ZOOM bahaya ZOOM dipakai
This presentation discusses issues of law, governance and risk management surrounding the use of web conference platform. Among the prevalent issues are security and privacy of data. It focuses on both international and Indonesian legal framework.
| Main Author: | Zulhuda, Sonny |
|---|---|
| Format: | Proceeding Paper |
| Language: | English English |
| Published: |
2020
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/80168/ http://irep.iium.edu.my/80168/1/IMG-20200415-WA0004.jpg http://irep.iium.edu.my/80168/2/Zoom%20Bahaya%20Zoom%20Dipakai.pdf |
Similar Items
Teruskan pakai Zoom atau tidak?
by: Zulhuda, Sonny
Published: (2020)
by: Zulhuda, Sonny
Published: (2020)
Big data and its legal risks
by: Zulhuda, Sonny
Published: (2014)
by: Zulhuda, Sonny
Published: (2014)
Data leak, critical information infrastructure and the legal options: what does Wikileaks teach us?
by: Abdul Ghani Azmi, Ida Madieha, et al.
Published: (2012)
by: Abdul Ghani Azmi, Ida Madieha, et al.
Published: (2012)
Decision to cast a vote: an ordinal regression statistical analysis
by: Lubis, Muharman, et al.
Published: (2014)
by: Lubis, Muharman, et al.
Published: (2014)
The impact of Covid-19 to the Cyber Security and information society – experience of Malaysia = Dampak Covid-19 terhadap keamanan cyber dan masyarakat informasi – pengalaman Malaysia
by: Zulhuda, Sonny
Published: (2020)
by: Zulhuda, Sonny
Published: (2020)
National security in Malaysia's digital economy: redefinition, reaction and legal reform
by: Zulhuda, Sonny
Published: (2011)
by: Zulhuda, Sonny
Published: (2011)
Crows zoom in on our garbage, dirt
by: Babulal, Veena
Published: (2019)
by: Babulal, Veena
Published: (2019)
Data breach on the critical information infrastructures: lessons from the Wikileaks
by: Abdul Ghani Azmi, Ida Madieha, et al.
Published: (2012)
by: Abdul Ghani Azmi, Ida Madieha, et al.
Published: (2012)
Cyberlaw and Data Protection Law
by: Zulhuda, Sonny
Published: (2016)
by: Zulhuda, Sonny
Published: (2016)
The Law of information age : quo vadis?
by: Zulhuda, Sonny
Published: (2012)
by: Zulhuda, Sonny
Published: (2012)
Transpacific partnership agreement and Internet policing?
by: Ismail, Suzi Fadhilah, et al.
Published: (2016)
by: Ismail, Suzi Fadhilah, et al.
Published: (2016)
E-Payment gateway and Internet banking system as modern business instrument and its legal basis in Malaysia
by: Zulhuda, Sonny
Published: (2012)
by: Zulhuda, Sonny
Published: (2012)
Enhancement of Auto Image Zooming using Fuzzy Set Theory
by: Elamvazuthi, I, et al.
Published: (2009)
by: Elamvazuthi, I, et al.
Published: (2009)
Analysist acceptance of video conference at zoom application using technology acceptance model
by: Djojo, Brata Wibawa, et al.
Published: (2021)
by: Djojo, Brata Wibawa, et al.
Published: (2021)
The Application of Mamdani Fuzzy Model for Auto Zoom Function of a Digital Camera
by: Vasant, Pandian
Published: (2009)
by: Vasant, Pandian
Published: (2009)
Privacy and personal data protection in electronic voting: factors and measures
by: Lubis, Muharman, et al.
Published: (2017)
by: Lubis, Muharman, et al.
Published: (2017)
Intellectual capital and corporate profitability: Zooming into value added intellectual coefficient
by: Ting, Irene Wei Kiong, et al.
Published: (2022)
by: Ting, Irene Wei Kiong, et al.
Published: (2022)
Skala ketagihan internet Chen (CIAS)
by: Al-Ani, Ali Sabri Radeef, et al.
Published: (2020)
by: Al-Ani, Ali Sabri Radeef, et al.
Published: (2020)
Aplikasi-aplikasi yang digunakan sepanjang tempoh perintah kawalan pergerakan (PKP)
by: Abu Bakar, Irni Izwah
Published: (2020)
by: Abu Bakar, Irni Izwah
Published: (2020)
Web-based e-learning systems acceptance and success: a review of contributing factors from the instructors’ perception
by: Oyefolahan, Ishaq Oyebisi, et al.
Published: (2014)
by: Oyefolahan, Ishaq Oyebisi, et al.
Published: (2014)
Positive impact of smartphone application: whatsapp &
facebook for online business
by: Ibrahim, Jamaludin, et al.
