Evaluating Cyber Security Awareness Levels For Employees In DRB-Hicom Auto Solutions
The Internet is becoming increasingly connected to people in the daily life of many individuals, organisations and nations. It has benefit many people and gives a positive effect on the way people communicate. It has also introduced new avenues for business and has offered nations an opportunity...
| Main Author: | Mohd Fadli Kasim |
|---|---|
| Format: | Thesis |
| Published: |
OUM
2021
|
| Subjects: | |
| Online Access: | https://library.oum.edu.my/repository/1447/ |
Similar Items
ICAM-DRB HICOM visit
by: Noraisah Nurul Fatwa, Mohd Razali
Published: (2012)
by: Noraisah Nurul Fatwa, Mohd Razali
Published: (2012)
Untung DRB-Hicom mungkin terjejas
by: Azman, Nur Hanani
Published: (2018)
by: Azman, Nur Hanani
Published: (2018)
UMP and DRB-HICOM: A Mismatch of Expectations
by: Nabila , Abdul Malek, et al.
Published: (2012)
by: Nabila , Abdul Malek, et al.
Published: (2012)
DRB-Hicom masih mampu raih untung
Published: (2008)
Published: (2008)
Cyber Security Awareness Among Students In Ump
by: Nur Madihah, Mazlan
Published: (2023)
by: Nur Madihah, Mazlan
Published: (2023)
UMP terima van jenazah sumbangan DRB-Hicom
by: UMP, LIB
Published: (2016)
by: UMP, LIB
Published: (2016)
A Case Study On DRB-Hicom Bhd In The Automotive Industry
by: Chen, Lu Shen
Published: (2005)
by: Chen, Lu Shen
Published: (2005)
UMP terima van jenazah sumbangan DRB-HICOM Berhad
by: UMP, PNC
Published: (2016)
by: UMP, PNC
Published: (2016)
DRB-Hicom group managing director appointed as UMP Pro-Chancellor
by: UMP, PNC
by: UMP, PNC
The Possible University-Industry Partnership between DRB-HICOM and University Malaysia Pahang
by: Arulselvi, Uthayakumaran, et al.
Published: (2012)
by: Arulselvi, Uthayakumaran, et al.
Published: (2012)
Online purchase intention among employees in DRB Hicom Defence Technologies Sdn Bhd / Ummi Farhana Hamizal
by: Hamizal, Ummi Farhana
Published: (2019)
by: Hamizal, Ummi Farhana
Published: (2019)
The factors that contribute to customer retention for Chevrolet in DRB-Hicom Berhad / Noor Aznina Naim
by: Naim, Noor Aznina
Published: (2006)
by: Naim, Noor Aznina
Published: (2006)
The rise of deep learning in cyber security: Bibliometric analysis of deep learning and malware
by: Nur Khairani, Kamarudin, et al.
Published: (2024)
by: Nur Khairani, Kamarudin, et al.
Published: (2024)
A Study On AI-Driven Solutions for Cloud Security Platform
by: Menaga, Segar, et al.
Published: (2024)
by: Menaga, Segar, et al.
Published: (2024)
Cyber Security Awareness Webinar Preparing
by: Mritha, Ramalingam
Published: (2021)
by: Mritha, Ramalingam
Published: (2021)
Cyber security awareness levels in smartphone usage among UPM students
by: Kamarudin, Syafila
Published: (2024)
by: Kamarudin, Syafila
Published: (2024)
TrustData: trustworthy and secured data collection for event detection in industrial cyber-physical system (In Press)
by: Rahman, Md. Arafatur, et al.
Published: (2020)
by: Rahman, Md. Arafatur, et al.
Published: (2020)
Multicast security : issues and solutions
by: Qabajeh, Mohammad M., et al.
Published: (2011)
by: Qabajeh, Mohammad M., et al.
Published: (2011)
I-Personal Financial Organizer (I-Pfo): A Cyber Security Framework For I-Pfo.
by: Annie Ng, Ai Bee
Published: (2010)
by: Annie Ng, Ai Bee
Published: (2010)
An overview on cyber security awareness in Muslim countries
by: Basamh, Saeed S., et al.
Published: (2014)
by: Basamh, Saeed S., et al.
Published: (2014)
Blockchain Security Hole: Issues and Solutions
by: Norul Suhaliana, Abd Halim, et al.
