free-space practical decoy state QKD for both BB84
and SARG04 protocols
by: Ali, Sellami, et al.
Published: (2010)
by: Ali, Sellami, et al.
Published: (2010)
Preliminary study for customer’s online shopping satisfaction from security perspective
by: Imtiaz Ali, Najma, et al.
Published: (2018)
by: Imtiaz Ali, Najma, et al.
Published: (2018)
Online shopping satisfaction in Malaysia: A framework for security, trust and cybercrime
by: Imtiaz Ali, Najma, et al.
Published: (2016)
by: Imtiaz Ali, Najma, et al.
Published: (2016)
Medical emergency and healthcare model: enhancemet with SMS and MMS facilities
by: Hameed, Shihab A., et al.
Published: (2010)
by: Hameed, Shihab A., et al.
Published: (2010)
Adaptive multi-rate video transcoding method
by: Fadlallah, Fadlallah Ali, et al.
Published: (2014)
by: Fadlallah, Fadlallah Ali, et al.
Published: (2014)
Analysis determinants of social media acceptance in higher educational institution of Pakistan
by: Raza, Ali, et al.
Published: (2018)
by: Raza, Ali, et al.
Published: (2018)
Near field communication enabled mobile payments: preliminary study
by: Brohi, Imtiaz Ali, et al.
Published: (2018)
by: Brohi, Imtiaz Ali, et al.
Published: (2018)
The future of data privacy and security concerns in
Internet of things
by: Solangi, Zulfiqar Ali, et al.
Published: (2018)
by: Solangi, Zulfiqar Ali, et al.
Published: (2018)
Space Debris Low Earth Orbit (LEO)
by: Ahmed Mohamed, Fatima, et al.
Published: (2015)
by: Ahmed Mohamed, Fatima, et al.
Published: (2015)
The suitability of native application for university e-learning compared to web-based application
by: Sari, Maya Novia, et al.
Published: (2015)
by: Sari, Maya Novia, et al.
Published: (2015)
Similar Items
-
ICT in telemedicine: conquering privacy and security issues in health care services
by: Olanrewaju, Rashidah Funke, et al.
Published: (2012) -
Protecting personal medical information: Asian perspectives
by: Samsuri, Suhaila, et al.
Published: (2013) -
Critical insight for MAPReduce optimization in Hadoop
by: Khan, Burhan ul Islam, et al.
Published: (2014) -
Librocide: destruction of libraries, museum, and archives in the Muslim world
by: Mansor, Yushiana, et al.
Published: (2012) -
Privacy models for protecting personal medical information: a preliminary study
by: Samsuri, Suhaila, et al.
Published: (2011)