A case analysis of securing organisations against information leakage through online social networking
The inadvertent leakage of sensitive information through Online Social Networking (OSN) represents a significant source of security risk to organisations. Leakage of sensitive information such as trade secrets, intellectual property and personal details of employees can result in a loss of competiti...
| Main Authors: | Abdul Molok, Nurul Nuha, Ahmad, Atif, Chang, Shanton |
|---|---|
| Format: | Article |
| Language: | English English English |
| Published: |
Elsevier
2018
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/66930/ http://irep.iium.edu.my/66930/12/66930_A%20case%20analysis%20of%20securing%20organisations_scopus.pdf http://irep.iium.edu.my/66930/18/66930_A%20case%20analysis%20of%20securing%20organisations.pdf http://irep.iium.edu.my/66930/19/66930_A%20case%20analysis%20of%20securing%20organisations_WOS.pdf |
Similar Items
Inadvertent Leakage of Organisational Information through Online Social Networking
by: Abdul Molok, Nurul Nuha
Published: (2014)
by: Abdul Molok, Nurul Nuha
Published: (2014)
Exploring the use of online social networking by employees: Looking at the potential for information leakage
by: Abdul Molok, Nurul Nuha, et al.
Published: (2011)
by: Abdul Molok, Nurul Nuha, et al.
Published: (2011)
Understanding the factors of information leakage through online social networking to safeguard organizational information
by: Abdul Molok, Nurul Nuha, et al.
Published: (2010)
by: Abdul Molok, Nurul Nuha, et al.
Published: (2010)
Information leakage through online social networking: Opening the doorway for advanced persistence threats
by: Abdul Molok , Nurul Nuha, et al.
Published: (2010)
by: Abdul Molok , Nurul Nuha, et al.
Published: (2010)
Information Leakage through online social networking: opening the doorway for advanced persistence threats
by: Abdul Molok , Nurul Nuha, et al.
Published: (2011)
by: Abdul Molok , Nurul Nuha, et al.
Published: (2011)
Disclosure of organizational information on social media: Perspectives from security managers
by: Abdul Molok , Nurul Nuha, et al.
Published: (2013)
by: Abdul Molok , Nurul Nuha, et al.
Published: (2013)
Disclosure of organizational information by employees on Facebook: Looking at the potential for information security risks
by: Abdul Molok , Nurul Nuha, et al.
Published: (2011)
by: Abdul Molok , Nurul Nuha, et al.
Published: (2011)
Online social networking: a source of intelligence for advanced persistent threats
by: Abdul Molok , Nurul Nuha, et al.
Published: (2012)
by: Abdul Molok , Nurul Nuha, et al.
Published: (2012)
Socio-technical mitigation effort to combat cyber propaganda: a systematic literature mapping
by: Maseri, Aimi Nadrah, et al.
Published: (2020)
by: Maseri, Aimi Nadrah, et al.
Published: (2020)
KAED website updating work progress & KAED website: data entry template
by: Yaali, Syarel Azill, et al.
Published: (2017)
by: Yaali, Syarel Azill, et al.
Published: (2017)
Critical information security challenges: an appraisal
by: Shuhaib Mir, Mohammad, et al.
Published: (2013)
by: Shuhaib Mir, Mohammad, et al.
Published: (2013)
The usage of smartphone among Malaysian university students
by: Ariff, Aishah, et al.
Published: (2018)
by: Ariff, Aishah, et al.
Published: (2018)
Training: Google Apps 101
by: Yaali, Syarel Azill, et al.
Published: (2017)
by: Yaali, Syarel Azill, et al.
Published: (2017)
Quality rating of islamic websites features : A single user evaluation
by: Mahmud, Murni, et al.
Published: (2010)
by: Mahmud, Murni, et al.
Published: (2010)
Mobile phone appropriation of students and staff at an institution of higher learning
by: Abdul Karim, Nor Shariza, et al.
Published: (2010)
by: Abdul Karim, Nor Shariza, et al.
Published: (2010)
A 10 C’s of social networking, interconnections and the impact on social networking
by: Dar, Humaira, et al.
Published: (2013)
by: Dar, Humaira, et al.
Published: (2013)
Design and evaluation of network mobility protocol to achieve seamless handoff
by: Hassan Abdalla Hashim, Aisha
Published: (2012)
by: Hassan Abdalla Hashim, Aisha
Published: (2012)
Spam e-mail: how Malaysian e-mail users deal with it?
by: Bujang, Yanti Rosmunie, et al.
Published: (2010)
by: Bujang, Yanti Rosmunie, et al.
Published: (2010)
Exploring the factors influencing top management involvement and participation in information security
by: Abdul Munir, Rufizah, et al.
Published: (2017)
by: Abdul Munir, Rufizah, et al.
Published: (2017)
Information security awareness through the use of social media
by: Abdul Molok, Nurul Nuha, et al.