Published: (2018)
by: Norul Suhaliana, Abd Halim, et al.
Published: (2018)
Security awareness: A lesson from Tcpdump and Ethereal
by: Rohani, Mohd. Fo’ad, et al.
Published: (2005)
by: Rohani, Mohd. Fo’ad, et al.
Published: (2005)
Interplay between cyber supply chain risk management practices and cyber security performance
by: Gani, Anisha Banu Dawood, et al.
Published: (2022)
by: Gani, Anisha Banu Dawood, et al.
Published: (2022)
Webinar Cyber security and IR 4.0 Awareness
by: Mritha, Ramalingam
Published: (2021)
by: Mritha, Ramalingam
Published: (2021)
iBUST: An intelligent behavioural trust model for securing industrial cyber-physical systems
by: Azad, Saiful, et al.
Published: (2024)
by: Azad, Saiful, et al.
Published: (2024)
Cyber-attacks detection & protection in Kuwait government
sectors
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2014)
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2014)
An intelligence based model for the prevention of advanced cyber-attacks
by: Adebayo, Olawale Surajudeen, et al.
Published: (2014)
by: Adebayo, Olawale Surajudeen, et al.
Published: (2014)
Cyber physical systems for collaborative indoor localization and mapping
by: Ang, Jacqueline Lee Fang
Published: (2018)
by: Ang, Jacqueline Lee Fang
Published: (2018)
Web-Based Reporting Vulnerabilities System for Cyber Security
Maintenance
by: Hamid Ali, Firkhan Ali, et al.
Published: (2023)
by: Hamid Ali, Firkhan Ali, et al.
Published: (2023)
Information security curriculum framework at undergraduate level
by: Sanusi Arifin, Ab. Arif
Published: (2009)
by: Sanusi Arifin, Ab. Arif
Published: (2009)
Computer security and ethics awareness among IIUM students: an empirical study
by: Aliyu, Mansur, et al.
Published: (2010)
by: Aliyu, Mansur, et al.
Published: (2010)
PolyAQG Framework: Auto-generating assessment questions
by: Tan, Tee Hean *, et al.
Published: (2021)
by: Tan, Tee Hean *, et al.
Published: (2021)
Information security culture guidelines to improve employee’s security behavior: A review of empirical studies
by: Akhyari, N., et al.
Published: (2018)
by: Akhyari, N., et al.
Published: (2018)
Sistem kafe siber (Cyber cafe’ system) / Norhashimah Hashim
by: Norhashimah , Hashim
Published: (2003)
by: Norhashimah , Hashim
Published: (2003)
Protect data and be alert to online cyber threats
by: Irman, Khalil, et al.
Published: (2021)
by: Irman, Khalil, et al.
Published: (2021)
Information security culture for guiding employee’s security behaviour: A pilot study
by: Akhyari, Nasir, et al.
Published: (2020)
by: Akhyari, Nasir, et al.
Published: (2020)
Metrics evaluation for context-aware computing
by: Mantoro, Teddy
Published: (2009)
by: Mantoro, Teddy
Published: (2009)
C++ Programming tutoring simulation "CyberCPP" / Muhammad Nor Mahat
by: Muhammad Nor, Mahat
Published: (2005)
by: Muhammad Nor, Mahat
Published: (2005)
A systematic review of approaches to assessing cyber security awareness
by: Abd Rahim, Noor Hayani, et al.
Published: (2015)
by: Abd Rahim, Noor Hayani, et al.
Published: (2015)
Cyber security awareness: Is there any significant difference in demographic factors?
by: Sharkawi, Ismawati, et al.
Published: (2023)
by: Sharkawi, Ismawati, et al.
Published: (2023)
Similar Items
-
ICAM-DRB HICOM visit
by: Noraisah Nurul Fatwa, Mohd Razali
Published: (2012) -
Untung DRB-Hicom mungkin terjejas
by: Azman, Nur Hanani
Published: (2018) -
UMP and DRB-HICOM: A Mismatch of Expectations
by: Nabila , Abdul Malek, et al.
Published: (2012) -
DRB-Hicom masih mampu raih untung
Published: (2008) -
Cyber Security Awareness Among Students In Ump
by: Nur Madihah, Mazlan
Published: (2023)