Self awareness before social networking: exploring the user behavior and information security vulnerability in Malaysia
| Main Authors: | Hussin, Husnayati, Hassan, Muhammad Rabiul |
|---|---|
| Format: | Proceeding Paper |
| Language: | English |
| Published: |
2010
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/9180/ http://irep.iium.edu.my/9180/1/WA_9180_Husnayati%2C_Self_Awareness_before_social_networking.pdf |
Similar Items
Exploring it issues and application in the context of Malaysia
by: Hussin, Husnayati
Published: (2012)
by: Hussin, Husnayati
Published: (2012)
Information security awareness in university: maintaining learnability, performance and adaptability through roles of responsibility
by: Ahlan, Abdul Rahman, et al.
Published: (2011)
by: Ahlan, Abdul Rahman, et al.
Published: (2011)
Exploring the use of online social networking among employees in Malaysian organizations: looking potential threats to information security
by: Abdul Molok , Nurul Nuha
Published: (2013)
by: Abdul Molok , Nurul Nuha
Published: (2013)
Information system outsourcing: motivations and the implementation strategy in a Malaysian bank
by: Suhaimi, Mohd Adam, et al.
Published: (2007)
by: Suhaimi, Mohd Adam, et al.
Published: (2007)
Conceptualization of Strategic Information Systems Planning (SISP) success model in public sector: an absorptive capacity approach
by: Abu Bakar, Fazidah, et al.
Published: (2009)
by: Abu Bakar, Fazidah, et al.
Published: (2009)
Information Sharing among the government, university, and industry: a CIS approach
by: Hasan, Muhammad Rabiul, et al.
Published: (2013)
by: Hasan, Muhammad Rabiul, et al.
Published: (2013)
Information security awareness at the knowledge-based institution: its antecedents and measures
by: Ahlan, Abdul Rahman, et al.
Published: (2015)
by: Ahlan, Abdul Rahman, et al.
Published: (2015)
Unintentional information security behavior from the Qur’an
and Hadith’s perspective
by: Barzak, Omar Mokhles, et al.
Published: (2016)
by: Barzak, Omar Mokhles, et al.
Published: (2016)
Information security and mutual trust as determining factors for information technology outsourcing success
by: Shittu, Abdul Jaleel Kehinde, et al.
Published: (2012)
by: Shittu, Abdul Jaleel Kehinde, et al.
Published: (2012)
Unintentional information security behavior from the Qur’an and hadith’s perspective
by: Barzak, Omar Mokhles, et al.
Published: (2015)
by: Barzak, Omar Mokhles, et al.
Published: (2015)
Computer security self-efficacy factors influencing e-banking utilization and user satisfaction
by: Al-Shawabkeh, Mahmoud, et al.
Published: (2012)
by: Al-Shawabkeh, Mahmoud, et al.
Published: (2012)
Information security and data protection: Selected issues
by: Zulhuda, Sonny
Published: (2013)
by: Zulhuda, Sonny
Published: (2013)
Study on database management system security issues
by: Mohd Yunus, Mohd Amin, et al.
Published: (2017)
by: Mohd Yunus, Mohd Amin, et al.
Published: (2017)
Optimising information systems in business
by: Ahmad Dahlan, Abdul Rahman, et al.
Published: (2016)
by: Ahmad Dahlan, Abdul Rahman, et al.
Published: (2016)
The user satisfaction perspectives of the information
system projects
by: Subiyakto, A'ang, et al.
Published: (2016)
by: Subiyakto, A'ang, et al.
Published: (2016)
The information systems integration plan: for satellite remote sensing subsystems
by: Abdul Molok , Nurul Nuha
Published: (2010)
by: Abdul Molok , Nurul Nuha
Published: (2010)
The relative success of alternative approaches to strategic information systems: an empirical analysis
by: Doherty, Neil. F, et al.
Published: (1999)
by: Doherty, Neil. F, et al.
Published: (1999)
Evaluating the success factors of Information Systems (IS) -case study of Malaysian public sector
by: Fuad Zamzami, Ikhlas, et al.
Published: (2011)
by: Fuad Zamzami, Ikhlas, et al.
Published: (2011)
Modeling the impact of information technology governance effectiveness using partial least square
by: Kaur, Jasber, et al.
Published: (2012)
by: Kaur, Jasber, et al.
Published: (2012)
Risk assessment model for organizational information security
by: Dioubate, Balla Mousa, et al.
Published: (2015)
by: Dioubate, Balla Mousa, et al.
Published: (2015)
The importance and effectiveness of information technology governance practices: A Malaysian private organizations perspective
by: Jasber, Kaur, et al.
Published: (2012)
by: Jasber, Kaur, et al.
Published: (2012)
A conceptual model of information technology innovation implementation effectiveness in higher education
by: Huda, Qomarul M, et al.
Published: (2013)
by: Huda, Qomarul M, et al.
