Exploring cyber security behavioral practices among secondary school students following the MyDigital Maker Champion program in Putrajaya, Malaysia
The practice of cyber security behaviour is the act of protecting digital devices and oneself from cyber threats. Cases of cyber threats increasing year by year have negatively affected the victims, such as loss of money, properties and emotional disturbance. Furthermore, teenagers are the most inte...
| Main Authors: | Intan Diana, Ismail, Ismi Arif, Mohd Zairul |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Human Resource Management Academic Research Society
2024
|
| Online Access: | http://psasir.upm.edu.my/id/eprint/118441/ http://psasir.upm.edu.my/id/eprint/118441/1/118441.pdf |
Similar Items
MY SAY: The new champions
by: Abd Razak, Dzulkifli
Published: (2009)
by: Abd Razak, Dzulkifli
Published: (2009)
Securing cyber security at all fronts
by: Sani, Rozana
Published: (2017)
by: Sani, Rozana
Published: (2017)
Toward a Cyber Security Adoption Framework for Primary and Secondary Education Providers
by: Torres, Mason, et al.
Published: (2020)
by: Torres, Mason, et al.
Published: (2020)
Design and analysis of Rabin-p key encapsulation mechanism for CyberSecurity Malaysia MySEAL initiative
by: Asbullah, Muhammad Asyraf, et al.
Published: (2019)
by: Asbullah, Muhammad Asyraf, et al.
Published: (2019)
Maintaining ideological security and legitimacy in digital China: Governance of cyber historical nihilism
by: Xu, Jian, et al.
Published: (2022)
by: Xu, Jian, et al.
Published: (2022)
Our champions!
by: Noor Azlan, Ratin, et al.
Published: (2010)
by: Noor Azlan, Ratin, et al.
Published: (2010)
A survey on cyber security of CAV
by: He, Qiyi, et al.
Published: (2017)
by: He, Qiyi, et al.
Published: (2017)
Cyber Security Awareness Webinar Preparing
by: Mritha, Ramalingam
Published: (2021)
by: Mritha, Ramalingam
Published: (2021)
First champions in tourney
by: The Star, Y.P. Sivam
Published: (2013)
by: The Star, Y.P. Sivam
Published: (2013)
Interplay between cyber supply chain risk management practices and cyber security performance
by: Gani, Anisha Banu Dawood, et al.
Published: (2022)
by: Gani, Anisha Banu Dawood, et al.
Published: (2022)
Cyber security in the open data: where is the equilibrium?
by: Zulhuda, Sonny
Published: (2017)
by: Zulhuda, Sonny
Published: (2017)
An overview on cyber security awareness in Muslim countries
by: Basamh, Saeed S., et al.
Published: (2014)
by: Basamh, Saeed S., et al.
Published: (2014)
Cyber Security Awareness Among Students In Ump
by: Nur Madihah, Mazlan
Published: (2023)
by: Nur Madihah, Mazlan
Published: (2023)
Digital examination question paper maker and analyser / Eng Cheng Kait
by: Eng , Cheng Kait
Published: (2004)
by: Eng , Cheng Kait
Published: (2004)
UPM archers emerge as champions
by: Khalid, Mohd Khairie
Published: (2018)
by: Khalid, Mohd Khairie
Published: (2018)
Scratch trio emerge champions
by: Karr Wei, Tan
Published: (2013)
by: Karr Wei, Tan
Published: (2013)
Fundamental of zero trust among digital employees in migration to industry 4.0: Cyber security and movement to iot in Malaysian perspectives
by: Irza Hanie, Abu Samah, et al.
Published: (2023)
by: Irza Hanie, Abu Samah, et al.
Published: (2023)
Cyber resilience in Malaysia: Strengthening the digital frontier
by: Mazita, Mokhtar, et al.
Published: (2024)
by: Mazita, Mokhtar, et al.
Published: (2024)
The Invisible Hand of the Maker
by: Martin, John
Published: (2022)
by: Martin, John
Published: (2022)
Designers, Makers and Technology
by: Farren, Anne
Published: (2016)
by: Farren, Anne
Published: (2016)
Young Music Makers
by: The Star, Yam Phui Yee
Published: (2008)
by: The Star, Yam Phui Yee
Published: (2008)
Cyber security and open government in Malaysia: issues and development
by: Zulhuda, Sonny
Published: (2016)
by: Zulhuda, Sonny
Published: (2016)
Webinar Cyber security and IR 4.0 Awareness
by: Mritha, Ramalingam
Published: (2021)
by: Mritha, Ramalingam
Published: (2021)
Cyber warfare impact to national security - Malaysia experiences
by: Azian, Ibrahim, et al.
