Exploring Studies of Information Security Culture in Malaysia
security management in terms of improving employees’ security behavior in dealing with information assets. Many studies have been done to explore and investigate ISC in various aspects including the concepts, factors, challenges and particular applications related to assessment of ISC in an organiza...
| Main Authors: | Nasir, Akhyari, Ruzaini, Abdullah Arshah, Mohd Tamizan, Abu Bakar |
|---|---|
| Format: | Conference or Workshop Item |
| Language: | English |
| Published: |
2016
|
| Subjects: | |
| Online Access: | http://umpir.ump.edu.my/id/eprint/20529/ http://umpir.ump.edu.my/id/eprint/20529/1/fskkp-2016-akhyari-Exploring%20Studies%20of%20Information%20Security.pdf |
Similar Items
The Formulation of Comprehensive Information Security Culture Dimensions for Information Security Policy Compliance Study
by: Nasir, Akhyari, et al.
Published: (2018)
by: Nasir, Akhyari, et al.
Published: (2018)
Information security culture for guiding employee’s security behaviour: A pilot study
by: Akhyari, Nasir, et al.
Published: (2020)
by: Akhyari, Nasir, et al.
Published: (2020)
Information Security Policy Compliance Behavior Based on Comprehensive Dimensions of Information Security Culture: A Conceptual Framework
by: Nasir, Akhyari, et al.
Published: (2017)
by: Nasir, Akhyari, et al.
Published: (2017)
Information security culture guidelines to improve employee’s security behavior: A review of empirical studies
by: Akhyari, N., et al.
Published: (2018)
by: Akhyari, N., et al.
Published: (2018)
Conceptualizing and Validating Information Security Culture as a Multidimensional Second-Order Formative Construct
by: Nasir, Akhyari, et al.
Published: (2018)
by: Nasir, Akhyari, et al.
Published: (2018)
An analysis on the dimensions of information security culture concept: A review
by: Akhyari, Nasir, et al.
Published: (2019)
by: Akhyari, Nasir, et al.
Published: (2019)
Information security culture model for Malaysian organizations: A review
by: Akhyari, Nasir, et al.
Published: (2020)
by: Akhyari, Nasir, et al.
Published: (2020)
A dimension-based information security culture model for information security policy compliance behavior in Malaysian public universities
by: Akhyari, Nasir
Published: (2019)
by: Akhyari, Nasir
Published: (2019)
The influence of information security culture towards employee’s intention to comply with information security policy: The mediation effect of attitude, normative belief and self-efficacy
by: Mohd Rashid, Ab Hamid, et al.
Published: (2020)
by: Mohd Rashid, Ab Hamid, et al.
Published: (2020)
A dimension-based information security culture model and its relationship with employees’ security behavior: A case study in Malaysian higher educational institutions
by: Akhyari, Nasir, et al.
Published: (2019)
by: Akhyari, Nasir, et al.
Published: (2019)
Information security culture concept towards information security compliance: A comparison between it and non-it professionals
by: Akhyari, Nasir, et al.
Published: (2022)
by: Akhyari, Nasir, et al.
Published: (2022)
The Effect of Security and Privacy Perceptions on Customers’ Trust to Accept Internet Banking Services: An Extension of TAM
by: Al-Sharafi, Mohammed A., et al.
Published: (2016)
by: Al-Sharafi, Mohammed A., et al.
Published: (2016)
Establishing Important Criteria and Factors for Successful Integrated Information System
by: Ruzaini, Abdullah Arshah, et al.
Published: (2012)
by: Ruzaini, Abdullah Arshah, et al.
Published: (2012)
Instrument for Integrated Information System Assessment in Higher Learning Institutions
by: Ruzaini, Abdullah Arshah, et al.
Published: (2017)
by: Ruzaini, Abdullah Arshah, et al.
Published: (2017)
A secure and sustainable framework to mitigate hazardous activities in online social networks
by: Rahman, Md. Arafatur, et al.
Published: (2020)
by: Rahman, Md. Arafatur, et al.
Published: (2020)
A Review of Data Quality Assessment: Data Quality Dimensions from User’s Perspective
by: Ruzaini, Abdullah Arshah, et al.
Published: (2018)
by: Ruzaini, Abdullah Arshah, et al.
Published: (2018)
A LANGUAGE TO REPRESENT SECURITY POLICY FOR MULTI-AGENCY HEALTH INFORMATION SYSTEM
by: Intan najua, kamal nasir, et al.
Published: (2008)
by: Intan najua, kamal nasir, et al.
Published: (2008)
Users' perception of the information security policy at Universiti Teknologi Malaysia
by: Sharif, Haniza
Published: (2009)
by: Sharif, Haniza
Published: (2009)
Conceptualizing a framework to enhance information security culture and compliance behavior in organizations through protection motivation theory
by: Alrawhani, Ebrahim Mohammed, et al.
Published: (2024)
by: Alrawhani, Ebrahim Mohammed, et al.
Published: (2024)
Using the UTAUT Model to Determine the Factors Affecting the Technology Acceptance in Judicial System Environment
by: Amrouni, Khaled I. A., et al.
Published: (2018)
by: Amrouni, Khaled I. A., et al.
