Unintentional information security behavior from the Qur’an and Hadith’s perspective
As the world becomes more interconnected now than decades ago, information security incidents are more prevalent in organizations. The incidents are more likely caused by insiders and they can happen with or without intentions. Although some security studies state that unintentional security inciden...
| Main Authors: | Barzak, Omar Mokhles, Abdul Molok, Nurul Nuha, Talib, Shuhaili, Mahmud, Murni |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Design for Scientific Renaissance
2016
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/79196/ http://irep.iium.edu.my/79196/1/79196_Unintentional%20Information.pdf |
Similar Items
Unintentional information security behavior from the Qur’an and hadith’s perspective
by: Barzak, Omar Mokhles, et al.
Published: (2015)
by: Barzak, Omar Mokhles, et al.
Published: (2015)
Exploring the use of online social networking among employees in Malaysian organizations: looking potential threats to information security
by: Abdul Molok , Nurul Nuha
Published: (2013)
by: Abdul Molok , Nurul Nuha
Published: (2013)
Guiding social media use: proposed values and the role of Maqasid al-Shari‘ah
by: Shompa, Zohora Azmin, et al.
Published: (2018)
by: Shompa, Zohora Azmin, et al.
Published: (2018)
Persuasive technology from Islamic perspective
by: Bawazir, Mohammed Abdullah, et al.
Published: (2018)
by: Bawazir, Mohammed Abdullah, et al.
Published: (2018)
Risk assessment model for organizational information security
by: Dioubate, Balla Mousa, et al.
Published: (2015)
by: Dioubate, Balla Mousa, et al.
Published: (2015)
Information security behavior among employees from the Islamic perspective
by: Barzak, Omar Mokhles, et al.
Published: (2016)
by: Barzak, Omar Mokhles, et al.
Published: (2016)
The information systems integration plan: for satellite remote sensing subsystems
by: Abdul Molok , Nurul Nuha
Published: (2010)
by: Abdul Molok , Nurul Nuha
Published: (2010)
Risk management at universities: illegal residents in hostels & fire cases
by: Barzak, Omar Mokhles, et al.
Published: (2014)
by: Barzak, Omar Mokhles, et al.
Published: (2014)
Responsibility-value alignment in information security governance
by: Abdul Munir, Rufizah, et al.
Published: (2018)
by: Abdul Munir, Rufizah, et al.
Published: (2018)
Islamic transformation centre for enhancing the Qur’anic and entrepreneurship knowledge and skills among youth: a conceptual solution
by: Mazlan, Mahfizah, et al.
Published: (2016)
by: Mazlan, Mahfizah, et al.
Published: (2016)
Persuasive technology in the Islamic perspective: the principles and strategies
by: Bawazir, Mohammed Abdullah, et al.
Published: (2019)
by: Bawazir, Mohammed Abdullah, et al.
Published: (2019)
أسماء التفضيل في القرآن الكريم والحديث النبوي الشريف - دارسة دلالية
The names of preference in the Quran and Hadith - Semantic Study
by: Zeki, Akram M., et al.
Published: (2018)
by: Zeki, Akram M., et al.
Published: (2018)
Qur’anic perspective on the role of education in the context of globalization: the alliance of civilization
by: Kayadibi, Saim, et al.
Published: (2009)
by: Kayadibi, Saim, et al.
Published: (2009)
Information security policy perceived compliance among staff in Palestine universities: An empirical pilot study
by: Mohammad Iriqat, Yousef, et al.
Published: (2019)
by: Mohammad Iriqat, Yousef, et al.
Published: (2019)
Disclosure of organizational information on social media: Perspectives from security managers
by: Abdul Molok , Nurul Nuha, et al.
Published: (2013)
by: Abdul Molok , Nurul Nuha, et al.
Published: (2013)
Disclosure of organizational information by employees on Facebook: Looking at the potential for information security risks
by: Abdul Molok , Nurul Nuha, et al.
Published: (2011)
by: Abdul Molok , Nurul Nuha, et al.
Published: (2011)
Research framework on KMS use: an approach anchored on the interplays between engineered and emergent organizational factors
by: Oyebisi, Ishaq Oyefolahan, et al.
Published: (2013)
by: Oyebisi, Ishaq Oyefolahan, et al.
Published: (2013)
Jangan baca al-Quran daripada telefon?
by: Abdul Rahim, Abdullah Bukhari
Published: (2019)
by: Abdul Rahim, Abdullah Bukhari
Published: (2019)
Proposing and developing Qaf online system for Quranic contests
by: Abdo Khaled, Nashwan, et al.
Published: (2019)
by: Abdo Khaled, Nashwan, et al.
Published: (2019)
Classification of Holy Quran verses based on imbalanced learning
by: Arkok, Bassam, et al.
Published: (2020)
by: Arkok, Bassam, et al.
