Securing e-learning environment: A study of security awareness and behavior of user
Rapid development of the Internet and technology has shifted the education environment from traditional classroom environments to a state of the art technology-based environment. The term e-learning describes the situation where teaching and learning activities are done not only in classrooms, but v...
| Main Authors: | Wan Nurul Safawati, Wan Manan, Mazlina, Abdul Majid, Hasmanizam, Abdul Majid, Mohd Izham, Ibrahim |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
American Scientific Publishers
2017
|
| Subjects: | |
| Online Access: | http://umpir.ump.edu.my/id/eprint/13131/ http://umpir.ump.edu.my/id/eprint/13131/7/fskkp-2017.pdf |
Similar Items
Investigation of Security Awareness on e-Learning System Among Lecturers and Students in Higher Education Institution
by: Hasmanizam, Abdul Majid, et al.
Published: (2015)
by: Hasmanizam, Abdul Majid, et al.
Published: (2015)
E-commerce solution for electronic tendering system using secure electronic transaction / Mazlina Abdul Majid
by: Mazlina , Abdul Majid
Published: (2004)
by: Mazlina , Abdul Majid
Published: (2004)
A review on security and privacy issues in E-learning and the MapReduce aproach
by: Noor Akma, Abu Bakar, et al.
Published: (2019)
by: Noor Akma, Abu Bakar, et al.
Published: (2019)
Evaluation of users' awareness and their reaction on information security
by: Zeki, Akram M., et al.
Published: (2016)
by: Zeki, Akram M., et al.
Published: (2016)
Survey on mobile and wireless security awareness: user perspectives
by: Nazri, Nadhirah, et al.
Published: (2015)
by: Nazri, Nadhirah, et al.
Published: (2015)
Toward user awareness and acceptance of Sudan E-government: adoption and security perspective
by: Khalifa, Othman Omran, et al.
Published: (2016)
by: Khalifa, Othman Omran, et al.
Published: (2016)
Investigating the student’s awareness on computer security and ethics
by: Aliyu, Mansur, et al.
Published: (2011)
by: Aliyu, Mansur, et al.
Published: (2011)
Persuasive technology for improving information security awareness and behavior: literature review
by: Bawazir, Mohammed Abdullah, et al.
Published: (2016)
by: Bawazir, Mohammed Abdullah, et al.
Published: (2016)
Self awareness before social networking: exploring the user behavior and information security vulnerability in Malaysia
by: Hussin, Husnayati, et al.
Published: (2010)
by: Hussin, Husnayati, et al.
Published: (2010)
Harnessing ANN for a secure environment
by: Ling, Mee Hong *, et al.
Published: (2010)
by: Ling, Mee Hong *, et al.
Published: (2010)
Study of Security Layers Under Attack on Different Layers of Cloud Computing
by: Fakhreldin, Mohammed Adam Ibrahim, et al.
Published: (2014)
by: Fakhreldin, Mohammed Adam Ibrahim, et al.
Published: (2014)
Secure scheme for user authentication and authorization in android environment
by: Dar, Humaira, et al.
Published: (2013)
by: Dar, Humaira, et al.
Published: (2013)
Learning Environment For PDA Security
by: Velu , Vengadeshwaran
Published: (2002)
by: Velu , Vengadeshwaran
Published: (2002)
User awareness on security risks in M-commerce / Mohd Idzham Nawawi
by: Nawawi, Mohd Idzham
Published: (2007)
by: Nawawi, Mohd Idzham
Published: (2007)
Measuring computer security awareness on internet banking and shopping for internet users
by: Sidi, Fatimah, et al.
Published: (2013)
by: Sidi, Fatimah, et al.
Published: (2013)
Web user' knowledge and their behavior towards security threats and vulnerabilities
by: Aldossary, Alia Ahmed, et al.
Published: (2016)
by: Aldossary, Alia Ahmed, et al.
Published: (2016)
Web users’ knowledge and their behavior towards security threats and vulnerabilities
by: Aldossary, Alia Ahmed, et al.
Published: (2016)
by: Aldossary, Alia Ahmed, et al.
Published: (2016)
An analysis of information security awareness within home and work environments
by: Talib, Shuhaili, et al.
Published: (2010)
by: Talib, Shuhaili, et al.
Published: (2010)
A Defensive Evidence Model: An Approach of Security Model for Storing Digital Evidence in Network Forensics
by: Mohd Izham, Ibrahim, et al.
Published: (2012)
by: Mohd Izham, Ibrahim, et al.
Published: (2012)
Guideline for privacy and security in Cloud First Security Environment
by: Abdul Aziz, Normaziah, et al.