Published: (2018)
Information security curriculum framework at undergraduate level
by: Sanusi Arifin, Ab. Arif
Published: (2009)
by: Sanusi Arifin, Ab. Arif
Published: (2009)
An enhanced next generation security operation center framework for information system security management
by: Yau, Ti Dun
Published: (2023)
by: Yau, Ti Dun
Published: (2023)
An Integrated Flood Warning and Response Model for Effective Flood Disaster Mitigation Management
by: Ruzaini, Abdullah Arshah, et al.
Published: (2018)
by: Ruzaini, Abdullah Arshah, et al.
Published: (2018)
E-learning prospect on improving academic performance in Omani Universities
by: Tawafak, Ragad M., et al.
Published: (2019)
by: Tawafak, Ragad M., et al.
Published: (2019)
The effect of sustained use of Cloud-Based Business Services on organizations' performance: Evidence from SMEs in Malaysia
by: Al-Sharafi, Mohammed A., et al.
Published: (2019)
by: Al-Sharafi, Mohammed A., et al.
Published: (2019)
Risk identification for an information security management system implementation
by: Ramli, Noraza, et al.
Published: (2012)
by: Ramli, Noraza, et al.
Published: (2012)
Factors Affecting the Continuous Use of Cloud Computing Services from Expert's Perspective
by: Al-Sharafi, Mohammed A., et al.
Published: (2017)
by: Al-Sharafi, Mohammed A., et al.
Published: (2017)
The Comprehension Theories Of Continuous Intention To Use Tel With E-Learning Models In Educations
by: Tawafak, Ragad M., et al.
Published: (2019)
by: Tawafak, Ragad M., et al.
Published: (2019)
A systematic review: Factors affecting employees’ adoption of E-government using an integration of UTAUT & TTF theories
by: Amrouni, Khaled I. A., et al.
Published: (2019)
by: Amrouni, Khaled I. A., et al.
Published: (2019)
Analysis of Information Security Resource Requirements in Local Governments
by: Toto, Suharto, et al.
Published: (2022)
by: Toto, Suharto, et al.
Published: (2022)
Review on the effect of student learning outcome and teaching technology in Omani's higher education institution's academic accreditation process
by: Tawafak, Ragad M., et al.
Published: (2018)
by: Tawafak, Ragad M., et al.
Published: (2018)
The Effectiveness of Cloud-Based E-Learning towards Quality of Academic Services: An Omanis’ Expert View
by: Alajmi, Qasim, et al.
Published: (2018)
by: Alajmi, Qasim, et al.
Published: (2018)
Computational approach for roles selection via integrated multi-criteria decision making
by: Yau'mee Hayati, Hj Mohamed Yusof, et al.
Published: (2024)
by: Yau'mee Hayati, Hj Mohamed Yusof, et al.
Published: (2024)
Factors influencing the success of information systems in flood early warning and response systems context
by: Hammood, Waleed A., et al.
Published: (2020)
by: Hammood, Waleed A., et al.
Published: (2020)
Online banking information systems acceptance: an empirical examination of system characteristics and web security
by: Chandio, Fida Hussain, et al.
Published: (2017)
by: Chandio, Fida Hussain, et al.
Published: (2017)
The Significance of Main Constructs of Theory of Planned Behavior in Recent Information Security Policy Compliance Behavior Study: A Comparison among Top Three Behavioral Theories
by: Nasir, Akhyari, et al.
Published: (2018)
by: Nasir, Akhyari, et al.
Published: (2018)
The Effect of Perceived Ease of Use and Usefulness on Customers Intention to Use Online Banking Services: The Mediating Role of Perceived Trust
by: Al-Sharafi, Mohammed A., et al.
Published: (2017)
by: Al-Sharafi, Mohammed A., et al.
Published: (2017)
Predefined Object Reduction
by: Mohammed, Mohammed Adam Taheir, et al.
Published: (2013)
by: Mohammed, Mohammed Adam Taheir, et al.
Published: (2013)
Parameters Reduction Comparisions
by: Mohammed, Mohammed Adam Taheir, et al.
Published: (2014)
by: Mohammed, Mohammed Adam Taheir, et al.
Published: (2014)
The acceptance of online social networks as a technology-based education tools among higher institutes students: A structural equation modeling approach
by: Al-Sharafi, Mohammed A., et al.
Published: (2019)
by: Al-Sharafi, Mohammed A., et al.
Published: (2019)
Similar Items
-
The Formulation of Comprehensive Information Security Culture Dimensions for Information Security Policy Compliance Study
by: Nasir, Akhyari, et al.
Published: (2018) -
Information security culture for guiding employee’s security behaviour: A pilot study
by: Akhyari, Nasir, et al.
Published: (2020) -
Information Security Policy Compliance Behavior Based on Comprehensive Dimensions of Information Security Culture: A Conceptual Framework
by: Nasir, Akhyari, et al.
Published: (2017) -
Information security culture guidelines to improve employee’s security behavior: A review of empirical studies
by: Akhyari, N., et al.
Published: (2018) -
Conceptualizing and Validating Information Security Culture as a Multidimensional Second-Order Formative Construct
by: Nasir, Akhyari, et al.
Published: (2018)