Analysis of Information Security Resource Requirements in Local Governments
Information Security Resources Needs Analysis and Management in Local Government is compiling the information security resource requirements by the Regional Government so the implementation of information security can guarantee the confidentiality, integrity, and availability of information. The lac...
| Main Authors: | Toto, Suharto, Aisyah, Nuraeni, Awan, Setiawan |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
INTI International University
2022
|
| Subjects: | |
| Online Access: | http://eprints.intimal.edu.my/1690/ http://eprints.intimal.edu.my/1690/1/jods2022_16.pdf |
Similar Items
The practice of information security: An analysis of government employees in Tanzania using the Health Belief Model (HBM)
by: Koloseni, Daniel Ntabagi
Published: (2017)
by: Koloseni, Daniel Ntabagi
Published: (2017)
Information security behaviour : a descriptive analysis on a Malaysian public university
by: Ramlah Hussein, *, et al.
Published: (2011)
by: Ramlah Hussein, *, et al.
Published: (2011)
Requirements analysis for SBS system and study review process iteration during requirements phase
by: Alghamdi, Hanan Musafer H.
Published: (2009)
by: Alghamdi, Hanan Musafer H.
Published: (2009)
Comprehensive analysis on the influences of computer ethics on information security
by: Abdul Rahim, Fiza
Published: (2009)
by: Abdul Rahim, Fiza
Published: (2009)
Requirements engineering (RE) process for the
adaptation of hospital information system (HIS)
by: Abd Malik, Sofianiza, et al.
Published: (2019)
by: Abd Malik, Sofianiza, et al.
Published: (2019)
Requirement prioritization based on non-functional requirement classification using hierarchy AHP
by: Win, Thant Zin, et al.
Published: (2020)
by: Win, Thant Zin, et al.
Published: (2020)
Security enhancement of dynamic signature by utilizing local features with individual threshold
by: Suryanti, Awang, et al.
Published: (2018)
by: Suryanti, Awang, et al.
Published: (2018)
A Green information technology governance framework for eco-environmental risk mitigation
by: Anthony Jr, Bokolo, et al.
Published: (2017)
by: Anthony Jr, Bokolo, et al.
Published: (2017)
Requirements management tools / Ameran Jaffar
by: Ameran, Jaffar
Published: (2004)
by: Ameran, Jaffar
Published: (2004)
Social cognitive framework for secure information sharing on Islamic NGO social media / Nurul’Adilah Nazri
by: Nurul’Adilah , Nazri
Published: (2022)
by: Nurul’Adilah , Nazri
Published: (2022)
An investigation into requirement of mobile app for apartment residents
by: Haini, Mohammad Shazreen, et al.
Published: (2019)
by: Haini, Mohammad Shazreen, et al.
Published: (2019)
Development of requirements pattern repository: towards supporting requirements reuse
by: Nordin, Azlin, et al.
Published: (2018)
by: Nordin, Azlin, et al.
Published: (2018)
Proposal of meta-requirement approach to analyze requirements specification completeness
by: Muhamad Idaham, Umar Ong, et al.
Published: (2018)
by: Muhamad Idaham, Umar Ong, et al.
Published: (2018)
Framework of informal specification validation with visual specification and human factor involvement to improve requirement specification quality
by: Fauziah, Zainuddin
Published: (2019)
by: Fauziah, Zainuddin
Published: (2019)
Requirements patterns structure for specifying and reusing software product line requirements
by: Ya'au, Badamasi Imam, et al.
Published: (2018)
by: Ya'au, Badamasi Imam, et al.
Published: (2018)
Requirement patterns: an approach for streamlining requirements engineering in software product families
by: Badamasi, Imam Ya'au, et al.
Published: (2019)
by: Badamasi, Imam Ya'au, et al.
Published: (2019)
Collaborative requirements review
by: Nordin, Azlin, et al.
Published: (2018)
by: Nordin, Azlin, et al.
Published: (2018)
An investigation of health information system security policies compliance behaviour / Norshima Humaidi
by: Norshima, Humaidi
Published: (2016)
by: Norshima, Humaidi
Published: (2016)
Methods of intrusion detection in information security incident detection: a comparative study
by: Tan, Fui Bee, et al.
Published: (2018)
by: Tan, Fui Bee, et al.
Published: (2018)
A review: Requirements prioritization criteria within collaboration perspective
by: Tan, Amelia, et al.
Published: (2022)
by: Tan, Amelia, et al.
