Cybersecurity behavioural model for students in the tertiary institutions / Fatokun Faith Boluwatife
Humans are majorly identified as the weakest link in cybersecurity. Tertiary institution student’s face lot of cybersecurity issues due to their increased Internet exposure, however cybersecurity behavioural studies focusing on tertiary students is limited. This study focused on investigating t...
| Main Author: | Fatokun Faith , Boluwatife |
|---|---|
| Format: | Thesis |
| Published: |
2020
|
| Subjects: | |
| Online Access: | http://studentsrepo.um.edu.my/14371/ http://studentsrepo.um.edu.my/14371/2/Fatokun_Faith.pdf http://studentsrepo.um.edu.my/14371/1/Fatokun_Faith.pdf |
Similar Items
Blockchain-enabled cybersecurity framework for healthcare domain
by: Islam, Md Shohidul
Published: (2025)
by: Islam, Md Shohidul
Published: (2025)
Blockchain-enabled cybersecurity provision for scalable heterogeneous network: A comprehensive survey
by: Islam, Md. Shohidul, et al.
Published: (2024)
by: Islam, Md. Shohidul, et al.
Published: (2024)
Cybersecurity in Big Data Era: From Securing Big Data to Data-Driven Security
by: Manjunatha, V., et al.
Published: (2024)
by: Manjunatha, V., et al.
Published: (2024)
Implementation of serious games for data privacy and protection awareness in Cybersecurity
by: Siti Normaziah, Ihsan, et al.
Published: (2023)
by: Siti Normaziah, Ihsan, et al.
Published: (2023)
Assessment of cybersecurity awareness program on personal data protection among youngsters in Malaysia / Noor Hayani Abd Rahim
by: Noor Hayani , Abd Rahim
Published: (2017)
by: Noor Hayani , Abd Rahim
Published: (2017)
A comparative analysis of anti-phishing website techniques: identifying optimal approaches to enhance cybersecurity
by: Yau, Jia Xin
Published: (2023)
by: Yau, Jia Xin
Published: (2023)
Intrusion detection system using autoencoder based deep neural network for SME cybersecurity
by: Khaizuran Aqhar, Ubaidillah, et al.
Published: (2021)
by: Khaizuran Aqhar, Ubaidillah, et al.
Published: (2021)
Leveraging web and behavioural data for usable adaptive cybersecurity
by: Addae, Joyce Hoese
Published: (2019)
by: Addae, Joyce Hoese
Published: (2019)
The acceptance of online social networks as a technology-based education tools among higher institutes students: A structural equation modeling approach
by: Al-Sharafi, Mohammed A., et al.
Published: (2019)
by: Al-Sharafi, Mohammed A., et al.
Published: (2019)
Crowd modelling behaviour based on modified microscopic models in panic situation
by: Sharbini, Hamizan
Published: (2010)
by: Sharbini, Hamizan
Published: (2010)
The role of cybersecurity on the performance of Malaysian higher education institutions
by: Balla Moussa Dioubate,, et al.
Published: (2023)
by: Balla Moussa Dioubate,, et al.
Published: (2023)
Factors affecting cyberbullying behaviours among university students: A review
by: Nur Shamsiah, Abdul Rahman, et al.
Published: (2023)
by: Nur Shamsiah, Abdul Rahman, et al.
Published: (2023)
Adoption model for cloud-based E-learning in Omani higher education institutions
by: Hassan Alajmi, Qasim Abdullah
Published: (2019)
by: Hassan Alajmi, Qasim Abdullah
Published: (2019)
Knowledge sharing model for Fakulti Sains Komputer & Sistem Maklumat Institutional Repository
by: Hussain, Bibi Zuraidah
Published: (2010)
by: Hussain, Bibi Zuraidah
Published: (2010)
The effect of usability and information quality on Malaysian user’s satisfaction of student information systems in higher education institutions
by: Atta, Mohammed Thamir
Published: (2019)
by: Atta, Mohammed Thamir
Published: (2019)
Parallel Geometric Hashing Algorithm For Protein Tertiary Structure.
by: Jaber, Khalid, et al.
Published: (2007)
by: Jaber, Khalid, et al.
Published: (2007)
Review on the effect of student learning outcome and teaching technology in Omani's higher education institution's academic accreditation process
by: Tawafak, Ragad M., et al.
Published: (2018)
by: Tawafak, Ragad M., et al.
Published: (2018)
A conceptual model of e-learning based on cloud computing adoption in higher education institutions
by: Alajmi, Qasim, et al.
Published: (2018)
by: Alajmi, Qasim, et al.
Published: (2018)
Modelling Reactive and Proactive Behaviour in Simulation
by: Mazlina, Abdul Majid, et al.
Published: (2010)
by: Mazlina, Abdul Majid, et al.
Published: (2010)
The effects of social media on consumer behaviour in tourism: A study among university students
by: Bay, Sheue Wen
Published: (2018)
by: Bay, Sheue Wen
Published: (2018)
Password Usage: An Analysis in Academic Institution
by: M. N. M., Kahar, et al.
