Information sharing in governance of flood management in Malaysia: COBIT based framework
Due to the frequent occurrences of catastrophic disasters worldwide, several measures and approaches have been implemented by governments in an attempt to overcome and alleviate the hazards and risks. To date, governance has been identified as a crucial element by which to drive effective Flood Mana...
| Main Authors: | Maidin, Siti Sarah, Othman, Marini, Ahmad, Mohammad Nazir |
|---|---|
| Format: | Proceeding Paper |
| Language: | English English |
| Published: |
IEEE
2014
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/58783/ http://irep.iium.edu.my/58783/7/58783-Information%20Sharing%20in%20Governance%20of%20Flood.pdf http://irep.iium.edu.my/58783/19/58783-Information%20sharing%20in%20governance%20of%20flood%20management%20in%20Malaysia_SCOPUS.pdf |
Similar Items
Governance framework for flood disaster in Malaysia: integration of COBIT and Hyogo principles
by: Maidin, Siti Sarah, et al.
Published: (2019)
by: Maidin, Siti Sarah, et al.
Published: (2019)
Managing flood in the context of education, research and partnership in Malaysia
by: Maidin, Siti Sarah, et al.
Published: (2019)
by: Maidin, Siti Sarah, et al.
Published: (2019)
Sharing of attacks information across clouds for improving security:a conceptual framework
by: Waqas, Ahmad, et al.
Published: (2014)
by: Waqas, Ahmad, et al.
Published: (2014)
Factors influence novice programmers toward test first approach
by: Yahya, Norzariyah, et al.
Published: (2019)
by: Yahya, Norzariyah, et al.
Published: (2019)
Toward managing security cost for healthcare information
by: Hameed, Shihab A., et al.
Published: (2012)
by: Hameed, Shihab A., et al.
Published: (2012)
An analysis of resource sharing scheme in heterogeneous wireless campus network
by: Masud, M.H., et al.
Published: (2013)
by: Masud, M.H., et al.
Published: (2013)
Toward user awareness and acceptance of Sudan E-government: adoption and security perspective
by: Khalifa, Othman Omran, et al.
Published: (2016)
by: Khalifa, Othman Omran, et al.
Published: (2016)
Factors affecting instructors' adoption of learning management systems: a theoretical framework
by: Abdallah, Nahel A. O., et al.
Published: (2016)
by: Abdallah, Nahel A. O., et al.
Published: (2016)
Exploring the factors influencing top management involvement and participation in information security
by: Abdul Munir, Rufizah, et al.
Published: (2017)
by: Abdul Munir, Rufizah, et al.
Published: (2017)
Health information system (HMS) in Malaysia
by: Ujan, Imran Anwar, et al.
Published: (2018)
by: Ujan, Imran Anwar, et al.
Published: (2018)
Information security for professional counseling in organization
by: Mohamed, Abdikadir Yusuf, et al.
Published: (2016)
by: Mohamed, Abdikadir Yusuf, et al.
Published: (2016)
A conceptual framework for measuring the acceptance of pervasive learning
by: Koondhar, Muhammad Yaqoob, et al.
Published: (2015)
by: Koondhar, Muhammad Yaqoob, et al.
Published: (2015)
Implementation e-government initiatives among Malaysian local authorities
by: Abu Bakar, Ahmad Bakeri, et al.
Published: (2013)
by: Abu Bakar, Ahmad Bakeri, et al.
Published: (2013)
A conceptual framework for determining acceptance of Internet of Things (IoT) in higher education institutions of Pakistan
by: Shaikh, Humaiz, et al.
Published: (2019)
by: Shaikh, Humaiz, et al.
Published: (2019)
The performance evaluation of a 3D torus network using partial link-sharing method in NoC router buffer
by: Fukase, Naohisa, et al.
Published: (2017)
by: Fukase, Naohisa, et al.
Published: (2017)
Protecting personal medical information: Asian perspectives
by: Samsuri, Suhaila, et al.
Published: (2013)
by: Samsuri, Suhaila, et al.
Published: (2013)
A conceptual framework for measuring acceptance of
contactless payment methods
by: Raza, Ali, et al.
Published: (2019)
by: Raza, Ali, et al.
Published: (2019)
Citizen experience towards humanizing digital government: a case in Malaysia
by: Hussein, Idyawati, et al.
Published: (2017)
by: Hussein, Idyawati, et al.
Published: (2017)
Information security awareness through the use of social media
by: Abdul Molok, Nurul Nuha, et al.
Published: (2015)
by: Abdul Molok, Nurul Nuha, et al.
Published: (2015)
Beyond traditional audits: the implications of information technology on auditing
by: Shaikh, Humaiz, et al.
Published: (2018)
by: Shaikh, Humaiz, et al.
