Socio-technical mitigation effort to combat cyber propaganda: a systematic literature mapping
This systematic mapping literature aims to identify current research and directions for future studies in terms of combating cyber propaganda in the social media, which is used by both human effort and technological approaches (socio-technical) for mitigation. Out of 5176 retrieved articles, only 98...
| Main Authors: | Maseri, Aimi Nadrah, Norman, Azah Anir, Eke, Christopher Ifeanyi, Ahmad, Atif, Abdul Molok, Nurul Nuha |
|---|---|
| Format: | Article |
| Language: | English English English |
| Published: |
Institute of Electrical and Electronics Engineers Inc.
2020
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/81362/ http://irep.iium.edu.my/81362/1/81362-Socio-Technical%20Mitigation%20Effort%20to%20Combat%20Cyber.pdf http://irep.iium.edu.my/81362/2/81362-Socio-Technical%20Mitigation%20Effort%20to%20Combat%20Cyber_SCOPUS.pdf http://irep.iium.edu.my/81362/3/81362-Socio-Technical%20Mitigation%20Effort%20to%20Combat%20Cyber_WOS.pdf |
Similar Items
Understanding the factors of information leakage through online social networking to safeguard organizational information
by: Abdul Molok, Nurul Nuha, et al.
Published: (2010)
by: Abdul Molok, Nurul Nuha, et al.
Published: (2010)
Information leakage through online social networking: Opening the doorway for advanced persistence threats
by: Abdul Molok , Nurul Nuha, et al.
Published: (2010)
by: Abdul Molok , Nurul Nuha, et al.
Published: (2010)
Online social networking: a source of intelligence for advanced persistent threats
by: Abdul Molok , Nurul Nuha, et al.
Published: (2012)
by: Abdul Molok , Nurul Nuha, et al.
Published: (2012)
Disclosure of organizational information by employees on Facebook: Looking at the potential for information security risks
by: Abdul Molok , Nurul Nuha, et al.
Published: (2011)
by: Abdul Molok , Nurul Nuha, et al.
Published: (2011)
Disclosure of organizational information on social media: Perspectives from security managers
by: Abdul Molok , Nurul Nuha, et al.
Published: (2013)
by: Abdul Molok , Nurul Nuha, et al.
Published: (2013)
Information Leakage through online social networking: opening the doorway for advanced persistence threats
by: Abdul Molok , Nurul Nuha, et al.
Published: (2011)
by: Abdul Molok , Nurul Nuha, et al.
Published: (2011)
Exploring the use of online social networking by employees: Looking at the potential for information leakage
by: Abdul Molok, Nurul Nuha, et al.
Published: (2011)
by: Abdul Molok, Nurul Nuha, et al.
Published: (2011)
Inadvertent Leakage of Organisational Information through Online Social Networking
by: Abdul Molok, Nurul Nuha
Published: (2014)
by: Abdul Molok, Nurul Nuha
Published: (2014)
A case analysis of securing organisations against information leakage through online social networking
by: Abdul Molok, Nurul Nuha, et al.
Published: (2018)
by: Abdul Molok, Nurul Nuha, et al.
Published: (2018)
The information systems integration plan: for satellite remote sensing subsystems
by: Abdul Molok , Nurul Nuha
Published: (2010)
by: Abdul Molok , Nurul Nuha
Published: (2010)
Exploring the use of online social networking among employees in Malaysian organizations: looking potential threats to information security
by: Abdul Molok , Nurul Nuha
Published: (2013)
by: Abdul Molok , Nurul Nuha
Published: (2013)
A comparative review of ISMS implementation based on ISO 27000 Series in organizations of different business sectors
by: Hamdi, Zaidatulnajla, et al.
Published: (2019)
by: Hamdi, Zaidatulnajla, et al.
Published: (2019)
Codification or personalization: a consideration on the suitable approach for organizations
by: Supar, Norizah
Published: (2013)
by: Supar, Norizah
Published: (2013)
Citizen, cyber government and the legal aspects
by: Zulhuda, Sonny
Published: (2014)
by: Zulhuda, Sonny
Published: (2014)
Information security policy perceived compliance among staff in Palestine universities: An empirical pilot study
by: Mohammad Iriqat, Yousef, et al.
Published: (2019)
by: Mohammad Iriqat, Yousef, et al.
Published: (2019)
Multi-feature fusion framework for automatic sarcasm identification in Twitter data / Christopher Ifeanyi Eke
by: Christopher , Ifeanyi Eke
Published: (2021)
by: Christopher , Ifeanyi Eke
Published: (2021)
Enhancing the socio-economic well-being in Egypt by
harnessing the capabilities of e-learning programs along
with promoting Islamic teachings and values
by: Ahmad Dahlan, Abdul Rahman, et al.
Published: (2015)
by: Ahmad Dahlan, Abdul Rahman, et al.
Published: (2015)
Knowledge management systems use and competency development among knowledge workers: The role of socio-technical antecedents in developing autonomous motivation to use
by: Oyefolahan, Ishaq Oyebisi, et al.
Published: (2013)
by: Oyefolahan, Ishaq Oyebisi, et al.
Published: (2013)
Empirical analysis: knowledge management, the human focus and intellectual capital for innovation in smart/future universities
by: Alyami, Nuha, et al.