Published: (2015)
by: Abdul Molok, Nurul Nuha, et al.
Published: (2015)
Proposed five (5) new standard of procedures (SOP) for KAED announcement
by: Yaali, Syarel Azill, et al.
Published: (2018)
by: Yaali, Syarel Azill, et al.
Published: (2018)
KAED website updating work progress as of 31st March 2017.
by: Yaali, Syarel Azill, et al.
Published: (2017)
by: Yaali, Syarel Azill, et al.
Published: (2017)
Report on IIUM event management checklist and KAED-ICT SOPs
by: Yaali, Syarel Azill, et al.
Published: (2017)
by: Yaali, Syarel Azill, et al.
Published: (2017)
Fault tolerant cloud auditing
by: Muhammed Yusof, Zulkefli, et al.
Published: (2013)
by: Muhammed Yusof, Zulkefli, et al.
Published: (2013)
Should we be concerned with spam emails? A look at its impacts and implications
by: Bujang, Yanti Rosmunie, et al.
Published: (2013)
by: Bujang, Yanti Rosmunie, et al.
Published: (2013)
Codification or personalization: a consideration on the suitable approach for organizations
by: Supar, Norizah
Published: (2013)
by: Supar, Norizah
Published: (2013)
A comparative review of ISMS implementation based on ISO 27000 Series in organizations of different business sectors
by: Hamdi, Zaidatulnajla, et al.
Published: (2019)
by: Hamdi, Zaidatulnajla, et al.
Published: (2019)
KAED website works 2018: samples of announcement
by: Yaali, Syarel Azill, et al.
Published: (2018)
by: Yaali, Syarel Azill, et al.
Published: (2018)
Information security policy perceived compliance among staff in Palestine universities: An empirical pilot study
by: Mohammad Iriqat, Yousef, et al.
Published: (2019)
by: Mohammad Iriqat, Yousef, et al.
Published: (2019)
Proposed new standard of procedures (SOPs) for announcement in New IIUM/KAED website
by: Yaali, Syarel Azill, et al.
Published: (2018)
by: Yaali, Syarel Azill, et al.
Published: (2018)
Report of KAED website assessment
by: Yaali, Syarel Azill, et al.
Published: (2016)
by: Yaali, Syarel Azill, et al.
Published: (2016)
A conceptual framework for measuring the acceptance of pervasive learning
by: Koondhar, Muhammad Yaqoob, et al.
Published: (2015)
by: Koondhar, Muhammad Yaqoob, et al.
Published: (2015)
Securing information system & computer security self-efficacy effect
by: Al-Shawabkeh, Mahmoud
Published: (2013)
by: Al-Shawabkeh, Mahmoud
Published: (2013)
Evaluating the design features of Islamic website: a Muslim user perception
by: Aliyu, Mansur, et al.
Published: (2013)
by: Aliyu, Mansur, et al.
Published: (2013)
A methodology for modelling and analysis of secure systems using security patterns and mitigation use cases
by: Maher, Zulfikar Ahmad, et al.
Published: (2018)
by: Maher, Zulfikar Ahmad, et al.
Published: (2018)
Predicting the fraud volume in personal computer using different web browsers
by: Z, Nuha, et al.
Published: (2017)
by: Z, Nuha, et al.
Published: (2017)
Mobile security and privacy in smartphone technology
by: Ibrahim, Mohamed, et al.
Published: (2015)
by: Ibrahim, Mohamed, et al.
Published: (2015)
Information security for professional counseling in organization
by: Mohamed, Abdikadir Yusuf, et al.
Published: (2016)
by: Mohamed, Abdikadir Yusuf, et al.
Published: (2016)
Encryption method for SCADA security enhancement
by: Shahzad, Aamir, et al.
Published: (2014)
by: Shahzad, Aamir, et al.
Published: (2014)
Predicting the fraud volume in the advent of internet enabled handheld devices
by: Zammarah, Nuha Abdullah, et al.
Published: (2015)
by: Zammarah, Nuha Abdullah, et al.
Published: (2015)
Similar Items
-
Inadvertent Leakage of Organisational Information through Online Social Networking
by: Abdul Molok, Nurul Nuha
Published: (2014) -
Exploring the use of online social networking by employees: Looking at the potential for information leakage
by: Abdul Molok, Nurul Nuha, et al.
Published: (2011) -
Understanding the factors of information leakage through online social networking to safeguard organizational information
by: Abdul Molok, Nurul Nuha, et al.
Published: (2010) -
Information leakage through online social networking: Opening the doorway for advanced persistence threats
by: Abdul Molok , Nurul Nuha, et al.
Published: (2010) -
Information Leakage through online social networking: opening the doorway for advanced persistence threats
by: Abdul Molok , Nurul Nuha, et al.
Published: (2011)