Published: (2017)
by: Abdul Aziz, Normaziah, et al.
Published: (2017)
Employing information security awareness to minimize over-exposure of average Internet user on social networks
by: Binden, Worawit, et al.
Published: (2014)
by: Binden, Worawit, et al.
Published: (2014)
Inculcating secure coding for beginners
by: A. Aziz, Normaziah, et al.
Published: (2017)
by: A. Aziz, Normaziah, et al.
Published: (2017)
Risk awareness model for security and privacy in social networking sites from the users’ perspective
by: Abiodun, Balogun Kamoru
Published: (2021)
by: Abiodun, Balogun Kamoru
Published: (2021)
Effect of age on information security awareness level among young internet users in Malaysia
by: Omar, Siti Zobidah, et al.
Published: (2021)
by: Omar, Siti Zobidah, et al.
Published: (2021)
Big Data and Learning Analytics: A Big Potential to Improve E-Learning
by: Khalid Adam, Ismail Hammad, et al.
Published: (2018)
by: Khalid Adam, Ismail Hammad, et al.
Published: (2018)
Smart home security
by: Mohammad Syafi Azim, Mohd Razam
Published: (2019)
by: Mohammad Syafi Azim, Mohd Razam
Published: (2019)
A conceptual security sub-model for enhancing human-agent collaboration based on generic nodal approach
by: Abbas Mohammed, Khudhair, et al.
Published: (2017)
by: Abbas Mohammed, Khudhair, et al.
Published: (2017)
Model driven security frameworks for addressing security problems of Service Oriented Architecture
by: Saleem, M. Q., et al.
Published: (2010)
by: Saleem, M. Q., et al.
Published: (2010)
Energy-efficient data security schemes for mobile users in cloud environment / Abdul Nasir Khan
by: Khan, Abdul Nasir
Published: (2014)
by: Khan, Abdul Nasir
Published: (2014)
Resource-aware trust-based security for vehicular smart-grid networks
by: Walker, Adam David
Published: (2024)
by: Walker, Adam David
Published: (2024)
An overview on cyber security awareness in Muslim countries
by: Basamh, Saeed S., et al.
Published: (2014)
by: Basamh, Saeed S., et al.
Published: (2014)
Information security awareness through the use of social media
by: Abdul Molok, Nurul Nuha, et al.
Published: (2015)
by: Abdul Molok, Nurul Nuha, et al.
Published: (2015)
User access control and security model
by: Crysdian, Cahyo, et al.
Published: (2000)
by: Crysdian, Cahyo, et al.
Published: (2000)
Cyber Security Awareness Webinar Preparing
by: Mritha, Ramalingam
Published: (2021)
by: Mritha, Ramalingam
Published: (2021)
Secure E-Voting With Blind Signature
by: Ibrahim, Subariah, et al.
Published: (2003)
by: Ibrahim, Subariah, et al.
Published: (2003)
Security enhancement during agents communication in GNA Approach
by: Mohammed, Khudhair Abbas, et al.
Published: (2018)
by: Mohammed, Khudhair Abbas, et al.
Published: (2018)
A secure audio steganography approach
by: Zamani, Mazdak, et al.
Published: (2009)
by: Zamani, Mazdak, et al.
Published: (2009)
Enhancement of multicast network security
by: Ali, Sellami, et al.
Published: (2013)
by: Ali, Sellami, et al.
Published: (2013)
An Intelligence Technique For Denial Of Service (Dos) Attack Detection
by: Wan Nurul Safawati, Wan Manan, et al.
Published: (2017)
by: Wan Nurul Safawati, Wan Manan, et al.
Published: (2017)
A Study in Data Security in Cloud Computing
by: Mazlina, Abdul Majid, et al.
Published: (2014)
by: Mazlina, Abdul Majid, et al.
Published: (2014)
Similar Items
-
Investigation of Security Awareness on e-Learning System Among Lecturers and Students in Higher Education Institution
by: Hasmanizam, Abdul Majid, et al.
Published: (2015) -
E-commerce solution for electronic tendering system using secure electronic transaction / Mazlina Abdul Majid
by: Mazlina , Abdul Majid
Published: (2004) -
A review on security and privacy issues in E-learning and the MapReduce aproach
by: Noor Akma, Abu Bakar, et al.
Published: (2019) -
Evaluation of users' awareness and their reaction on information security
by: Zeki, Akram M., et al.
Published: (2016) -
Survey on mobile and wireless security awareness: user perspectives
by: Nazri, Nadhirah, et al.
Published: (2015)