Published: (2013)
AGW 616 - MANAGEMENT INFORMATION SYSTEM SEPT. 1999.
by: PPP, Pusat Pengajian Pengurusan
Published: (1999)
by: PPP, Pusat Pengajian Pengurusan
Published: (1999)
Influence maximisation towards target users and minimal diffusion of information based on information needs
by: Temitope, Olanrewaju Abdus-Samad
Published: (2020)
by: Temitope, Olanrewaju Abdus-Samad
Published: (2020)
The success factors in Government Information Sharing (GIS)
- empirical findings from the Malaysian’s natural disaster management context
by: Ahmad Dahlan, Abdul Rahman, et al.
Published: (2014)
by: Ahmad Dahlan, Abdul Rahman, et al.
Published: (2014)
Disclosure of organizational information on social media: Perspectives from security managers
by: Abdul Molok , Nurul Nuha, et al.
Published: (2013)
by: Abdul Molok , Nurul Nuha, et al.
Published: (2013)
APW 302E - MANAGEMENT INFORMATION SYSTEM APRIL 08.
by: PPP, Pusat Pengajian Pengurusan
Published: (2008)
by: PPP, Pusat Pengajian Pengurusan
Published: (2008)
AGW 604 - MANAGEMENT INFORMATION SYSTEM OKT-NOV 1996
by: PPP, Pusat Pengajian Pengurusan
Published: (1996)
by: PPP, Pusat Pengajian Pengurusan
Published: (1996)
The state of e-government security in Malaysia : reassessing the legal and regulatory framework on the threat of information theft
by: Zulhuda, Sonny
Published: (2012)
by: Zulhuda, Sonny
Published: (2012)
Web users’ knowledge and their behavior towards security threats and vulnerabilities
by: Aldossary, Alia Ahmed, et al.
Published: (2016)
by: Aldossary, Alia Ahmed, et al.
Published: (2016)
User acceptance of Health Information Technology (HIT) in developing countries: a conceptual model
by: Ahlan, Abdul Rahman, et al.
Published: (2014)
by: Ahlan, Abdul Rahman, et al.
Published: (2014)
User acceptance of Health Information Technology (HIT) in developing countries: A literature review
by: Ahlan, Abdul Rahman, et al.
Published: (2014)
by: Ahlan, Abdul Rahman, et al.
Published: (2014)
Disclosure of organizational information by employees on Facebook: Looking at the potential for information security risks
by: Abdul Molok , Nurul Nuha, et al.
Published: (2011)
by: Abdul Molok , Nurul Nuha, et al.
Published: (2011)
Exploring the use of online social networking by employees: Looking at the potential for information leakage
by: Abdul Molok, Nurul Nuha, et al.
Published: (2011)
by: Abdul Molok, Nurul Nuha, et al.
Published: (2011)
Knowledge management system in health and social care: review on 20 practiced knowledge management systems
by: Ridhwan, Muhammad Saiful, et al.
Published: (2013)
by: Ridhwan, Muhammad Saiful, et al.
Published: (2013)
Information security policy perceived compliance among staff in Palestine universities: An empirical pilot study
by: Mohammad Iriqat, Yousef, et al.
Published: (2019)
by: Mohammad Iriqat, Yousef, et al.
Published: (2019)
Context-aware services based on spatio-temporal zoning and crowdsourcing
by: Ahmad, Akhlaq, et al.
Published: (2018)
by: Ahmad, Akhlaq, et al.
Published: (2018)
ICT implementation barriers and organizational issues in Islamic-based higher education institution: the case of Syarif Hidayatullah State Islamic University (UIN) Jakarta
by: Qomarul Huda, M, et al.
Published: (2010)
by: Qomarul Huda, M, et al.
Published: (2010)
Case management system (CMS): an evaluation among users
by: Nadianauli, Yaakub
Published: (2018)
by: Nadianauli, Yaakub
Published: (2018)
The Impact of Information and Information System on Managerial Decision Making: The Case of Telecommunication Sector in Jordan
by: Al Haraisa, Yazan Emnawer Qteesh
Published: (2011)
by: Al Haraisa, Yazan Emnawer Qteesh
Published: (2011)
Similar Items
-
Exploring it issues and application in the context of Malaysia
by: Hussin, Husnayati
Published: (2012) -
Information security awareness in university: maintaining learnability, performance and adaptability through roles of responsibility
by: Ahlan, Abdul Rahman, et al.
Published: (2011) -
Exploring the use of online social networking among employees in Malaysian organizations: looking potential threats to information security
by: Abdul Molok , Nurul Nuha
Published: (2013) -
Information system outsourcing: motivations and the implementation strategy in a Malaysian bank
by: Suhaimi, Mohd Adam, et al.
Published: (2007) -
Conceptualization of Strategic Information Systems Planning (SISP) success model in public sector: an absorptive capacity approach
by: Abu Bakar, Fazidah, et al.
Published: (2009)