Responsibility-value alignment in information security governance
This paper contributes by discussing the categorization of responsibilities of top management in information security to the four (4) leadership characteristics in Islam as defined and showed by the Prophet Muhammad (PBUH). Contemporary studies, mostly from the West explores the responsibilities of...
| Main Authors: | Abdul Munir, Rufizah, Talib, Shuhaili, Abdul Molok, Nurul Nuha, Ahmad, Mohd Ridzuan |
|---|---|
| Format: | Proceeding Paper |
| Language: | English English English |
| Published: |
Institute of Electrical and Electronics Engineers Inc.
2018
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/72690/ http://irep.iium.edu.my/72690/1/72690_Responsibility-value%20alignment%20in%20information.pdf http://irep.iium.edu.my/72690/2/72690_Responsibility-value%20alignment%20in%20information_SCOPUS.pdf http://irep.iium.edu.my/72690/3/72690_Responsibility-value%20alignment%20in%20information_WOS.pdf |
Similar Items
Exploring the factors influencing top management involvement and participation in information security
by: Abdul Munir, Rufizah, et al.
Published: (2017)
by: Abdul Munir, Rufizah, et al.
Published: (2017)
Information security awareness through the use of social media
by: Abdul Molok, Nurul Nuha, et al.
Published: (2015)
by: Abdul Molok, Nurul Nuha, et al.
Published: (2015)
IslamTAM: revising technology acceptance model from the Islamic perspective
by: Alyami, Mona, et al.
Published: (2019)
by: Alyami, Mona, et al.
Published: (2019)
Unintentional information security behavior from the Qur’an
and Hadith’s perspective
by: Barzak, Omar Mokhles, et al.
Published: (2016)
by: Barzak, Omar Mokhles, et al.
Published: (2016)
Securing information system & computer security self-efficacy effect
by: Al-Shawabkeh, Mahmoud
Published: (2013)
by: Al-Shawabkeh, Mahmoud
Published: (2013)
Information security for professional counseling in organization
by: Mohamed, Abdikadir Yusuf, et al.
Published: (2016)
by: Mohamed, Abdikadir Yusuf, et al.
Published: (2016)
A comparative review of ISMS implementation based on ISO 27000 Series in organizations of different business sectors
by: Hamdi, Zaidatulnajla, et al.
Published: (2019)
by: Hamdi, Zaidatulnajla, et al.
Published: (2019)
Toward managing security cost for healthcare information
by: Hameed, Shihab A., et al.
Published: (2012)
by: Hameed, Shihab A., et al.
Published: (2012)
An analysis of information security awareness within home and work environments
by: Talib, Shuhaili, et al.
Published: (2010)
by: Talib, Shuhaili, et al.
Published: (2010)
A rule-based question answering system on relevant documents of Indonesian Quran translation
by: Gusmita, Ria Hari, et al.
Published: (2014)
by: Gusmita, Ria Hari, et al.
Published: (2014)
Toward user awareness and acceptance of Sudan E-government: adoption and security perspective
by: Khalifa, Othman Omran, et al.
Published: (2016)
by: Khalifa, Othman Omran, et al.
Published: (2016)
Investigation of forces affecting dust particle alignment in cross polarization
by: Musa, Abdulwaheed, et al.
Published: (2014)
by: Musa, Abdulwaheed, et al.
Published: (2014)
Sharing of attacks information across clouds for improving security:a conceptual framework
by: Waqas, Ahmad, et al.
Published: (2014)
by: Waqas, Ahmad, et al.
Published: (2014)
Edward Snowden disclosures turn the fears of surveillance into reality: the impact and transformation in information security
by: Mohamed Mahmoud, Fatimetou Zahra, et al.
Published: (2016)
by: Mohamed Mahmoud, Fatimetou Zahra, et al.
Published: (2016)
Information sharing in governance of flood management in Malaysia: COBIT based framework
by: Maidin, Siti Sarah, et al.
Published: (2014)
by: Maidin, Siti Sarah, et al.
Published: (2014)
A conceptual framework for measuring the acceptance of pervasive learning
by: Koondhar, Muhammad Yaqoob, et al.
Published: (2015)
by: Koondhar, Muhammad Yaqoob, et al.
Published: (2015)
Persuasive technology from Islamic perspective
by: Bawazir, Mohammed Abdullah, et al.
Published: (2018)
by: Bawazir, Mohammed Abdullah, et al.
Published: (2018)
Security and privacy for IoT and fog computing paradigm
by: Rauf, Abdul, et al.
Published: (2018)
by: Rauf, Abdul, et al.
Published: (2018)
A methodology for modelling and analysis of secure systems using security patterns and mitigation use cases
by: Maher, Zulfikar Ahmad, et al.
Published: (2018)
by: Maher, Zulfikar Ahmad, et al.
