Persuasive technology for improving information security awareness and behavior: literature review
The use of Persuasive Technology in various fields is rapidly increasing. It can be applied in many fields such as computing, marketing, sales, environment, education, and health. Persuasive Technology has been found effective in bringing a required change in users' behaviors and attitudes. How...
| Main Authors: | Bawazir, Mohammed Abdullah, Mahmud, Murni, Abdul Molok, Nurul Nuha, Ibrahim, Jamaludin |
|---|---|
| Format: | Proceeding Paper |
| Language: | English English |
| Published: |
The Institute of Electrical and Electronics Engineers, Inc.
2016
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/55293/ http://irep.iium.edu.my/55293/2/55293_Persuasive%20Technology%20for%20Improving%20Information_SCOPUS.pdf http://irep.iium.edu.my/55293/9/55293_Persuasive%20Technology%20for%20Improving%20Information.pdf |
Similar Items
Persuasive technology from Islamic perspective
by: Bawazir, Mohammed Abdullah, et al.
Published: (2018)
by: Bawazir, Mohammed Abdullah, et al.
Published: (2018)
Persuasive technology in the Islamic perspective: the principles and strategies
by: Bawazir, Mohammed Abdullah, et al.
Published: (2019)
by: Bawazir, Mohammed Abdullah, et al.
Published: (2019)
Persuasive technology contributions toward enhance information security awareness in an organization
by: Qudaih, Hani A., et al.
Published: (2014)
by: Qudaih, Hani A., et al.
Published: (2014)
Information security awareness through the use of social media
by: Abdul Molok, Nurul Nuha, et al.
Published: (2015)
by: Abdul Molok, Nurul Nuha, et al.
Published: (2015)
Unintentional information security behavior from the Qur’an and hadith’s perspective
by: Barzak, Omar Mokhles, et al.
Published: (2015)
by: Barzak, Omar Mokhles, et al.
Published: (2015)
Information security behavior among employees from the Islamic perspective
by: Barzak, Omar Mokhles, et al.
Published: (2016)
by: Barzak, Omar Mokhles, et al.
Published: (2016)
Unintentional information security behavior from the Qur’an
and Hadith’s perspective
by: Barzak, Omar Mokhles, et al.
Published: (2016)
by: Barzak, Omar Mokhles, et al.
Published: (2016)
The effective use of video in social media as persuasive technology for charity
by: Abdul Rahman, Maryam, et al.
Published: (2017)
by: Abdul Rahman, Maryam, et al.
Published: (2017)
Exploring the use of online social networking among employees in Malaysian organizations: looking potential threats to information security
by: Abdul Molok , Nurul Nuha
Published: (2013)
by: Abdul Molok , Nurul Nuha
Published: (2013)
Disclosure of organizational information by employees on Facebook: Looking at the potential for information security risks
by: Abdul Molok , Nurul Nuha, et al.
Published: (2011)
by: Abdul Molok , Nurul Nuha, et al.
Published: (2011)
Disclosure of organizational information on social media: Perspectives from security managers
by: Abdul Molok , Nurul Nuha, et al.
Published: (2013)
by: Abdul Molok , Nurul Nuha, et al.
Published: (2013)
Exploring the factors influencing top management involvement and participation in information security
by: Abdul Munir, Rufizah, et al.
Published: (2017)
by: Abdul Munir, Rufizah, et al.
Published: (2017)
Responsibility-value alignment in information security governance
by: Abdul Munir, Rufizah, et al.
Published: (2018)
by: Abdul Munir, Rufizah, et al.
Published: (2018)
A review of persuasive technology and design to healthy lifestyle
by: Ji, Kang, et al.
Published: (2023)
by: Ji, Kang, et al.
Published: (2023)
Information security culture guidelines to improve employee’s security behavior: A review of empirical studies
by: Akhyari, N., et al.
Published: (2018)
by: Akhyari, N., et al.
Published: (2018)
Risk assessment model for organizational information security
by: Dioubate, Balla Mousa, et al.
Published: (2015)
by: Dioubate, Balla Mousa, et al.
Published: (2015)
A case analysis of securing organisations against information leakage through online social networking
by: Abdul Molok, Nurul Nuha, et al.
Published: (2018)
by: Abdul Molok, Nurul Nuha, et al.
Published: (2018)
Protecting youth from social media risks through information security practices and Islamic principles
by: Abdul Molok, Nurul Nuha, et al.
Published: (2015)
by: Abdul Molok, Nurul Nuha, et al.
Published: (2015)
Exploring persuasive technology to enhance delivery of professional services
by: Omar Basamh, Saeed Salem, et al.
Published: (2013)
by: Omar Basamh, Saeed Salem, et al.