Published: (2014)
by: Ibrahim, Jamaludin, et al.
Published: (2014)
Mobile Quran app security vulnerabilities
by: Talib, Shuhaili, et al.
Published: (2015)
by: Talib, Shuhaili, et al.
Published: (2015)
Information security in ICT from an Islamic
perspective
by: Ibrahim, Jamaludin, et al.
Published: (2014)
by: Ibrahim, Jamaludin, et al.
Published: (2014)
The role of IT consulting practice: a successful enterprise mobility solution
by: Fakhri, Nurul Fahimah, et al.
Published: (2015)
by: Fakhri, Nurul Fahimah, et al.
Published: (2015)
The knowledge management strategies used as a tool within and through strategic consulting firms to increase the organisational performance
by: Mohamed Mahmoud, Fatimetou Zahra, et al.
Published: (2015)
by: Mohamed Mahmoud, Fatimetou Zahra, et al.
Published: (2015)
Comparison of Business Model Canvas (BMC) among the three consulting companies
by: Azhar Amanullah, Ayn Nur Azhana, et al.
Published: (2015)
by: Azhar Amanullah, Ayn Nur Azhana, et al.
Published: (2015)
Potential use of data mining techniques in information technology consulting operations
by: Qadri, Mehran, et al.
Published: (2015)
by: Qadri, Mehran, et al.
Published: (2015)
Cloud computing: cloud adoption in professional practice
by: Nazri, Nadhirah, et al.
Published: (2015)
by: Nazri, Nadhirah, et al.
Published: (2015)
Information security aligned to enterprise management
by: Abdullah, Istikoma, et al.
Published: (2015)
by: Abdullah, Istikoma, et al.
Published: (2015)
How much privacy we still have on social network?
by: Chewae, Mafaisu, et al.
Published: (2015)
by: Chewae, Mafaisu, et al.
Published: (2015)
Enterprise information architecture of a Malaysian institute of higher learning management information system: an experience
by: Suhaimi, Mohd Adam, et al.
Published: (2014)
by: Suhaimi, Mohd Adam, et al.
Published: (2014)
Privacy concern and perceived benefits towards privacy and election in Indonesia
by: Lubis, Muharman, et al.
Published: (2014)
by: Lubis, Muharman, et al.
Published: (2014)
Steganography: a review of information security research and development in Muslim world
by: Yunus, Yunura Azura, et al.
Published: (2013)
by: Yunus, Yunura Azura, et al.
Published: (2013)
Designing persuasive application to encourage physical activity at workplace among older workers
by: Mohd Mohadis, Hazwani, et al.
Published: (2016)
by: Mohd Mohadis, Hazwani, et al.
Published: (2016)
A study of smartphone usage and barriers among the elderly
by: Mohd Mohadis, Hazwani, et al.
Published: (2014)
by: Mohd Mohadis, Hazwani, et al.
Published: (2014)
Using socio-ecological model to inform the design of persuasive applications
by: Mohd Mohadis, Hazwani, et al.
Published: (2015)
by: Mohd Mohadis, Hazwani, et al.
Published: (2015)
Motivators and barriers for physical activity in older workers: a socio-ecological exploration
by: Mohd Mohadis, Hazwani, et al.
Published: (2016)
by: Mohd Mohadis, Hazwani, et al.
Published: (2016)
Knowledge management practice in private sector: building
the way for Saudi Arabia strategic growth and transformation to knowledge-based economy
by: Gharamah, Abdulrahman, et al.
Published: (2018)
by: Gharamah, Abdulrahman, et al.
Published: (2018)
Impersonate affecting users' attitude toward facebook in Egypt
by: Hassan El Hoby, Hany Mohamed, et al.
Published: (2016)
by: Hassan El Hoby, Hany Mohamed, et al.
Published: (2016)
Multi-layered alert filtration and feedback cycle using Brahms model
by: Ghaffar, Abid, et al.
Published: (2016)
by: Ghaffar, Abid, et al.
Published: (2016)
Similar Items
-
Teruskan pakai Zoom atau tidak?
by: Zulhuda, Sonny
Published: (2020) -
Big data and its legal risks
by: Zulhuda, Sonny
Published: (2014) -
Data leak, critical information infrastructure and the legal options: what does Wikileaks teach us?
by: Abdul Ghani Azmi, Ida Madieha, et al.
Published: (2012) -
Decision to cast a vote: an ordinal regression statistical analysis
by: Lubis, Muharman, et al.
Published: (2014) -
The impact of Covid-19 to the Cyber Security and information society – experience of Malaysia = Dampak Covid-19 terhadap keamanan cyber dan masyarakat informasi – pengalaman Malaysia
by: Zulhuda, Sonny
Published: (2020)