Attitude of students towards information access issues: The case of International Islamic University Malaysia
Among the many challenges of the information age is the information access issues. The vast array of developed technology devices have resulted in emerging many ethical issues that needs to be addressed. The continuous rapid development of ICT will continue to raise new ethical issues and students a...
| Main Authors: | Mohamud, Ibrahim Kalif, M.Khedher, Akram M. Zeki, Saidin, Aznan Zuhid |
|---|---|
| Format: | Article |
| Language: | English English |
| Published: |
Medwell Publishing
2016
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/54871/ http://irep.iium.edu.my/54871/1/54871_Attitude%20of%20students%20towards%20information.pdf http://irep.iium.edu.my/54871/2/54871_Attitude%20of%20students%20towards%20information_SCOPUS.pdf |
Similar Items
Budaya digital merentasi sempadan: hambatan kepada budaya tempatan
by: Saidin, Aznan Zuhid
Published: (2014)
by: Saidin, Aznan Zuhid
Published: (2014)
Similarities and dissimilarities between character frequencies of written text of Melayu, English and Indonesian languages
by: Shah, Asadullah, et al.
Published: (2013)
by: Shah, Asadullah, et al.
Published: (2013)
Edward Snowden disclosures turn the fears of surveillance into reality: the impact and transformation in information security
by: Mohamed Mahmoud, Fatimetou Zahra, et al.
Published: (2016)
by: Mohamed Mahmoud, Fatimetou Zahra, et al.
Published: (2016)
Consumers' perceptions towards mobile halal application system
by: Abu Bakar, Elistina, et al.
Published: (2014)
by: Abu Bakar, Elistina, et al.
Published: (2014)
Web user' knowledge and their behavior towards security threats and vulnerabilities
by: Aldossary, Alia Ahmed, et al.
Published: (2016)
by: Aldossary, Alia Ahmed, et al.
Published: (2016)
ISB watermarking embedding: block based model
by: Zeki, Akram M., et al.
Published: (2011)
by: Zeki, Akram M., et al.
Published: (2011)
Image recognition technique of road tax sticker in Malaysia
by: Alharaki, Omarah Omar, et al.
Published: (2012)
by: Alharaki, Omarah Omar, et al.
Published: (2012)
International collaboration in information and communication technology of Malaysian scholars
by: Abu Bakar, Ahmad Bakeri, et al.
Published: (2013)
by: Abu Bakar, Ahmad Bakeri, et al.
Published: (2013)
An overview and proposal for analysis of the effectiveness of human factors in Dubai e-banking system
by: Abdulghafor, Rawad, et al.
Published: (2017)
by: Abdulghafor, Rawad, et al.
Published: (2017)
Manpower model for human resource planning management
by: Halim, Siti Sarah A., et al.
Published: (2012)
by: Halim, Siti Sarah A., et al.
Published: (2012)
Improving the robustness of ISB watermarking techniques by repetition of the embedding
by: Zeki, Akram M., et al.
Published: (2011)
by: Zeki, Akram M., et al.
Published: (2011)
Digital image watermarking, analysis of current methods
by: Mohammed, Ghassan N., et al.
Published: (2012)
by: Mohammed, Ghassan N., et al.
Published: (2012)
High image quality watermarking model by using genetic algorithm
by: Mohammed, Ghassan N., et al.
Published: (2012)
by: Mohammed, Ghassan N., et al.
Published: (2012)
The Integration of GPS Navigator Device with Vehicles Tracking System for Rental Cars Firms
by: Alharaki, Omarah Omar, et al.
Published: (2010)
by: Alharaki, Omarah Omar, et al.
Published: (2010)
A watermarking authentication system for medical images
by: Zeki, Akram M., et al.
Published: (2011)
by: Zeki, Akram M., et al.
Published: (2011)
Offline OTP based solution for secure internet banking access
by: Khan, Burhan ul Islam, et al.
Published: (2019)
by: Khan, Burhan ul Islam, et al.
Published: (2019)
Linear and nonlinear stochastic distribution for consensus problem in multi-agent systems
by: Abdulghafor, Rawad, et al.
Published: (2020)
by: Abdulghafor, Rawad, et al.
Published: (2020)
Informatics Engineering and Information Science : International Conference, ICIES 2011 Kuala Lumpur, Malaysia, November 14-16, 2011 proceedings, Part I.
Published: (2011)
Published: (2011)
Mobility issues in hierarchical mobile IP
by: Hassan Abdalla Hashim, Aisha, et al.
Published: (2005)
by: Hassan Abdalla Hashim, Aisha, et al.
Published: (2005)
Determining watermark embedding strength using complex valued neural network
by: Olanrewaju, Rashidah Funke, et al.
