Skip to content
VuFind
Advanced
  • Responsibility-value alignment...
  • Cite this
  • Print
  • Export Record
    • Export to RefWorks
    • Export to EndNoteWeb
    • Export to EndNote
Responsibility-value alignment in information security governance
QR Code

Responsibility-value alignment in information security governance

This paper contributes by discussing the categorization of responsibilities of top management in information security to the four (4) leadership characteristics in Islam as defined and showed by the Prophet Muhammad (PBUH). Contemporary studies, mostly from the West explores the responsibilities of...

Full description

Bibliographic Details
Main Authors: Abdul Munir, Rufizah, Talib, Shuhaili, Abdul Molok, Nurul Nuha, Ahmad, Mohd Ridzuan
Format: Proceeding Paper
Language:English
English
English
Published: Institute of Electrical and Electronics Engineers Inc. 2018
Subjects:
T10.5 Communication of technical information
T173.5 Technology and Islam
Online Access:http://irep.iium.edu.my/72690/
http://irep.iium.edu.my/72690/1/72690_Responsibility-value%20alignment%20in%20information.pdf
http://irep.iium.edu.my/72690/2/72690_Responsibility-value%20alignment%20in%20information_SCOPUS.pdf
http://irep.iium.edu.my/72690/3/72690_Responsibility-value%20alignment%20in%20information_WOS.pdf
  • Holdings
  • Description
  • Similar Items
  • Staff View

Internet

http://irep.iium.edu.my/72690/
http://irep.iium.edu.my/72690/1/72690_Responsibility-value%20alignment%20in%20information.pdf
http://irep.iium.edu.my/72690/2/72690_Responsibility-value%20alignment%20in%20information_SCOPUS.pdf
http://irep.iium.edu.my/72690/3/72690_Responsibility-value%20alignment%20in%20information_WOS.pdf

Similar Items

  • Exploring the factors influencing top management involvement and participation in information security
    by: Abdul Munir, Rufizah, et al.
    Published: (2017)
  • Information security awareness through the use of social media
    by: Abdul Molok, Nurul Nuha, et al.
    Published: (2015)
  • IslamTAM: revising technology acceptance model from the Islamic perspective
    by: Alyami, Mona, et al.
    Published: (2019)
  • Unintentional information security behavior from the Qur’an and Hadith’s perspective
    by: Barzak, Omar Mokhles, et al.
    Published: (2016)
  • Securing information system & computer security self-efficacy effect
    by: Al-Shawabkeh, Mahmoud
    Published: (2013)

Search Options

  • Advanced Search

Find More

  • Browse the Catalog

Need Help?

  • Search Tips