Information security culture model for Malaysian organizations: A review
The establishment of Information Security Culture (ISC) has been recommended for improving employees’ information security in the organization. To date, there is still no clear guidance or model for assessing and cultivating ISC for Malaysian organizations, despite some Malaysian-based studies being...
| Main Authors: | Akhyari, Nasir, Ruzaini, Abdullah Arshah, Ab Hamid, Mohd Rashid, Syahrul, Fahmy, Mohd Tamizan, Abu Bakar |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
The World Academy of Research in Science and Engineering
2020
|
| Subjects: | |
| Online Access: | http://umpir.ump.edu.my/id/eprint/30431/ http://umpir.ump.edu.my/id/eprint/30431/1/Information%20security%20culture%20model%20for%20malaysian%20organizations.pdf |
Similar Items
Exploring Studies of Information Security Culture in Malaysia
by: Nasir, Akhyari, et al.
Published: (2016)
by: Nasir, Akhyari, et al.
Published: (2016)
An analysis on the dimensions of information security culture concept: A review
by: Akhyari, Nasir, et al.
Published: (2019)
by: Akhyari, Nasir, et al.
Published: (2019)
Information security culture concept towards information security compliance: A comparison between it and non-it professionals
by: Akhyari, Nasir, et al.
Published: (2022)
by: Akhyari, Nasir, et al.
Published: (2022)
The Formulation of Comprehensive Information Security Culture Dimensions for Information Security Policy Compliance Study
by: Nasir, Akhyari, et al.
Published: (2018)
by: Nasir, Akhyari, et al.
Published: (2018)
A dimension-based information security culture model and its relationship with employees’ security behavior: A case study in Malaysian higher educational institutions
by: Akhyari, Nasir, et al.
Published: (2019)
by: Akhyari, Nasir, et al.
Published: (2019)
Information security culture for guiding employee’s security behaviour: A pilot study
by: Akhyari, Nasir, et al.
Published: (2020)
by: Akhyari, Nasir, et al.
Published: (2020)
The influence of information security culture towards employee’s intention to comply with information security policy: The mediation effect of attitude, normative belief and self-efficacy
by: Mohd Rashid, Ab Hamid, et al.
Published: (2020)
by: Mohd Rashid, Ab Hamid, et al.
Published: (2020)
Conceptualizing and Validating Information Security Culture as a Multidimensional Second-Order Formative Construct
by: Nasir, Akhyari, et al.
Published: (2018)
by: Nasir, Akhyari, et al.
Published: (2018)
Information security culture guidelines to improve employee’s security behavior: A review of empirical studies
by: Akhyari, N., et al.
Published: (2018)
by: Akhyari, N., et al.
Published: (2018)
Information Security Policy Compliance Behavior Based on Comprehensive Dimensions of Information Security Culture: A Conceptual Framework
by: Nasir, Akhyari, et al.
Published: (2017)
by: Nasir, Akhyari, et al.
Published: (2017)
The Significance of Main Constructs of Theory of Planned Behavior in Recent Information Security Policy Compliance Behavior Study: A Comparison among Top Three Behavioral Theories
by: Nasir, Akhyari, et al.
Published: (2018)
by: Nasir, Akhyari, et al.
Published: (2018)
A dimension-based information security culture model for information security policy compliance behavior in Malaysian public universities
by: Akhyari, Nasir
Published: (2019)
by: Akhyari, Nasir
Published: (2019)
How to Cultivate Cyber Security Culture? The Evidences from Literature
by: Akhyari, Nasir, et al.
Published: (2023)
by: Akhyari, Nasir, et al.
Published: (2023)
Conceptualizing a Model for the Effect of Information Culture on Electronic Commerce Adoption
by: Herzallah, Fadi A. T., et al.
Published: (2018)
by: Herzallah, Fadi A. T., et al.
Published: (2018)
Conceptualizing a model for the effect of information culture on electronic commerce adoption
by: Herzallah, Fadi A. T., et al.
Published: (2019)
by: Herzallah, Fadi A. T., et al.
Published: (2019)
Factors Influencing the Continuous Use of Cloud Computing Services in Organization Level
by: Al-Sharafi, Mohammed A., et al.
Published: (2017)
by: Al-Sharafi, Mohammed A., et al.
Published: (2017)
The Effect of Security and Privacy Perceptions on Customers' Trust to Accept Internet Banking Services An Extension of TAM
by: Mohamrned A, Al-Sharafi, et al.
Published: (2016)
by: Mohamrned A, Al-Sharafi, et al.
Published: (2016)
The Impact of Customer Trust and Perception of Security and Privacy on the Acceptance of Online Banking Services: Structural Equation Modeling Approach
by: Al-Sharafi, Mohammed A., et al.
Published: (2016)
by: Al-Sharafi, Mohammed A., et al.
Published: (2016)
Classifying Domains for Criteria and Factors of Successful Integrated Information System
by: Ruzaini, Abdullah Arshah, et al.