Published: (2015)
by: Alyami, Nuha, et al.
Published: (2015)
The Information Research Department, British covert propaganda, and the Sino-Indian War of 1962: combating communism and courting failure?
by: McGarr, Paul M.
Published: (2017)
by: McGarr, Paul M.
Published: (2017)
Privasi vs data peribadi (Privacy To Personal Data Protection: Conceptual and Contextual Landscape)
by: Zulhuda, Sonny
Published: (2017)
by: Zulhuda, Sonny
Published: (2017)
Cabaran PDPA dalam ekonomi digital (PDPA and the challenges of digital economy)
by: Zulhuda, Sonny
Published: (2017)
by: Zulhuda, Sonny
Published: (2017)
Big data, cloud and "bring your own device": how the data protection law addresses the impact of 'datafication'
by: Zulhuda, Sonny, et al.
Published: (2015)
by: Zulhuda, Sonny, et al.
Published: (2015)
Unintentional information security behavior from the Qur’an
and Hadith’s perspective
by: Barzak, Omar Mokhles, et al.
Published: (2016)
by: Barzak, Omar Mokhles, et al.
Published: (2016)
Assessment of internet banking services continued
use: role of socio-cognitive and relational view
by: Kartiwi, Mira, et al.
Published: (2018)
by: Kartiwi, Mira, et al.
Published: (2018)
Risk assessment model for organizational information security
by: Dioubate, Balla Mousa, et al.
Published: (2015)
by: Dioubate, Balla Mousa, et al.
Published: (2015)
Unintentional information security behavior from the Qur’an and hadith’s perspective
by: Barzak, Omar Mokhles, et al.
Published: (2015)
by: Barzak, Omar Mokhles, et al.
Published: (2015)
Perception, attitude and impact change after watching faith-based films: a comparative study
by: Wok, Saodah, et al.
Published: (2014)
by: Wok, Saodah, et al.
Published: (2014)
Online newspapers use and homeland political participation potentials of the Nigerian students in Malaysia
by: Mustapha, Lambe Kayode, et al.
Published: (2014)
by: Mustapha, Lambe Kayode, et al.
Published: (2014)
Setting agenda abroad: exploring the agenda-setting potential of homeland online newspapers on perceptions of elections issues among diasporic Nigerians in Malaysia
by: Mustapha, Lambe Kayode, et al.
Published: (2013)
by: Mustapha, Lambe Kayode, et al.
Published: (2013)
Online newspapers reporting of homeland politics to diasporic Nigerians during the 2011 Nigerian presidential election: a perspective from Malaysia
by: Mustapha, Lambe Kayode, et al.
Published: (2013)
by: Mustapha, Lambe Kayode, et al.
Published: (2013)
Perceived credibility and consumption of homeland news among diasporic Nigerians in Malaysia
by: Mustapha, Lambe Kayode, et al.
Published: (2014)
by: Mustapha, Lambe Kayode, et al.
Published: (2014)
The past and coming communication journey in Malaysia
by: Idid, Syed Arabi
Published: (2014)
by: Idid, Syed Arabi
Published: (2014)
Perceived credibility and consumption of homeland news among diasporic Nigerians in Malaysia
by: Mustapha, Lambe Kayode, et al.
Published: (2015)
by: Mustapha, Lambe Kayode, et al.
Published: (2015)
Matching types of social media sites (SNS) to motives and profile of youth in Malaysia
by: Wok, Saodah, et al.
Published: (2015)
by: Wok, Saodah, et al.
Published: (2015)
Matching types of Social Media Sites (SNSs) to motives and profile of youth in Malaysia
by: Wok, Saodah, et al.
Published: (2014)
by: Wok, Saodah, et al.
Published: (2014)
Perceptions of employees on management integrity: a comparative study
by: Syed Abdullah Idid, Syed Arabi, et al.
Published: (2014)
by: Syed Abdullah Idid, Syed Arabi, et al.
Published: (2014)
Levels of engineers participative decision-making in Tenaga
Nasional Berhad
by: Hashim, Rahman, et al.
Published: (2015)
by: Hashim, Rahman, et al.
Published: (2015)
Hijab wearing phenomenon among Muslim women in Malaysia: a
quantitative study
by: Wok, Saodah, et al.
Published: (2014)
by: Wok, Saodah, et al.
Published: (2014)
Exploring the use of social media for information sharing during the 2014 flood in Malaysia
by: Tengku Mohd Azzman, Tengku Siti Aisha, et al.
Published: (2015)
by: Tengku Mohd Azzman, Tengku Siti Aisha, et al.
Published: (2015)
Similar Items
-
Understanding the factors of information leakage through online social networking to safeguard organizational information
by: Abdul Molok, Nurul Nuha, et al.
Published: (2010) -
Information leakage through online social networking: Opening the doorway for advanced persistence threats
by: Abdul Molok , Nurul Nuha, et al.
Published: (2010) -
Online social networking: a source of intelligence for advanced persistent threats
by: Abdul Molok , Nurul Nuha, et al.
Published: (2012) -
Disclosure of organizational information by employees on Facebook: Looking at the potential for information security risks
by: Abdul Molok , Nurul Nuha, et al.
Published: (2011) -
Disclosure of organizational information on social media: Perspectives from security managers
by: Abdul Molok , Nurul Nuha, et al.
Published: (2013)