Published: (2022)
Software requirements patterns and meta model: a strategy for enhancing Requirements Reuse (RR)
by: Imam Yau'u, Badamasi, et al.
Published: (2016)
by: Imam Yau'u, Badamasi, et al.
Published: (2016)
Meta-modeling constructs for requirements reuse (RR): software requirements patterns, variability, and traceability
by: Imam Yau'u, Badamasi, et al.
Published: (2018)
by: Imam Yau'u, Badamasi, et al.
Published: (2018)
Meta-requirement mapping model
by: Muhamad Idaham, Umar Ong, et al.
Published: (2020)
by: Muhamad Idaham, Umar Ong, et al.
Published: (2020)
The formal specification for competency requirements
by: Roslina, Mohd Sidek, et al.
Published: (2011)
by: Roslina, Mohd Sidek, et al.
Published: (2011)
Framework to study the requirements-driven collaboration in agile teams / Irum Inayat
by: Irum, Inayat
Published: (2015)
by: Irum, Inayat
Published: (2015)
Software Requirement Prioritization Prototype Using Analytical Hierarchical Process (AHP)
by: Rohani, Abu Bakar, et al.
Published: (2014)
by: Rohani, Abu Bakar, et al.
Published: (2014)
Secure login authentication system
by: Chow, Wen Chai
Published: (2018)
by: Chow, Wen Chai
Published: (2018)
SRPTackle: a semi-automated requirements prioritisation technique for scalable requirements of software system projects
by: Fadhl, Hujainah, et al.
Published: (2021)
by: Fadhl, Hujainah, et al.
Published: (2021)
Forecasting and tracking of project completion dateline using requirement traceability matrix in scrum
by: Tan, Eng Ian
Published: (2024)
by: Tan, Eng Ian
Published: (2024)
An agent based green decision making model for sustainable information technology governance
by: Anthony Jnr, Bokolo, et al.
Published: (2017)
by: Anthony Jnr, Bokolo, et al.
Published: (2017)
Managing educational resource-student information systems using BVAGQ fragmented database replication model
by: Noraziah, Ahmad, et al.
Published: (2011)
by: Noraziah, Ahmad, et al.
Published: (2011)
Measuring software requirements specification quality
by: Nordin, Azlin, et al.
Published: (2017)
by: Nordin, Azlin, et al.
Published: (2017)
Terms extractions: an approach for requirements reuse
by: Bakar, Noor Hasrina, et al.
Published: (2016)
by: Bakar, Noor Hasrina, et al.
Published: (2016)
Development of scenario management and requirements tool (SMaRT):Towards supporting scenario-based requirements engineering methodology
by: Nordin, Azlin, et al.
Published: (2018)
by: Nordin, Azlin, et al.
Published: (2018)
An analysis of ambiguity detection techniques for Software Requirements Specification (SRS)
by: Oo, Khin Hayman, et al.
Published: (2018)
by: Oo, Khin Hayman, et al.
Published: (2018)
Green information technology for sustainability elicitation in government-based organisations: an exploratory case study
by: Bokolo, Anthony Jnr, et al.
Published: (2018)
by: Bokolo, Anthony Jnr, et al.
Published: (2018)
Web-based internet security / Zuriani Karia
by: Zuriani, Karia
Published: (2003)
by: Zuriani, Karia
Published: (2003)
Scenario Management and Requirements Tool (SMaRT)
by: Nordin, Azlin, et al.
Published: (2014)
by: Nordin, Azlin, et al.
Published: (2014)
Software visual specification for requirement engineering education
by: Fauziah, Zainuddin, et al.
Published: (2019)
by: Fauziah, Zainuddin, et al.
Published: (2019)
Software visual specification for requirement specification validation
by: Fauziah, Zainuddin, et al.
Published: (2018)
by: Fauziah, Zainuddin, et al.
Published: (2018)
Similar Items
-
The practice of information security: An analysis of government employees in Tanzania using the Health Belief Model (HBM)
by: Koloseni, Daniel Ntabagi
Published: (2017) -
Information security behaviour : a descriptive analysis on a Malaysian public university
by: Ramlah Hussein, *, et al.
Published: (2011) -
Requirements analysis for SBS system and study review process iteration during requirements phase
by: Alghamdi, Hanan Musafer H.
Published: (2009) -
Comprehensive analysis on the influences of computer ethics on information security
by: Abdul Rahim, Fiza
Published: (2009) -
Requirements engineering (RE) process for the
adaptation of hospital information system (HIS)
by: Abd Malik, Sofianiza, et al.
Published: (2019)