Published: (2019)
by: Azian, Ibrahim, et al.
Published: (2019)
FKASA-Civer Dragon- Champion of Netball, FSKKP-Arctic Fox- Champion of Futsal UMP Super 5
by: Siti Nurfarmy, Ibrahim
Published: (2019)
by: Siti Nurfarmy, Ibrahim
Published: (2019)
Seven new champion linear codes
by: Brown, Gavin, et al.
Published: (2013)
by: Brown, Gavin, et al.
Published: (2013)
'Nobody will thank me for this': Championing the ERA
by: Schilo, Ann
Published: (2012)
by: Schilo, Ann
Published: (2012)
UPM overall champions of MASUM Games
by: New Straits, Times
Published: (2012)
by: New Straits, Times
Published: (2012)
MBBC CHAMPION TO COMPETE IN COPENHAGEN,
DENMARK
by: MPRC, Pusat Media & Perhubungan Awam
Published: (2016)
by: MPRC, Pusat Media & Perhubungan Awam
Published: (2016)
Malcolm X champion of equal rights
by: Abd Razak, Dzulkifli
Published: (2005)
by: Abd Razak, Dzulkifli
Published: (2005)
Cyber security maturity model and Maqasid al-Shari'ah
by: M. Ridza, Nadwiyah, et al.
Published: (2018)
by: M. Ridza, Nadwiyah, et al.
Published: (2018)
A systematic review of approaches to assessing cyber security awareness
by: Abd Rahim, Noor Hayani, et al.
Published: (2015)
by: Abd Rahim, Noor Hayani, et al.
Published: (2015)
A comprehensive insight into game theory in relevance to cyber security
by: Anwar, Farhat, et al.
Published: (2020)
by: Anwar, Farhat, et al.
Published: (2020)
How to Cultivate Cyber Security Culture? The Evidences from Literature
by: Akhyari, Nasir, et al.
Published: (2023)
by: Akhyari, Nasir, et al.
Published: (2023)
UMP, CyberSecurity tingkat keupayaan pakar keselamatan siber
by: Nor Salwana, Mohammad Idris
Published: (2021)
by: Nor Salwana, Mohammad Idris
Published: (2021)
Interplay between Supply Chain Visibility and Cyber Security Performance
by: Gani, Anisha Banu Dawood, et al.
Published: (2021)
by: Gani, Anisha Banu Dawood, et al.
Published: (2021)
A systematic literature review of mitigating cyber security risk
by: Kamarudin, Syafila, et al.
Published: (2023)
by: Kamarudin, Syafila, et al.
Published: (2023)
Cyber security awareness: Is there any significant difference in demographic factors?
by: Sharkawi, Ismawati, et al.
Published: (2023)
by: Sharkawi, Ismawati, et al.
Published: (2023)
Web-Based Reporting Vulnerabilities System for Cyber Security Maintenance
by: Hamid Ali, Firkhan Ali, et al.
Published: (2023)
by: Hamid Ali, Firkhan Ali, et al.
Published: (2023)
Web-Based Reporting Vulnerabilities System for Cyber Security
Maintenance
by: Hamid Ali, Firkhan Ali, et al.
Published: (2023)
by: Hamid Ali, Firkhan Ali, et al.
Published: (2023)
Similar Items
-
MY SAY: The new champions
by: Abd Razak, Dzulkifli
Published: (2009) -
Securing cyber security at all fronts
by: Sani, Rozana
Published: (2017) -
Toward a Cyber Security Adoption Framework for Primary and Secondary Education Providers
by: Torres, Mason, et al.
Published: (2020) -
Design and analysis of Rabin-p key encapsulation mechanism for CyberSecurity Malaysia MySEAL initiative
by: Asbullah, Muhammad Asyraf, et al.
Published: (2019) -
Maintaining ideological security and legitimacy in digital China: Governance of cyber historical nihilism
by: Xu, Jian, et al.
Published: (2022)