Published: (2018)
Readability of COVID-19 information by the Malaysian Ministry of Health
by: Ab Hamid, Ahmad Rauyani, et al.
Published: (2020)
by: Ab Hamid, Ahmad Rauyani, et al.
Published: (2020)
International collaboration in information and communication technology of Malaysian scholars
by: Abu Bakar, Ahmad Bakeri, et al.
Published: (2013)
by: Abu Bakar, Ahmad Bakeri, et al.
Published: (2013)
Online shopping satisfaction in Malaysia: A framework for security, trust and cybercrime
by: Imtiaz Ali, Najma, et al.
Published: (2016)
by: Imtiaz Ali, Najma, et al.
Published: (2016)
Assessing digital library acceptance by postgraduate students: a proposed framework
by: Pathan, Abida Kanwal, et al.
Published: (2017)
by: Pathan, Abida Kanwal, et al.
Published: (2017)
Securing information system & computer security self-efficacy effect
by: Al-Shawabkeh, Mahmoud
Published: (2013)
by: Al-Shawabkeh, Mahmoud
Published: (2013)
Mobile agent based multi-layer security framework for cloud data centers
by: Uddin, Mueen, et al.
Published: (2015)
by: Uddin, Mueen, et al.
Published: (2015)
Measuring the impact of service quality in telecommunication services of Pakistan: a conceptual framework
by: Rind, M. Malook, et al.
Published: (2015)
by: Rind, M. Malook, et al.
Published: (2015)
Manpower model for human resource planning management
by: Halim, Siti Sarah A., et al.
Published: (2012)
by: Halim, Siti Sarah A., et al.
Published: (2012)
Privacy models for protecting personal medical information: a preliminary study
by: Samsuri, Suhaila, et al.
Published: (2011)
by: Samsuri, Suhaila, et al.
Published: (2011)
A framework for for the analysis of determinants of social media acceptance in higher educational institutions of Pakistan
by: Soomro, Ali Raza, et al.
Published: (2015)
by: Soomro, Ali Raza, et al.
Published: (2015)
Modeling user’s trust in M-commerce acceptance: A conceptual framework in context of Pakistan
by: Rind, M Malook, et al.
Published: (2016)
by: Rind, M Malook, et al.
Published: (2016)
Empirical investigation of the factors influencing the usage mobile government services: case study of Saudi Arabia
by: Zamzami, Ikhlas, et al.
Published: (2016)
by: Zamzami, Ikhlas, et al.
Published: (2016)
Artifact evaluation in information systems design science research: social constructivism environment
by: Ataie, Farib, et al.
Published: (2017)
by: Ataie, Farib, et al.
Published: (2017)
Context related rich information delivery to mobile users using smart posters
by: Ayu, Media Anugerah
Published: (2012)
by: Ayu, Media Anugerah
Published: (2012)
Node status detection and information diffusion in router network using scale-free network
by: Mahesar, Abdul Waheed, et al.
Published: (2014)
by: Mahesar, Abdul Waheed, et al.
Published: (2014)
Edward Snowden disclosures turn the fears of surveillance into reality: the impact and transformation in information security
by: Mohamed Mahmoud, Fatimetou Zahra, et al.
Published: (2016)
by: Mohamed Mahmoud, Fatimetou Zahra, et al.
Published: (2016)
Towards implementing a privacy policy: an observation on existing practices in hospital information system
by: Samsuri, Suhaila, et al.
Published: (2011)
by: Samsuri, Suhaila, et al.
Published: (2011)
Improving the quality of user experience by deploying an open access network framework in a Fiber-To-The Home environment in Malaysia
by: Ismail, Zahid, et al.
Published: (2011)
by: Ismail, Zahid, et al.
Published: (2011)
Informatics Engineering and Information Science : International Conference, ICIES 2011 Kuala Lumpur, Malaysia, November 14-16, 2011 proceedings, Part I.
Published: (2011)
Published: (2011)
An enhanced macro mobility management scheme in NEMO environment to achieve seamless handoff
by: Hassan Abdalla Hashim, Aisha, et al.
Published: (2013)
by: Hassan Abdalla Hashim, Aisha, et al.
Published: (2013)
Similar Items
-
Governance framework for flood disaster in Malaysia: integration of COBIT and Hyogo principles
by: Maidin, Siti Sarah, et al.
Published: (2019) -
Managing flood in the context of education, research and partnership in Malaysia
by: Maidin, Siti Sarah, et al.
Published: (2019) -
Sharing of attacks information across clouds for improving security:a conceptual framework
by: Waqas, Ahmad, et al.
Published: (2014) -
Factors influence novice programmers toward test first approach
by: Yahya, Norzariyah, et al.
Published: (2019) -
Toward managing security cost for healthcare information
by: Hameed, Shihab A., et al.
Published: (2012)