Information security behaviour : a descriptive analysis on a Malaysian public university
The critical issues of information security have gradually increased. Effective information security management require a great understanding both technological and human dimensions. Thus, the purpose of this research is to investigate the university student?s behavior towards information security a...
| Main Authors: | Ramlah Hussein, *, Fateema Lambensa, Raja Baharuddin Anom |
|---|---|
| Format: | Conference or Workshop Item |
| Language: | English |
| Published: |
2011
|
| Subjects: | |
| Online Access: | http://eprints.sunway.edu.my/114/ http://eprints.sunway.edu.my/114/1/ICS2011_14.pdf |
Similar Items
Information disclosure behaviour in social media among Malaysian youth : the impact of privacy concern, risk and trust
by: Norsaremah Salleh,, et al.
Published: (2011)
by: Norsaremah Salleh,, et al.
Published: (2011)
A descriptive analysis of IT adoption in Malaysian small software firms
by: Mohamed, Norshidah, et al.
Published: (2009)
by: Mohamed, Norshidah, et al.
Published: (2009)
A dimension-based information security culture model for information security policy compliance behavior in Malaysian public universities
by: Akhyari, Nasir
Published: (2019)
by: Akhyari, Nasir
Published: (2019)
An investigation of health information system security policies compliance behaviour / Norshima Humaidi
by: Norshima, Humaidi
Published: (2016)
by: Norshima, Humaidi
Published: (2016)
Systematic description of the internet of things: A bibliometric analysis
by: Mohd Izham, Mohd Jaya, et al.
Published: (2022)
by: Mohd Izham, Mohd Jaya, et al.
Published: (2022)
Methods of intrusion detection in information security incident detection: a comparative study
by: Tan, Fui Bee, et al.
Published: (2018)
by: Tan, Fui Bee, et al.
Published: (2018)
Analysis of Information Security Resource Requirements in Local Governments
by: Toto, Suharto, et al.
Published: (2022)
by: Toto, Suharto, et al.
Published: (2022)
Towards a systematic description of the feld using bibliometric analysis
by: Sharfah Ratibah, Tuan Mat, et al.
Published: (2021)
by: Sharfah Ratibah, Tuan Mat, et al.
Published: (2021)
Comprehensive analysis on the influences of computer ethics on information security
by: Abdul Rahim, Fiza
Published: (2009)
by: Abdul Rahim, Fiza
Published: (2009)
Information security culture for guiding employee’s security behaviour: A pilot study
by: Akhyari, Nasir, et al.
Published: (2020)
by: Akhyari, Nasir, et al.
Published: (2020)
Investigating the barriers of health information system implementation in Malaysian Public Hospitals
by: Norsyaliza, Abd Razak, et al.
Published: (2020)
by: Norsyaliza, Abd Razak, et al.
Published: (2020)
A descriptive study on the research trends of postgraduate students in the sciences / Leelawathy a/p Kanapathy Pillai.
by: Kanapathy Pillai, Leelawathy
Published: (2000)
by: Kanapathy Pillai, Leelawathy
Published: (2000)
Multilingual multimodal integration of sketch and speech: A generic speech representation model for spatial description
by: Lee-Na, Teh, et al.
Published: (2009)
by: Lee-Na, Teh, et al.
Published: (2009)
Blockchain-enabled Secure Privacy-preserving System for Public Health-center Data
by: Islam, Md. Shohidul, et al.
Published: (2023)
by: Islam, Md. Shohidul, et al.
Published: (2023)
Internet banking adoption : information content richness, convenience and computer self-efficacy
by: Ramlah Hussein, *, et al.
Published: (2011)
by: Ramlah Hussein, *, et al.
Published: (2011)
Securing e-learning environment: A study of security awareness and behavior of user
by: Wan Nurul Safawati, Wan Manan, et al.
Published: (2017)
by: Wan Nurul Safawati, Wan Manan, et al.
Published: (2017)
The practice of information security: An analysis of government employees in Tanzania using the Health Belief Model (HBM)
by: Koloseni, Daniel Ntabagi
Published: (2017)
by: Koloseni, Daniel Ntabagi
Published: (2017)
Social cognitive framework for secure information sharing on Islamic NGO social media / Nurul’Adilah Nazri
by: Nurul’Adilah , Nazri
Published: (2022)
by: Nurul’Adilah , Nazri
Published: (2022)
A secure audio steganography approach
by: Zamani, Mazdak, et al.
Published: (2009)
by: Zamani, Mazdak, et al.
Published: (2009)
A review on cloud computing security
by: Teo, Marry, et al.
Published: (2018)
by: Teo, Marry, et al.
