An investigation of health information system security policies compliance behaviour / Norshima Humaidi
Health Information System (HIS) has a higher degree of vulnerability towards threats of information security such as unauthorized access, use, disclosure, disruption, modification or destruction and duplication of passwords. Human error is a major security threat to information system’s security and...
| Main Author: | Norshima, Humaidi |
|---|---|
| Format: | Thesis |
| Published: |
2016
|
| Subjects: | |
| Online Access: | http://studentsrepo.um.edu.my/6604/ http://studentsrepo.um.edu.my/6604/4/norshima.pdf |
Similar Items
Managerial implications of student activity information system implementation at Faculty of Business and Management / Norshima Humadi
by: Humadi, Norshima, et al.
Published: (2020)
by: Humadi, Norshima, et al.
Published: (2020)
The Formulation of Comprehensive Information Security Culture Dimensions for Information Security Policy Compliance Study
by: Nasir, Akhyari, et al.
Published: (2018)
by: Nasir, Akhyari, et al.
Published: (2018)
Investigating the barriers of health information system implementation in Malaysian Public Hospitals
by: Norsyaliza, Abd Razak, et al.
Published: (2020)
by: Norsyaliza, Abd Razak, et al.
Published: (2020)
Information security policy compliance model for government agency
by: Ramli, Muhamad Amirnazmi
Published: (2018)
by: Ramli, Muhamad Amirnazmi
Published: (2018)
Spatial correlation analysis of obesity cases with Demographic and fast food outlets distribution / Siti Nur Zulaikha Che Humaidi
by: Che Humaidi, Siti Nur zulaikha
Published: (2018)
by: Che Humaidi, Siti Nur zulaikha
Published: (2018)
Information Security Policy Compliance Behavior Based on Comprehensive Dimensions of Information Security Culture: A Conceptual Framework
by: Nasir, Akhyari, et al.
Published: (2017)
by: Nasir, Akhyari, et al.
Published: (2017)
The practice of information security: An analysis of government employees in Tanzania using the Health Belief Model (HBM)
by: Koloseni, Daniel Ntabagi
Published: (2017)
by: Koloseni, Daniel Ntabagi
Published: (2017)
Effect of using different ratio of soil and coconut husk as a planting medium to the growth performance of oil palm seedlings / Mohamad Humaidi Harun
by: Harun, Mohamad Humaidi
Published: (2015)
by: Harun, Mohamad Humaidi
Published: (2015)
A dimension-based information security culture model for information security policy compliance behavior in Malaysian public universities
by: Akhyari, Nasir
Published: (2019)
by: Akhyari, Nasir
Published: (2019)
Comprehensive analysis on the influences of computer ethics on information security
by: Abdul Rahim, Fiza
Published: (2009)
by: Abdul Rahim, Fiza
Published: (2009)
Information security behaviour : a descriptive analysis on a Malaysian public university
by: Ramlah Hussein, *, et al.
Published: (2011)
by: Ramlah Hussein, *, et al.
Published: (2011)
Investigation of Security Awareness on e-Learning System Among Lecturers and Students in Higher Education Institution
by: Hasmanizam, Abdul Majid, et al.
Published: (2015)
by: Hasmanizam, Abdul Majid, et al.
Published: (2015)
A LANGUAGE TO REPRESENT SECURITY POLICY FOR MULTI-AGENCY HEALTH INFORMATION SYSTEM
by: Intan najua, kamal nasir, et al.
Published: (2008)
by: Intan najua, kamal nasir, et al.
Published: (2008)
Methods of intrusion detection in information security incident detection: a comparative study
by: Tan, Fui Bee, et al.
Published: (2018)
by: Tan, Fui Bee, et al.
Published: (2018)
Multibiometric systems and template security survey
by: Khalaf, Emad Taha, et al.
Published: (2015)
by: Khalaf, Emad Taha, et al.
Published: (2015)
A model of compliance on the quality system for software industry by ISO 9000 -3 / Burhani Amirudin.
by: Amirudin, Burhani
Published: (1999)
by: Amirudin, Burhani
Published: (1999)
Halal Computer Systems Validation Quality Assurance, Risk Assessment and Regulatory Compliance For The Pharmaceutical and Healthcare Industry
by: Raja Ikram, Raja Rina, et al.
Published: (2012)
by: Raja Ikram, Raja Rina, et al.
Published: (2012)
Investigating the student’s awareness on computer security and ethics
by: Aliyu, Mansur, et al.
Published: (2011)
by: Aliyu, Mansur, et al.
Published: (2011)
An investigation on cloud computing adoption within information technology companies
by: Mohammadi, A., et al.
Published: (2021)
by: Mohammadi, A., et al.
Published: (2021)
Web-Based Reporting Vulnerabilities System for Cyber Security
Maintenance
by: Hamid Ali, Firkhan Ali, et al.
