A secure and sustainable framework to mitigate hazardous activities in online social networks
Recent years have seen continuous exposure of online social network (OSN) users to the security vulnerability due to socio-technical cyber hazards committed by OSN associates. Unfortunately, the current OSN platforms has lack of functionalities for automatic users protection in initiating online fri...
| Main Authors: | Rahman, Md. Arafatur, Sadat, M. S. Nazmus, Asyhari, A. Taufiq, Refat, Nadia, M. Nomani, Kabir, Ruzaini, Abdullah Arshah |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
IEEE
2020
|
| Subjects: | |
| Online Access: | http://umpir.ump.edu.my/id/eprint/29634/ http://umpir.ump.edu.my/id/eprint/29634/1/A%20Secure%20and%20Sustainable%20Framework%20to%20Mitigate%20Hazardous%20Activities.pdf |
Similar Items
Evaluation of the likelihood of friend request acceptance in online social networks
by: Mezhuyev, Vitaliy, et al.
Published: (2019)
by: Mezhuyev, Vitaliy, et al.
Published: (2019)
SPY-BOT: Machine learning-enabled post filtering for social network-integrated industrial internet of things
by: Rahman, Md. Arafatur, et al.
Published: (2021)
by: Rahman, Md. Arafatur, et al.
Published: (2021)
Information Security Policy Compliance Behavior Based on Comprehensive Dimensions of Information Security Culture: A Conceptual Framework
by: Nasir, Akhyari, et al.
Published: (2017)
by: Nasir, Akhyari, et al.
Published: (2017)
A reliable friendship mechanism for online social network exploiting pre and post-filtering approach
by: S M Nazmus, Sadat
Published: (2022)
by: S M Nazmus, Sadat
Published: (2022)
On mitigating hop-to-hop congestion problem in IoT enabled Intra-Vehicular communication
by: Rahman, Md. Arafatur, et al.
Published: (2015)
by: Rahman, Md. Arafatur, et al.
Published: (2015)
Blockchain Security Hole: Issues and Solutions
by: Norul Suhaliana, Abd Halim, et al.
Published: (2018)
by: Norul Suhaliana, Abd Halim, et al.
Published: (2018)
Data-driven dynamic clustering framework for mitigating the adverse economic impact of Covid-19 lockdown practices
by: Rahman, Md. Arafatur, et al.
Published: (2020)
by: Rahman, Md. Arafatur, et al.
Published: (2020)
Development of a web-extension for authentication of online hadith texts
by: Kabir, M. Nomani, et al.
Published: (2018)
by: Kabir, M. Nomani, et al.
Published: (2018)
Information security culture guidelines to improve employee’s security behavior: A review of empirical studies
by: Akhyari, N., et al.
Published: (2018)
by: Akhyari, N., et al.
Published: (2018)
An Integrated Flood Warning and Response Model for Effective Flood Disaster Mitigation Management
by: Ruzaini, Abdullah Arshah, et al.
Published: (2018)
by: Ruzaini, Abdullah Arshah, et al.
Published: (2018)
Traveling distance estimation to mitigate unnecessary handoff in mobile wireless networks
by: Rahman, Md. Arafatur, et al.
Published: (2019)
by: Rahman, Md. Arafatur, et al.
Published: (2019)
Interactive Learning Experience-Driven Smart Communications Networks for Cognitive Load Management in Grammar Learning Context
by: Refat, Nadia, et al.
Published: (2019)
by: Refat, Nadia, et al.
Published: (2019)
The Impact of Customer Trust and Perception of Security and Privacy on the Acceptance of Online Banking Services: Structural Equation Modeling Approach
by: Al-Sharafi, Mohammed A., et al.
Published: (2016)
by: Al-Sharafi, Mohammed A., et al.
Published: (2016)
The Formulation of Comprehensive Information Security Culture Dimensions for Information Security Policy Compliance Study
by: Nasir, Akhyari, et al.
Published: (2018)
by: Nasir, Akhyari, et al.
Published: (2018)
The Emergence of Internet of Things (IoT): Connecting Anything, Anywhere
by: Rahman, Md. Arafatur, et al.
Published: (2019)
by: Rahman, Md. Arafatur, et al.
Published: (2019)
IoT enable relay network for demand based light intensity controlled seamless highway lighting system
by: Rahman, Md. Arafatur, et al.
Published: (2018)
by: Rahman, Md. Arafatur, et al.
Published: (2018)
Information security culture for guiding employee’s security behaviour: A pilot study
by: Akhyari, Nasir, et al.
Published: (2020)
by: Akhyari, Nasir, et al.
Published: (2020)
Exploring Studies of Information Security Culture in Malaysia
by: Nasir, Akhyari, et al.
Published: (2016)
by: Nasir, Akhyari, et al.
Published: (2016)
An advanced and secure framework for conducting online examination using blockchain method
by: Sattar, Md Rahat Ibne, et al.
Published: (2023)
by: Sattar, Md Rahat Ibne, et al.
Published: (2023)
Reliable Decision Making of Accepting Friend Request on Online Social Networks
by: Rahman, Md. Arafatur, et al.