Published: (2013)
Information security policy perceived compliance among staff in Palestine universities: An empirical pilot study
by: Mohammad Iriqat, Yousef, et al.
Published: (2019)
by: Mohammad Iriqat, Yousef, et al.
Published: (2019)
The information systems integration plan: for satellite remote sensing subsystems
by: Abdul Molok , Nurul Nuha
Published: (2010)
by: Abdul Molok , Nurul Nuha
Published: (2010)
Inadvertent Leakage of Organisational Information through Online Social Networking
by: Abdul Molok, Nurul Nuha
Published: (2014)
by: Abdul Molok, Nurul Nuha
Published: (2014)
Evolution of information security awareness towards maturity: a systematic review
by: Ahmad, Mohd Ridzam, et al.
Published: (2024)
by: Ahmad, Mohd Ridzam, et al.
Published: (2024)
Personal Information Security Awareness The Influencing Factors And The Awareness Level
by: Keong, Yew Wei
Published: (2006)
by: Keong, Yew Wei
Published: (2006)
Information technology security
by: Selamat, Siti Rahayu, et al.
Published: (2006)
by: Selamat, Siti Rahayu, et al.
Published: (2006)
Information security in ICT from an Islamic
perspective
by: Ibrahim, Jamaludin, et al.
Published: (2014)
by: Ibrahim, Jamaludin, et al.
Published: (2014)
Self awareness before social networking: exploring the user behavior and information security vulnerability in Malaysia
by: Hussin, Husnayati, et al.
Published: (2010)
by: Hussin, Husnayati, et al.
Published: (2010)
Advanced persistent threats awareness and readiness: a case study in Malaysian financial institutions
by: Zainudin, Zeti Suhana, et al.
Published: (2019)
by: Zainudin, Zeti Suhana, et al.
Published: (2019)
Evaluation of users' awareness and their reaction on information security
by: Zeki, Akram M., et al.
Published: (2016)
by: Zeki, Akram M., et al.
Published: (2016)
Mitigating privacy issues on Facebook by implementing information security awareness with Islamic perspectives
by: Faisal, Ammy Amelia, et al.
Published: (2013)
by: Faisal, Ammy Amelia, et al.
Published: (2013)
Securing e-learning environment: A study of security awareness and behavior of user
by: Wan Nurul Safawati, Wan Manan, et al.
Published: (2017)
by: Wan Nurul Safawati, Wan Manan, et al.
Published: (2017)
Understanding the factors of information leakage through online social networking to safeguard organizational information
by: Abdul Molok, Nurul Nuha, et al.
Published: (2010)
by: Abdul Molok, Nurul Nuha, et al.
Published: (2010)
Using socio-ecological model to inform the design of persuasive applications
by: Mohd Mohadis, Hazwani, et al.
Published: (2015)
by: Mohd Mohadis, Hazwani, et al.
Published: (2015)
Information technology usage in the Islamic perspective: a systematic literature review
by: Al-Rahmi, Waleed Mugahed, et al.
Published: (2017)
by: Al-Rahmi, Waleed Mugahed, et al.
Published: (2017)
Literature review : critical risk factors affecting information-technology projects
by: Sorooshian, Shahryar, et al.
Published: (2020)
by: Sorooshian, Shahryar, et al.
Published: (2020)
A literature review of information technology governance implementation in higher educations
by: Liew, Chinwei, et al.
Published: (2018)
by: Liew, Chinwei, et al.
Published: (2018)
A healthy lifestyle persuasive design model based on behavioral analysis
by: Kang, Ji, et al.
Published: (2024)
by: Kang, Ji, et al.
Published: (2024)
Future directions for behavioral information security research
by: Crossler, R., et al.
Published: (2013)
by: Crossler, R., et al.
Published: (2013)
BITS 3423-Information technology security
by: Selamat, Siti Rahayu, et al.
Published: (2006)
by: Selamat, Siti Rahayu, et al.
Published: (2006)
Employing information security awareness to minimize over-exposure of average Internet user on social networks
by: Binden, Worawit, et al.
Published: (2014)
by: Binden, Worawit, et al.
Published: (2014)
Similar Items
-
Persuasive technology from Islamic perspective
by: Bawazir, Mohammed Abdullah, et al.
Published: (2018) -
Persuasive technology in the Islamic perspective: the principles and strategies
by: Bawazir, Mohammed Abdullah, et al.
Published: (2019) -
Persuasive technology contributions toward enhance information security awareness in an organization
by: Qudaih, Hani A., et al.
Published: (2014) -
Information security awareness through the use of social media
by: Abdul Molok, Nurul Nuha, et al.
Published: (2015) -
Unintentional information security behavior from the Qur’an and hadith’s perspective
by: Barzak, Omar Mokhles, et al.
Published: (2015)