Published: (2023)
by: Hamid Ali, Firkhan Ali, et al.
Published: (2023)
Hospital information system modeling
by: Kaghazchi, Hamid Reza
Published: (2008)
by: Kaghazchi, Hamid Reza
Published: (2008)
Production information tracking system
by: Tioh, Keat Soon
Published: (2008)
by: Tioh, Keat Soon
Published: (2008)
Green information technology adoption towards a sustainability policy agenda for government-based institutions: an administrative perspective
by: Anthony Jnr, Bokolo, et al.
Published: (2018)
by: Anthony Jnr, Bokolo, et al.
Published: (2018)
Analysis of Information Security Resource Requirements in Local Governments
by: Toto, Suharto, et al.
Published: (2022)
by: Toto, Suharto, et al.
Published: (2022)
The Impact of Information Quality and Usability on Intention to Use Student Information System
by: Atta, Mohammed Thamir, et al.
Published: (2018)
by: Atta, Mohammed Thamir, et al.
Published: (2018)
An overview of ATM systems security
by: Alharaki, Omarah Omar, et al.
Published: (2011)
by: Alharaki, Omarah Omar, et al.
Published: (2011)
Network Security Encryption Techniques for Reliablility Data Transmission on Password System
by: Norrozila, Sulaiman, et al.
Published: (2013)
by: Norrozila, Sulaiman, et al.
Published: (2013)
UTAR Societies’ Events Information System
by: Teoh, Wan Ching
Published: (2019)
by: Teoh, Wan Ching
Published: (2019)
Smart home security
by: Mohammad Syafi Azim, Mohd Razam
Published: (2019)
by: Mohammad Syafi Azim, Mohd Razam
Published: (2019)
Secure student attendance system based on geo-location and QR code technologies
by: Noor Fathin Shahirah, Ahmat
Published: (2018)
by: Noor Fathin Shahirah, Ahmat
Published: (2018)
Android based smart security systems using internet of things (IoT) and firebase
by: Harvent Rau, Mogana Ravu
Published: (2019)
by: Harvent Rau, Mogana Ravu
Published: (2019)
A new secure storing system for biometric templates based encryption and concealment
by: Khalaf, Emad Taha, et al.
Published: (2015)
by: Khalaf, Emad Taha, et al.
Published: (2015)
Securing cloud data system (SCDS) for key exposure using AES algorithm
by: Thabet Albatol, Mohammed Samer Hasan
Published: (2021)
by: Thabet Albatol, Mohammed Samer Hasan
Published: (2021)
Model driven security frameworks for addressing security problems of Service Oriented Architecture
by: Saleem, M. Q., et al.
Published: (2010)
by: Saleem, M. Q., et al.
Published: (2010)
Securing e-learning environment: A study of security awareness and behavior of user
by: Wan Nurul Safawati, Wan Manan, et al.
Published: (2017)
by: Wan Nurul Safawati, Wan Manan, et al.
Published: (2017)
Real-time personal protective equipment compliance detection using you only look once
by: Nurhanisah, Aminuddin, et al.
Published: (2024)
by: Nurhanisah, Aminuddin, et al.
Published: (2024)
Technological impact on disaster management information system
by: Islam, Humayun Kadir, et al.
Published: (2004)
by: Islam, Humayun Kadir, et al.
Published: (2004)
Health Information Management System (Modul Services)/ Mohd Zairee Zakaria
by: Mohd Zairee , Zakaria
Published: (2003)
by: Mohd Zairee , Zakaria
Published: (2003)
Blockchain-enabled Secure Privacy-preserving System for Public Health-center Data
by: Islam, Md. Shohidul, et al.
Published: (2023)
by: Islam, Md. Shohidul, et al.
Published: (2023)
Information disclosure behaviour in social media among Malaysian youth : the impact of privacy concern, risk and trust
by: Norsaremah Salleh,, et al.
Published: (2011)
by: Norsaremah Salleh,, et al.
Published: (2011)
Similar Items
-
Managerial implications of student activity information system implementation at Faculty of Business and Management / Norshima Humadi
by: Humadi, Norshima, et al.
Published: (2020) -
The Formulation of Comprehensive Information Security Culture Dimensions for Information Security Policy Compliance Study
by: Nasir, Akhyari, et al.
Published: (2018) -
Investigating the barriers of health information system implementation in Malaysian Public Hospitals
by: Norsyaliza, Abd Razak, et al.
Published: (2020) -
Information security policy compliance model for government agency
by: Ramli, Muhamad Amirnazmi
Published: (2018) -
Spatial correlation analysis of obesity cases with Demographic and fast food outlets distribution / Siti Nur Zulaikha Che Humaidi
by: Che Humaidi, Siti Nur zulaikha
Published: (2018)