Published: (2012)
by: Ruzaini, Abdullah Arshah, et al.
Published: (2012)
Reviewing the Challenge and Practices of Human Factor Involvement in Requirement Specification Validation
by: Fauziah, Zainuddin, et al.
Published: (2018)
by: Fauziah, Zainuddin, et al.
Published: (2018)
The suitability of technology, organization and environment (TOE) and socio technical system (STS) for assessing IT hardware support services (ITHS) model.
by: Azham, Ahmad, et al.
Published: (2021)
by: Azham, Ahmad, et al.
Published: (2021)
The Impacts Of Social Networking Sites In Higher Learning
by: Mohd Ishak, Ismail, et al.
Published: (2016)
by: Mohd Ishak, Ismail, et al.
Published: (2016)
Development of data quality dimensions from user’s perspective framework
by: Mohd Zafrol, Abdullah, et al.
Published: (2018)
by: Mohd Zafrol, Abdullah, et al.
Published: (2018)
A review on security and privacy issues in E-learning and the MapReduce aproach
by: Noor Akma, Abu Bakar, et al.
Published: (2019)
by: Noor Akma, Abu Bakar, et al.
Published: (2019)
Assessment instrument for integrated information system success in institution of higher learning
by: Ruzaini, Abdullah Arshah
Published: (2012)
by: Ruzaini, Abdullah Arshah
Published: (2012)
Information security for professional counseling in organization
by: Mohamed, Abdikadir Yusuf, et al.
Published: (2016)
by: Mohamed, Abdikadir Yusuf, et al.
Published: (2016)
Assessing the Impact of Technology Learning and Assessment
Method on Academic Performance: Review Paper
by: Tawafak, Ragad M., et al.
Published: (2018)
by: Tawafak, Ragad M., et al.
Published: (2018)
The Need of Dashboard in Social Research Network Sites for Researchers
by: Siti Hawa, Apandi, et al.
Published: (2016)
by: Siti Hawa, Apandi, et al.
Published: (2016)
Validation of a Proposed Dashboard Model for Researchers In Social Research Network Sites
by: Siti Hawa, Apandi, et al.
Published: (2015)
by: Siti Hawa, Apandi, et al.
Published: (2015)
A Design of Proposed Dashboard Model for Researchers in Social Research Network Sites
by: Siti Hawa, Apandi, et al.
Published: (2015)
by: Siti Hawa, Apandi, et al.
Published: (2015)
A review on cloud computing security
by: Teo, Marry, et al.
Published: (2018)
by: Teo, Marry, et al.
Published: (2018)
Comprehensive analysis on the influences of computer ethics on information security
by: Abdul Rahim, Fiza
Published: (2009)
by: Abdul Rahim, Fiza
Published: (2009)
A bibliometric analysis of the E-government studies with (UTAUT)
by: Amrouni, Khaled I. A., et al.
Published: (2018)
by: Amrouni, Khaled I. A., et al.
Published: (2018)
Software visual specification for requirement engineering education
by: Fauziah, Zainuddin, et al.
Published: (2019)
by: Fauziah, Zainuddin, et al.
Published: (2019)
Software visual specification for requirement specification validation
by: Fauziah, Zainuddin, et al.
Published: (2018)
by: Fauziah, Zainuddin, et al.
Published: (2018)
A review of divorce information management system
by: Aziman, Abdullah, et al.
Published: (2020)
by: Aziman, Abdullah, et al.
Published: (2020)
Topics in coding, cryptography and information security
Published: (2011)
Published: (2011)
Risk Status Prediction and Modelling Of Students’ Academic
Achievement - A Fuzzy Logic Approach
by: Raheem, Ajiboye Adeleke, et al.
Published: (2013)
by: Raheem, Ajiboye Adeleke, et al.
Published: (2013)
MCMSL Translator: Malaysian Text Translator for Manually Coded Malay Sign Language
by: Mazlina, Abdul Majid, et al.
Published: (2014)
by: Mazlina, Abdul Majid, et al.
Published: (2014)
Datasets Size: Effect on Clustering Results
by: Raheem, Ajiboye Adeleke, et al.
Published: (2013)
by: Raheem, Ajiboye Adeleke, et al.
Published: (2013)
Similar Items
-
Exploring Studies of Information Security Culture in Malaysia
by: Nasir, Akhyari, et al.
Published: (2016) -
An analysis on the dimensions of information security culture concept: A review
by: Akhyari, Nasir, et al.
Published: (2019) -
Information security culture concept towards information security compliance: A comparison between it and non-it professionals
by: Akhyari, Nasir, et al.
Published: (2022) -
The Formulation of Comprehensive Information Security Culture Dimensions for Information Security Policy Compliance Study
by: Nasir, Akhyari, et al.
Published: (2018) -
A dimension-based information security culture model and its relationship with employees’ security behavior: A case study in Malaysian higher educational institutions
by: Akhyari, Nasir, et al.
Published: (2019)