Published: (2007)
by: M. N. M., Kahar, et al.
Published: (2007)
Enhanced Honey Bees Colony Algorithms For Protein Tertiary Structure Prediction
by: Bahamish, Hesham Awadh Abdallah
Published: (2011)
by: Bahamish, Hesham Awadh Abdallah
Published: (2011)
Harmony search algorithms for ab initio protein tertiary structure prediction.
by: Rub, Mohammed Said Saleh Abual
Published: (2011)
by: Rub, Mohammed Said Saleh Abual
Published: (2011)
A microscopic swarm model simulation and fractal approach towards swarm agent behaviour
by: Widyarto, Setyawan, et al.
Published: (2006)
by: Widyarto, Setyawan, et al.
Published: (2006)
Comparing Discrete Event and Agent Based Simulation in Modelling Human Behaviour at Airport Check-in Counter
by: Mazlina, Abdul Majid, et al.
Published: (2016)
by: Mazlina, Abdul Majid, et al.
Published: (2016)
A hybrid MCDM model for roles selection in supporting talent development intervention programme in Malaysia public higher education institution
by: Yau’mee Hayati, Hj Mohamed Yusof, et al.
Published: (2023)
by: Yau’mee Hayati, Hj Mohamed Yusof, et al.
Published: (2023)
Bipartite Graph Algorithm With Reference Frame Representation For Protein Tertiary Structure Matching
by: Othman, Fazilah
Published: (2010)
by: Othman, Fazilah
Published: (2010)
An Evaluation of the Usage of Web 2.0 among Tertiary Level Students in Malaysia
by: Jaafar, J., et al.
Published: (2010)
by: Jaafar, J., et al.
Published: (2010)
Ethics, Cybersecurity and the Military
by: Ford, Shannon
Published: (2013)
by: Ford, Shannon
Published: (2013)
Metamorphic testing for cybersecurity
by: Chen, Tsong Yueh, et al.
Published: (2016)
by: Chen, Tsong Yueh, et al.
Published: (2016)
Tertiary Educators' Awareness of and Readiness to use Virtual Reality (VR) in Remote Online Learning
by: Wan Jumani, Fauzi, et al.
Published: (2023)
by: Wan Jumani, Fauzi, et al.
Published: (2023)
Instrument for Integrated Information System Assessment in Higher Learning Institutions
by: Ruzaini, Abdullah Arshah, et al.
Published: (2017)
by: Ruzaini, Abdullah Arshah, et al.
Published: (2017)
Factors affecting Yemen higher education institutions performance: Challeneges and obstacles
by: Al-haimi, Basheer, et al.
Published: (2018)
by: Al-haimi, Basheer, et al.
Published: (2018)
Preparation and characterization of polyaniline, cellulose triacetate and cellulose triacetatepolyaniline-lithium salt blend films / Faith Paujik
by: Paujik, Faith
Published: (2009)
by: Paujik, Faith
Published: (2009)
Facial recognition-based attendance monitoring system for educational institution
by: Tan, Shu Jing
Published: (2018)
by: Tan, Shu Jing
Published: (2018)
Education Institution Internet Of Things (IOT) Online Dashboard For Academic Data Sharing
by: Syafiq Fauzi, Kamarulzaman
Published: (2019)
by: Syafiq Fauzi, Kamarulzaman
Published: (2019)
E-book Scenario in Malaysia Tertiary Education: A Case Study
by: P. F., Chong, et al.
Published: (2008)
by: P. F., Chong, et al.
Published: (2008)
Exploring the relationship between Internet ethics in university students and the big five model of personality
by: Abdul Karim, Nor Shahriza, et al.
Published: (2009)
by: Abdul Karim, Nor Shahriza, et al.
Published: (2009)
Aspect-based Sentiment Analysis Model for Evaluating Teachers' Performance from Students' Feedback
by: Bhowmik, Abhijit, et al.
Published: (2023)
by: Bhowmik, Abhijit, et al.
Published: (2023)
Student Assessment Feedback Effectiveness Model for Enhancing Teaching Method and Developing Academic Performance
by: Tawafak, Ragad M., et al.
Published: (2019)
by: Tawafak, Ragad M., et al.
Published: (2019)
Similar Items
-
Blockchain-enabled cybersecurity framework for healthcare domain
by: Islam, Md Shohidul
Published: (2025) -
Blockchain-enabled cybersecurity provision for scalable heterogeneous network: A comprehensive survey
by: Islam, Md. Shohidul, et al.
Published: (2024) -
Cybersecurity in Big Data Era: From Securing Big Data to Data-Driven Security
by: Manjunatha, V., et al.
Published: (2024) -
Implementation of serious games for data privacy and protection awareness in Cybersecurity
by: Siti Normaziah, Ihsan, et al.
Published: (2023) -
Assessment of cybersecurity awareness program on personal data protection among youngsters in Malaysia / Noor Hayani Abd Rahim
by: Noor Hayani , Abd Rahim
Published: (2017)