Published: (2018)
Predicting the fraud volume in personal computer using different web browsers
by: Z, Nuha, et al.
Published: (2017)
by: Z, Nuha, et al.
Published: (2017)
Mobile security and privacy in smartphone technology
by: Ibrahim, Mohamed, et al.
Published: (2015)
by: Ibrahim, Mohamed, et al.
Published: (2015)
Encryption method for SCADA security enhancement
by: Shahzad, Aamir, et al.
Published: (2014)
by: Shahzad, Aamir, et al.
Published: (2014)
ICT in telemedicine: conquering privacy and security issues in health care services
by: Olanrewaju, Rashidah Funke, et al.
Published: (2012)
by: Olanrewaju, Rashidah Funke, et al.
Published: (2012)
Predicting the fraud volume in the advent of internet enabled handheld devices
by: Zammarah, Nuha Abdullah, et al.
Published: (2015)
by: Zammarah, Nuha Abdullah, et al.
Published: (2015)
A secure authentication scheme for bluetooth connection
by: Diallo, Alhassane Saliou, et al.
Published: (2014)
by: Diallo, Alhassane Saliou, et al.
Published: (2014)
Perception analysis of social networks’ privacy policy: Instagram as a case study
by: Talib, Shuhaili, et al.
Published: (2014)
by: Talib, Shuhaili, et al.
Published: (2014)
Mobile agent based multi-layer security framework for cloud data centers
by: Uddin, Mueen, et al.
Published: (2015)
by: Uddin, Mueen, et al.
Published: (2015)
The future of data privacy and security concerns in
Internet of things
by: Solangi, Zulfiqar Ali, et al.
Published: (2018)
by: Solangi, Zulfiqar Ali, et al.
Published: (2018)
Robust and secure image steganography based on elliptic curve cryptography
by: Ahmed, Diaa Eldein Mustafa, et al.
Published: (2014)
by: Ahmed, Diaa Eldein Mustafa, et al.
Published: (2014)
Bayesian signaling game based efficient security model for MANETs
by: Olanrewaju, Rashidah Funke, et al.
Published: (2020)
by: Olanrewaju, Rashidah Funke, et al.
Published: (2020)
Offline OTP based solution for secure internet banking access
by: Khan, Burhan ul Islam, et al.
Published: (2019)
by: Khan, Burhan ul Islam, et al.
Published: (2019)
Web user' knowledge and their behavior towards security threats and vulnerabilities
by: Aldossary, Alia Ahmed, et al.
Published: (2016)
by: Aldossary, Alia Ahmed, et al.
Published: (2016)
Mobility based surveillance model to facilitate security of individuals’ properties
by: Hameed, Shihab A.
Published: (2013)
by: Hameed, Shihab A.
Published: (2013)
MARKCLOUD - Software for data confidentiality and security in cloud computing environments
by: Olanrewaju, Rashidah Funke, et al.
Published: (2014)
by: Olanrewaju, Rashidah Funke, et al.
Published: (2014)
Deployment of new dynamic cryptography buffer for SCADA security enhancement
by: Aamir, Shahzad, et al.
Published: (2014)
by: Aamir, Shahzad, et al.
Published: (2014)
Preliminary study for customer’s online shopping satisfaction from security perspective
by: Imtiaz Ali, Najma, et al.
Published: (2018)
by: Imtiaz Ali, Najma, et al.
Published: (2018)
Factors affecting secure software development practices among developers- an investigation
by: Ahmed Maher, Zulfikar, et al.
Published: (2019)
by: Ahmed Maher, Zulfikar, et al.
Published: (2019)
Online shopping satisfaction in Malaysia: A framework for security, trust and cybercrime
by: Imtiaz Ali, Najma, et al.
Published: (2016)
by: Imtiaz Ali, Najma, et al.
Published: (2016)
Using biometric techniques to secure online student assessment: Comparative study
by: Ibrahim, Jamaludin, et al.
Published: (2011)
by: Ibrahim, Jamaludin, et al.
Published: (2011)
Social networks privacy policy awareness among undergraduate students: the case of Twitter
by: Talib, Shuhaili, et al.
Published: (2014)
by: Talib, Shuhaili, et al.
Published: (2014)
Similar Items
-
Exploring the factors influencing top management involvement and participation in information security
by: Abdul Munir, Rufizah, et al.
Published: (2017) -
Information security awareness through the use of social media
by: Abdul Molok, Nurul Nuha, et al.
Published: (2015) -
IslamTAM: revising technology acceptance model from the Islamic perspective
by: Alyami, Mona, et al.
Published: (2019) -
Unintentional information security behavior from the Qur’an
and Hadith’s perspective
by: Barzak, Omar Mokhles, et al.
Published: (2016) -
Securing information system & computer security self-efficacy effect
by: Al-Shawabkeh, Mahmoud
Published: (2013)