Published: (2018)
Users' perception of the information security policy at Universiti Teknologi Malaysia
by: Sharif, Haniza
Published: (2009)
by: Sharif, Haniza
Published: (2009)
The effects of social media on consumer behaviour in tourism: A study among university students
by: Bay, Sheue Wen
Published: (2018)
by: Bay, Sheue Wen
Published: (2018)
A confirmatory factor analysis on task-technology fit for a student portal
by: Norshidah, Mohamed, et al.
Published: (2011)
by: Norshidah, Mohamed, et al.
Published: (2011)
Information Security Policy Compliance Behavior Based on Comprehensive Dimensions of Information Security Culture: A Conceptual Framework
by: Nasir, Akhyari, et al.
Published: (2017)
by: Nasir, Akhyari, et al.
Published: (2017)
INTI International University Campus (INTI-IU) Security Monitoring System With Face Recognition Technology
by: Yap, Choi Sen, et al.
Published: (2020)
by: Yap, Choi Sen, et al.
Published: (2020)
A review of challenges and security risks of cloud computing
by: Hussam Alddin S., Ahmed, et al.
Published: (2017)
by: Hussam Alddin S., Ahmed, et al.
Published: (2017)
Retrieval of human facial images based on visual content and semantic description / Ahmed Abdu Ali Alattab
by: Alattab, Ahmed Abdu Ali
Published: (2013)
by: Alattab, Ahmed Abdu Ali
Published: (2013)
VAP Code: A Secure Graphical Password for Smart Devices
by: Azad, Saiful, et al.
Published: (2017)
by: Azad, Saiful, et al.
Published: (2017)
The Formulation of Comprehensive Information Security Culture Dimensions for Information Security Policy Compliance Study
by: Nasir, Akhyari, et al.
Published: (2018)
by: Nasir, Akhyari, et al.
Published: (2018)
Information needs of academic staff at the University of Malaya in a digital environment / Harvinder Kaur a/p Bakhtawar Singh.
by: Bakhtawar Singh, Harvinder Kaur
Published: (2000)
by: Bakhtawar Singh, Harvinder Kaur
Published: (2000)
Smart home security
by: Mohammad Syafi Azim, Mohd Razam
Published: (2019)
by: Mohammad Syafi Azim, Mohd Razam
Published: (2019)
Model driven security frameworks for addressing security problems of Service Oriented Architecture
by: Saleem, M. Q., et al.
Published: (2010)
by: Saleem, M. Q., et al.
Published: (2010)
Secure login authentication system
by: Chow, Wen Chai
Published: (2018)
by: Chow, Wen Chai
Published: (2018)
A secured data hiding using affine transformation in video steganography
by: Ramalingam, Mritha, et al.
Published: (2020)
by: Ramalingam, Mritha, et al.
Published: (2020)
A secure HEVC video watermarking scheme for authentication and copyright purposes
by: Elrowayati, Ali Abdulhafid
Published: (2020)
by: Elrowayati, Ali Abdulhafid
Published: (2020)
Information security culture guidelines to improve employee’s security behavior: A review of empirical studies
by: Akhyari, N., et al.
Published: (2018)
by: Akhyari, N., et al.
Published: (2018)
Inculcating secure coding for beginners
by: A. Aziz, Normaziah, et al.
Published: (2017)
by: A. Aziz, Normaziah, et al.
Published: (2017)
Enhancement of multicast network security
by: Ali, Sellami, et al.
Published: (2013)
by: Ali, Sellami, et al.
Published: (2013)
Laman web e-Dagang buku teks terpakai untuk pelajar FSKTM Universiti Malaya / Hafiz Baharuddin
by: Hafiz , Baharuddin
Published: (2001)
by: Hafiz , Baharuddin
Published: (2001)
A secure message handler using microsoft cryptoapi
by: Eh Kan, Chessda Uttraphan
Published: (2003)
by: Eh Kan, Chessda Uttraphan
Published: (2003)
Similar Items
-
Information disclosure behaviour in social media among Malaysian youth : the impact of privacy concern, risk and trust
by: Norsaremah Salleh,, et al.
Published: (2011) -
A descriptive analysis of IT adoption in Malaysian small software firms
by: Mohamed, Norshidah, et al.
Published: (2009) -
A dimension-based information security culture model for information security policy compliance behavior in Malaysian public universities
by: Akhyari, Nasir
Published: (2019) -
An investigation of health information system security policies compliance behaviour / Norshima Humaidi
by: Norshima, Humaidi
Published: (2016) -
Systematic description of the internet of things: A bibliometric analysis
by: Mohd Izham, Mohd Jaya, et al.
Published: (2022)