Assessment of cybersecurity awareness program on personal data protection among youngsters in Malaysia / Noor Hayani Abd Rahim
Youngsters aged 12 to 19 years old are among the highest number of Internet users in Malaysia. Characteristically, they have a high degree of enthusiasm. They tend to overshare information, and perceive everything on the Internet as the truth. They also lack security knowledge on how to protect thei...
| Main Author: | Noor Hayani , Abd Rahim |
|---|---|
| Format: | Thesis |
| Published: |
2017
|
| Subjects: | |
| Online Access: | http://studentsrepo.um.edu.my/11825/ http://studentsrepo.um.edu.my/11825/2/Noor_Hayani.pdf http://studentsrepo.um.edu.my/11825/1/Noor_Hayani.pdf |
Similar Items
Enhancement of cybersecurity awareness program on personal data protection among youngsters in Malaysia: an assessment
by: Abd Rahim, Noor Hayani, et al.
Published: (2019)
by: Abd Rahim, Noor Hayani, et al.
Published: (2019)
Implementation of serious games for data privacy and protection awareness in Cybersecurity
by: Siti Normaziah, Ihsan, et al.
Published: (2023)
by: Siti Normaziah, Ihsan, et al.
Published: (2023)
OCES sistem pakar kanser ovari / Noreen Abd. Rahim
by: Noreen , Abd. Rahim
Published: (2001)
by: Noreen , Abd. Rahim
Published: (2001)
Effects of eye health among youngster while playing computer game
by: Nurul Saidatul Akmal, Ab. Razak, et al.
Published: (2021)
by: Nurul Saidatul Akmal, Ab. Razak, et al.
Published: (2021)
Blockchain-enabled cybersecurity framework for healthcare domain
by: Islam, Md Shohidul
Published: (2025)
by: Islam, Md Shohidul
Published: (2025)
Cybersecurity in Big Data Era: From Securing Big Data to Data-Driven Security
by: Manjunatha, V., et al.
Published: (2024)
by: Manjunatha, V., et al.
Published: (2024)
Cybersecurity behavioural model for students in the tertiary institutions / Fatokun Faith Boluwatife
by: Fatokun Faith , Boluwatife
Published: (2020)
by: Fatokun Faith , Boluwatife
Published: (2020)
Blockchain-enabled cybersecurity provision for scalable heterogeneous network: A comprehensive survey
by: Islam, Md. Shohidul, et al.
Published: (2024)
by: Islam, Md. Shohidul, et al.
Published: (2024)
Jawi Character Recognition / Omar Abdul Rahim
by: Omar, Abdul Rahim
Published: (2002)
by: Omar, Abdul Rahim
Published: (2002)
The concept and application of corporate Waqf in Malaysia / Nur Sakinah Hayani Mohd Rahman
by: Mohd Rahman, Nur Sakinah Hayani
Published: (2016)
by: Mohd Rahman, Nur Sakinah Hayani
Published: (2016)
Sistem firma guaman (Syariah) / Nor Rahim Marhusain
by: Nor Rahim , Marhusain
Published: (2004)
by: Nor Rahim , Marhusain
Published: (2004)
Development of Al-Mu’awwidhah computing for personal data
protection against abnormal attacks
by: Shamsudin, Ahmad Faizul, et al.
Published: (2013)
by: Shamsudin, Ahmad Faizul, et al.
Published: (2013)
Serious Game For Raising Awareness In Protecting Malaysia Native Wildlife (Born)
by: Kerk, Zhi Yuan
Published: (2023)
by: Kerk, Zhi Yuan
Published: (2023)
Sistem pembelajaran pintar untuk kimia SPM / Norhaslinda Abdul Rahim
by: Norhaslinda, Abdul Rahim
Published: (2003)
by: Norhaslinda, Abdul Rahim
Published: (2003)
Social networking sites: the awareness among youngsters in Malaysia / Heather Marie Anthony … [et al.]
by: Anthony, Heather Marie, et al.
Published: (2009)
by: Anthony, Heather Marie, et al.
Published: (2009)
Effectiveness of Personal Protective Equipment (PPE) at Construction Site
by: Mohd Amir Shazwan, Hashim, et al.
Published: (2018)
by: Mohd Amir Shazwan, Hashim, et al.
Published: (2018)
Utilizing hippocratic database for personal information privacy protection
by: Mohamed Sidek, Zailani, et al.
Published: (2008)
by: Mohamed Sidek, Zailani, et al.
Published: (2008)
A comparative analysis of anti-phishing website techniques: identifying optimal approaches to enhance cybersecurity
by: Yau, Jia Xin
Published: (2023)
by: Yau, Jia Xin
Published: (2023)
Sistem web fiqh pintar pengurusan jenazah / Sarulzila Azian Md Rahim
by: Sarulzila Azian, Md Rahim
Published: (2003)
by: Sarulzila Azian, Md Rahim
Published: (2003)
Kiosk informasi II festive food online / Nor Rahimah Abdul Rahim
by: Nor Rahimah, Abdul Rahim
Published: (2003)
by: Nor Rahimah, Abdul Rahim
Published: (2003)
Online graduate job vacancies system / Noreen Natasya Aziz Al-Rahim
by: Noreen Natasya , Aziz Al-Rahim
Published: (2003)
by: Noreen Natasya , Aziz Al-Rahim
Published: (2003)
Intrusion detection system using autoencoder based deep neural network for SME cybersecurity
by: Khaizuran Aqhar, Ubaidillah, et al.