Published: (2018)
by: Rahman, Md. Arafatur, et al.
Published: (2018)
Conceptualizing and Validating Information Security Culture as a Multidimensional Second-Order Formative Construct
by: Nasir, Akhyari, et al.
Published: (2018)
by: Nasir, Akhyari, et al.
Published: (2018)
Development of data quality dimensions from user’s perspective framework
by: Mohd Zafrol, Abdullah, et al.
Published: (2018)
by: Mohd Zafrol, Abdullah, et al.
Published: (2018)
An analysis on the dimensions of information security culture concept: A review
by: Akhyari, Nasir, et al.
Published: (2019)
by: Akhyari, Nasir, et al.
Published: (2019)
The emergence of internet of things (IoT) : connecting anything, anywhere
by: Rahman, Md. Arafatur, et al.
Published: (2019)
by: Rahman, Md. Arafatur, et al.
Published: (2019)
An Expanding Neighbourhood Search Technique for Avalanche Search-and-Rescue Operations using Air Ground Collaborative Wireless Networks
by: Azad, Saiful, et al.
Published: (2018)
by: Azad, Saiful, et al.
Published: (2018)
A Performance Investigation on IoT Enabled Intra-Vehicular Wireless Sensor Networks
by: Rahman, Md. Arafatur, et al.
Published: (2017)
by: Rahman, Md. Arafatur, et al.
Published: (2017)
The Effect of Security and Privacy Perceptions on Customers’ Trust to Accept Internet Banking Services: An Extension of TAM
by: Al-Sharafi, Mohammed A., et al.
Published: (2016)
by: Al-Sharafi, Mohammed A., et al.
Published: (2016)
Lightning hazard mitigation in Uganda
by: Mary, Ahurra Kulyaka, et al.
Published: (2014)
by: Mary, Ahurra Kulyaka, et al.
Published: (2014)
The influence of information security culture towards employee’s intention to comply with information security policy: The mediation effect of attitude, normative belief and self-efficacy
by: Mohd Rashid, Ab Hamid, et al.
Published: (2020)
by: Mohd Rashid, Ab Hamid, et al.
Published: (2020)
Hybrid Framework Parameterization Reduction Combination in Soft Set
by: Mohammed, Mohammed Adam Taheir, et al.
Published: (2015)
by: Mohammed, Mohammed Adam Taheir, et al.
Published: (2015)
A robust algorithm for solving nonlinear system of equations using trust-region and line-search techniques
by: Kabir, M. Nomani
Published: (2020)
by: Kabir, M. Nomani
Published: (2020)
Online securities trading and control of securities offences in Malaysia
by: Jawahitha, , Sarabdeen, et al.
Published: (2006)
by: Jawahitha, , Sarabdeen, et al.
Published: (2006)
Online securities trading and control of securities offences in Malaysia
by: Jawahitha, , Sarabdeen, et al.
Published: (2006)
by: Jawahitha, , Sarabdeen, et al.
Published: (2006)
Crowd Associated Network: Exploiting over a Smart Garbage Management System
by: Azad, Saiful, et al.
Published: (2017)
by: Azad, Saiful, et al.
Published: (2017)
Understanding Online Banking Acceptance By Jordanian Customers: The Effect Of Trust Perceptions
by: Al-Sharafi, Mohammed A., et al.
Published: (2016)
by: Al-Sharafi, Mohammed A., et al.
Published: (2016)
Framework Of Strategic Alignment Through Enterprise Architecture For Organization Performance
by: Yoppy Mirza, Maulana, et al.
Published: (2021)
by: Yoppy Mirza, Maulana, et al.
Published: (2021)
Immunology Inspired Framework for Securing MANETs
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2009)
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2009)
Immune Inspired Framework for MANETs’ Security
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2008)
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2008)
The Effect of Perceived Ease of Use and Usefulness on Customers Intention to Use Online Banking Services: The Mediating Role of Perceived Trust
by: Al-Sharafi, Mohammed A., et al.
Published: (2017)
by: Al-Sharafi, Mohammed A., et al.
Published: (2017)
A Robust Image Watermarking Technique With an Optimal DCT-Psychovisual Threshold
by: Ernawan, Ferda, et al.
Published: (2018)
by: Ernawan, Ferda, et al.
Published: (2018)
Similar Items
-
Evaluation of the likelihood of friend request acceptance in online social networks
by: Mezhuyev, Vitaliy, et al.
Published: (2019) -
SPY-BOT: Machine learning-enabled post filtering for social network-integrated industrial internet of things
by: Rahman, Md. Arafatur, et al.
Published: (2021) -
Information Security Policy Compliance Behavior Based on Comprehensive Dimensions of Information Security Culture: A Conceptual Framework
by: Nasir, Akhyari, et al.
Published: (2017) -
A reliable friendship mechanism for online social network exploiting pre and post-filtering approach
by: S M Nazmus, Sadat
Published: (2022) -
On mitigating hop-to-hop congestion problem in IoT enabled Intra-Vehicular communication
by: Rahman, Md. Arafatur, et al.
Published: (2015)