Published: (2020)
Empirical analysis: knowledge management, the human focus and intellectual capital for innovation in smart/future universities
by: Alyami, Nuha, et al.
Published: (2015)
by: Alyami, Nuha, et al.
Published: (2015)
Study on database management system security issues
by: Mohd Yunus, Mohd Amin, et al.
Published: (2017)
by: Mohd Yunus, Mohd Amin, et al.
Published: (2017)
Information security awareness in university: maintaining learnability, performance and adaptability through roles of responsibility
by: Ahlan, Abdul Rahman, et al.
Published: (2011)
by: Ahlan, Abdul Rahman, et al.
Published: (2011)
Inadvertent Leakage of Organisational Information through Online Social Networking
by: Abdul Molok, Nurul Nuha
Published: (2014)
by: Abdul Molok, Nurul Nuha
Published: (2014)
Self awareness before social networking: exploring the user behavior and information security vulnerability in Malaysia
by: Hussin, Husnayati, et al.
Published: (2010)
by: Hussin, Husnayati, et al.
Published: (2010)
Understanding the factors of information leakage through online social networking to safeguard organizational information
by: Abdul Molok, Nurul Nuha, et al.
Published: (2010)
by: Abdul Molok, Nurul Nuha, et al.
Published: (2010)
Information leakage through online social networking: Opening the doorway for advanced persistence threats
by: Abdul Molok , Nurul Nuha, et al.
Published: (2010)
by: Abdul Molok , Nurul Nuha, et al.
Published: (2010)
Online social networking: a source of intelligence for advanced persistent threats
by: Abdul Molok , Nurul Nuha, et al.
Published: (2012)
by: Abdul Molok , Nurul Nuha, et al.
Published: (2012)
Information Leakage through online social networking: opening the doorway for advanced persistence threats
by: Abdul Molok , Nurul Nuha, et al.
Published: (2011)
by: Abdul Molok , Nurul Nuha, et al.
Published: (2011)
Exploring the use of online social networking by employees: Looking at the potential for information leakage
by: Abdul Molok, Nurul Nuha, et al.
Published: (2011)
by: Abdul Molok, Nurul Nuha, et al.
Published: (2011)
A case analysis of securing organisations against information leakage through online social networking
by: Abdul Molok, Nurul Nuha, et al.
Published: (2018)
by: Abdul Molok, Nurul Nuha, et al.
Published: (2018)
Mobile Quran app security vulnerabilities
by: Talib, Shuhaili, et al.
Published: (2015)
by: Talib, Shuhaili, et al.
Published: (2015)
Enhancing education and skill building through eduskill program
by: Ahmad Dahlan, Abdul Rahman, et al.
Published: (2015)
by: Ahmad Dahlan, Abdul Rahman, et al.
Published: (2015)
MySmartSolution Platform – a conceptual solution in
enhancing the societal wellbeing through smart-based
technology services
by: Ahmad Dahlan, Abdul Rahman, et al.
Published: (2015)
by: Ahmad Dahlan, Abdul Rahman, et al.
Published: (2015)
Information security and mutual trust as determining factors for information technology outsourcing success
by: Shittu, Abdul Jaleel Kehinde, et al.
Published: (2012)
by: Shittu, Abdul Jaleel Kehinde, et al.
Published: (2012)
Modeling G2C adoption in developing country: A case study of Malaysia
by: Hussein, Ramlah, et al.
Published: (2009)
by: Hussein, Ramlah, et al.
Published: (2009)
Administrative ethics of corporate and public administartion from the Qur'anic perspective
by: Hashi, Abdurezak Abdulahi
Published: (2011)
by: Hashi, Abdurezak Abdulahi
Published: (2011)
Development of a model for virtual leadership behavior on knowledge sharing in online programming communities
by: Al-Mashhadani, Abdulrazak F. Shahatha
Published: (2019)
by: Al-Mashhadani, Abdulrazak F. Shahatha
Published: (2019)
Information security and data protection: Selected issues
by: Zulhuda, Sonny
Published: (2013)
by: Zulhuda, Sonny
Published: (2013)
Cyber security maturity model and Maqasid al-Shari'ah
by: M. Ridza, Nadwiyah, et al.
Published: (2018)
by: M. Ridza, Nadwiyah, et al.
Published: (2018)
Similar Items
-
Unintentional information security behavior from the Qur’an and hadith’s perspective
by: Barzak, Omar Mokhles, et al.
Published: (2015) -
Exploring the use of online social networking among employees in Malaysian organizations: looking potential threats to information security
by: Abdul Molok , Nurul Nuha
Published: (2013) -
Guiding social media use: proposed values and the role of Maqasid al-Shari‘ah
by: Shompa, Zohora Azmin, et al.
Published: (2018) -
Persuasive technology from Islamic perspective
by: Bawazir, Mohammed Abdullah, et al.
Published: (2018) -
Risk assessment model for organizational information security
by: Dioubate, Balla Mousa, et al.
Published: (2015)