Published: (2011)
by: Olanrewaju, Rashidah Funke, et al.
Published: (2011)
Critical socio-technical issues surrounding mobile computing
by: Mohamed, Norshidah, et al.
Published: (2016)
by: Mohamed, Norshidah, et al.
Published: (2016)
Issues in location based marketing: a review of literature
by: Jaradat, Ahmad, et al.
Published: (2015)
by: Jaradat, Ahmad, et al.
Published: (2015)
Route optimization scenario of a new scheme based on nested mobile network
by: Senan, Shayma, et al.
Published: (2012)
by: Senan, Shayma, et al.
Published: (2012)
Improving the quality of user experience by deploying an open access network framework in a Fiber-To-The Home environment in Malaysia
by: Ismail, Zahid, et al.
Published: (2011)
by: Ismail, Zahid, et al.
Published: (2011)
Attitude towards information privacy issues among students of IIUM
by: Mohamud, Ibrahim Kalif, et al.
Published: (2016)
by: Mohamud, Ibrahim Kalif, et al.
Published: (2016)
ICT in telemedicine: conquering privacy and security issues in health care services
by: Olanrewaju, Rashidah Funke, et al.
Published: (2012)
by: Olanrewaju, Rashidah Funke, et al.
Published: (2012)
Health information system (HMS) in Malaysia
by: Ujan, Imran Anwar, et al.
Published: (2018)
by: Ujan, Imran Anwar, et al.
Published: (2018)
Information security for professional counseling in organization
by: Mohamed, Abdikadir Yusuf, et al.
Published: (2016)
by: Mohamed, Abdikadir Yusuf, et al.
Published: (2016)
Toward managing security cost for healthcare information
by: Hameed, Shihab A., et al.
Published: (2012)
by: Hameed, Shihab A., et al.
Published: (2012)
Protecting personal medical information: Asian perspectives
by: Samsuri, Suhaila, et al.
Published: (2013)
by: Samsuri, Suhaila, et al.
Published: (2013)
Information security awareness through the use of social media
by: Abdul Molok, Nurul Nuha, et al.
Published: (2015)
by: Abdul Molok, Nurul Nuha, et al.
Published: (2015)
Beyond traditional audits: the implications of information technology on auditing
by: Shaikh, Humaiz, et al.
Published: (2018)
by: Shaikh, Humaiz, et al.
Published: (2018)
Readability of COVID-19 information by the Malaysian Ministry of Health
by: Ab Hamid, Ahmad Rauyani, et al.
Published: (2020)
by: Ab Hamid, Ahmad Rauyani, et al.
Published: (2020)
Securing information system & computer security self-efficacy effect
by: Al-Shawabkeh, Mahmoud
Published: (2013)
by: Al-Shawabkeh, Mahmoud
Published: (2013)
Exploring the factors influencing top management involvement and participation in information security
by: Abdul Munir, Rufizah, et al.
Published: (2017)
by: Abdul Munir, Rufizah, et al.
Published: (2017)
Information sharing in governance of flood management in Malaysia: COBIT based framework
by: Maidin, Siti Sarah, et al.
Published: (2014)
by: Maidin, Siti Sarah, et al.
Published: (2014)
Privacy models for protecting personal medical information: a preliminary study
by: Samsuri, Suhaila, et al.
Published: (2011)
by: Samsuri, Suhaila, et al.
Published: (2011)
Sharing of attacks information across clouds for improving security:a conceptual framework
by: Waqas, Ahmad, et al.
Published: (2014)
by: Waqas, Ahmad, et al.
Published: (2014)
Artifact evaluation in information systems design science research: social constructivism environment
by: Ataie, Farib, et al.
Published: (2017)
by: Ataie, Farib, et al.
Published: (2017)
Context related rich information delivery to mobile users using smart posters
by: Ayu, Media Anugerah
Published: (2012)
by: Ayu, Media Anugerah
Published: (2012)
Similar Items
-
Budaya digital merentasi sempadan: hambatan kepada budaya tempatan
by: Saidin, Aznan Zuhid
Published: (2014) -
Similarities and dissimilarities between character frequencies of written text of Melayu, English and Indonesian languages
by: Shah, Asadullah, et al.
Published: (2013) -
Edward Snowden disclosures turn the fears of surveillance into reality: the impact and transformation in information security
by: Mohamed Mahmoud, Fatimetou Zahra, et al.
Published: (2016) -
Consumers' perceptions towards mobile halal application system
by: Abu Bakar, Elistina, et al.
Published: (2014) -
Web user' knowledge and their behavior towards security threats and vulnerabilities
by: Aldossary, Alia Ahmed, et al.
Published: (2016)