Published: (2021)
by: Khaizuran Aqhar, Ubaidillah, et al.
Published: (2021)
Source camera identification for online social network images using texture feature / Nordiana Rahim
by: Nordiana , Rahim
Published: (2018)
by: Nordiana , Rahim
Published: (2018)
Statistical modelling of awareness on risk factors of gastric cancer: a study on youngsters in Melaka / Izni Syamsina Saari ... [et al.]
by: Saari, Izni Syamsina, et al.
Published: (2019)
by: Saari, Izni Syamsina, et al.
Published: (2019)
Academic Planning for Faculty Computer Science & Information Technology / Adzni Abdul Rahim
by: Adzni , Abdul Rahim
Published: (2003)
by: Adzni , Abdul Rahim
Published: (2003)
Semantic web: Data representation in a distributed environment / Azhar Tajul Noor
by: Azhar Tajul , Noor
Published: (2008)
by: Azhar Tajul , Noor
Published: (2008)
Data Protection Laws
by: Alginahi, Hiba, et al.
Published: (2019)
by: Alginahi, Hiba, et al.
Published: (2019)
Comprehensive survey on Big Data Privacy
Protection
by: BinJubeir, Mohammed, et al.
Published: (2019)
by: BinJubeir, Mohammed, et al.
Published: (2019)
Thermal-aware scheduling in green data centers / Muhammad Tayyab Chaudhry
by: Chaudhry, Muhammad Tayyab
Published: (2015)
by: Chaudhry, Muhammad Tayyab
Published: (2015)
Real-time personal protective equipment compliance detection using you only look once
by: Nurhanisah, Aminuddin, et al.
Published: (2024)
by: Nurhanisah, Aminuddin, et al.
Published: (2024)
Balancing data utility versus information loss in data-privacy protection using k-Anonymity
by: Esmeel, Thamer Khalil, et al.
by: Esmeel, Thamer Khalil, et al.
Help desk FCSIT/ Aminah Abd Halim
by: Aminah , Abd Halim
Published: (2004)
by: Aminah , Abd Halim
Published: (2004)
Big data storage, collection, & protection with Islamic perspective
by: Ibrahim Ahmed, Ibrahim Nasreldin, et al.
Published: (2014)
by: Ibrahim Ahmed, Ibrahim Nasreldin, et al.
Published: (2014)
On protecting data storage in mobile cloud computing paradigm
by: Abdalla , Al-kindy Athman, et al.
Published: (2014)
by: Abdalla , Al-kindy Athman, et al.
Published: (2014)
Comparative study of in vitro antibacterial activity of eugenia caryophyllus alcoholic extracts and aqueous extracts against different bacteria / Nur Hayani Muhammad Pudzilah
by: Muhammad Pudzilah, Nur Hayani
Published: (2017)
by: Muhammad Pudzilah, Nur Hayani
Published: (2017)
The Potential of Implementing Smart Personal Protective Equipment (PPE) To Minimize Work Related Injuries in Construction Sites
by: Lee, Benny, Hai Chim*, et al.
Published: (2020)
by: Lee, Benny, Hai Chim*, et al.
Published: (2020)
Cepat baca BM / Shazwan Sharif Abd Shukur
by: Shazwan, Sharif Abd Shukur
Published: (2004)
by: Shazwan, Sharif Abd Shukur
Published: (2004)
Natural water cycle simulation / Amin Abd. Razak
by: Amin, Abd. Razak
Published: (2004)
by: Amin, Abd. Razak
Published: (2004)
Sistem penempahan buku atas talian / Noor Sabariah Salleh
by: Noor Sabariah, Salleh
Published: (2003)
by: Noor Sabariah, Salleh
Published: (2003)
Virtual directory Mid Valley Megamall / Muzanira Abd Razak
by: Muzanira , Abd Razak
Published: (2004)
by: Muzanira , Abd Razak
Published: (2004)
Similar Items
-
Enhancement of cybersecurity awareness program on personal data protection among youngsters in Malaysia: an assessment
by: Abd Rahim, Noor Hayani, et al.
Published: (2019) -
Implementation of serious games for data privacy and protection awareness in Cybersecurity
by: Siti Normaziah, Ihsan, et al.
Published: (2023) -
OCES sistem pakar kanser ovari / Noreen Abd. Rahim
by: Noreen , Abd. Rahim
Published: (2001) -
Effects of eye health among youngster while playing computer game
by: Nurul Saidatul Akmal, Ab. Razak, et al.
Published: (2021) -
Blockchain-enabled cybersecurity framework for healthcare domain
by: Islam, Md Shohidul
Published: (2025)