The practice of information security: An analysis of government employees in Tanzania using the Health Belief Model (HBM)
| Main Author: | Koloseni, Daniel Ntabagi |
|---|---|
| Format: | Final Year Project / Dissertation / Thesis |
| Published: |
2017
|
| Subjects: | |
| Online Access: | http://eprints.utar.edu.my/3199/ http://eprints.utar.edu.my/3199/1/Daniel_Ntabagi_Koloseni.pdf |
Similar Items
Predicting self-care practices and glycaemic control using health belief model (HBM) in patients with insulin-treated diabetes in Malaysia
by: Aris, Aishairma
Published: (2016)
by: Aris, Aishairma
Published: (2016)
Breast self examination and mammogram HBM questionnaire
by: Moey, Soo Foon, et al.
Published: (2019)
by: Moey, Soo Foon, et al.
Published: (2019)
An investigation of health information system security policies compliance behaviour / Norshima Humaidi
by: Norshima, Humaidi
Published: (2016)
by: Norshima, Humaidi
Published: (2016)
The influence of government support and awareness on M-Government adoption in rural Tanzania: The mediating role of perceived characteristics of innovation
by: Mandari, Herman Eliawaha
Published: (2017)
by: Mandari, Herman Eliawaha
Published: (2017)
Analysis of Information Security Resource Requirements in Local Governments
by: Toto, Suharto, et al.
Published: (2022)
by: Toto, Suharto, et al.
Published: (2022)
Comprehensive analysis on the influences of computer ethics on information security
by: Abdul Rahim, Fiza
Published: (2009)
by: Abdul Rahim, Fiza
Published: (2009)
An agent based green decision making model for sustainable information technology governance
by: Anthony Jnr, Bokolo, et al.
Published: (2017)
by: Anthony Jnr, Bokolo, et al.
Published: (2017)
A dimension-based information security culture model and its relationship with employees’ security behavior: A case study in Malaysian higher educational institutions
by: Akhyari, Nasir, et al.
Published: (2019)
by: Akhyari, Nasir, et al.
Published: (2019)
Assessment of employee’s knowledge and compliance on information security governance
by: Chow, Win Niy
Published: (2014)
by: Chow, Win Niy
Published: (2014)
Model driven security frameworks for addressing security problems of Service Oriented Architecture
by: Saleem, M. Q., et al.
Published: (2010)
by: Saleem, M. Q., et al.
Published: (2010)
Methods of intrusion detection in information security incident detection: a comparative study
by: Tan, Fui Bee, et al.
Published: (2018)
by: Tan, Fui Bee, et al.
Published: (2018)
A conceptual framework integration of UTAUT and HBM on evaluating the adoption of electronic payment system in Malaysia
by: Jaafar, Ishaq, et al.
Published: (2020)
by: Jaafar, Ishaq, et al.
Published: (2020)
Information security culture model for Malaysian organizations: A review
by: Akhyari, Nasir, et al.
Published: (2020)
by: Akhyari, Nasir, et al.
Published: (2020)
The influence of information security culture towards employee’s intention to comply with information security policy: The mediation effect of attitude, normative belief and self-efficacy
by: Mohd Rashid, Ab Hamid, et al.
Published: (2020)
by: Mohd Rashid, Ab Hamid, et al.
Published: (2020)
Green information technology for sustainability elicitation in government-based organisations: an exploratory case study
by: Bokolo, Anthony Jnr, et al.
Published: (2018)
by: Bokolo, Anthony Jnr, et al.
Published: (2018)
Model of security level classification for data in hybrid cloud computing
by: Shakir, Mohanaad, et al.
Published: (2016)
by: Shakir, Mohanaad, et al.
Published: (2016)
Hospital information system modeling
by: Kaghazchi, Hamid Reza
Published: (2008)
by: Kaghazchi, Hamid Reza
Published: (2008)
Analysing the effects of government expenditure and efficiency on economic growth in Tanzania
by: Kimaro, Edmund Lawrence
Published: (2018)
by: Kimaro, Edmund Lawrence
Published: (2018)
Investigating the barriers of health information system implementation in Malaysian Public Hospitals
by: Norsyaliza, Abd Razak, et al.
Published: (2020)
by: Norsyaliza, Abd Razak, et al.
Published: (2020)
A Defensive Evidence Model: An Approach of Security Model for Storing Digital Evidence in Network Forensics
by: Mohd Izham, Ibrahim, et al.
Published: (2012)
by: Mohd Izham, Ibrahim, et al.
Published: (2012)
Multi-objectives model to process security risk assessment based on AHP-PSO
by: Awad, Gamal, et al.
Published: (2011)
by: Awad, Gamal, et al.
Published: (2011)
Smart home security
by: Mohammad Syafi Azim, Mohd Razam
Published: (2019)
by: Mohammad Syafi Azim, Mohd Razam
Published: (2019)
Green information technology adoption towards a sustainability policy agenda for government-based institutions: an administrative perspective
by: Anthony Jnr, Bokolo, et al.
Published: (2018)
by: Anthony Jnr, Bokolo, et al.
Published: (2018)
Information Security Analysis and Solution using LSB Steganography and
AES Cryptographic Algorithm
by: Nurul Adha, Oktarini Saputri, et al.
Published: (2023)
by: Nurul Adha, Oktarini Saputri, et al.
Published: (2023)
Securing e-learning environment: A study of security awareness and behavior of user
by: Wan Nurul Safawati, Wan Manan, et al.
Published: (2017)
by: Wan Nurul Safawati, Wan Manan, et al.
Published: (2017)
The health belief model
by: Abraham, Samuel, et al.
Published: (2014)
by: Abraham, Samuel, et al.
Published: (2014)
Quality Management in Tanzania
by: Mohamed, Samira Said Salim
Published: (2006)
by: Mohamed, Samira Said Salim
Published: (2006)
Inculcating secure coding for beginners
by: A. Aziz, Normaziah, et al.
Published: (2017)
by: A. Aziz, Normaziah, et al.
Published: (2017)
Enhancement of multicast network security
by: Ali, Sellami, et al.
Published: (2013)
by: Ali, Sellami, et al.
Published: (2013)
Information security policy compliance model for government agency
by: Ramli, Muhamad Amirnazmi
Published: (2018)
by: Ramli, Muhamad Amirnazmi
Published: (2018)
Generic nodal abstraction for enhancing human-agent collaborative model with an integrated security and trust aspects
by: Mohammed, Khudair Abbas
Published: (2019)
by: Mohammed, Khudair Abbas
Published: (2019)
A secure audio steganography approach
by: Zamani, Mazdak, et al.
Published: (2009)
by: Zamani, Mazdak, et al.
Published: (2009)
Postprocessing algorithm for security features extraction
by: Rozita, Mohd Yusof, et al.
Published: (2012)
by: Rozita, Mohd Yusof, et al.
Published: (2012)
Multibiometric systems and template security survey
by: Khalaf, Emad Taha, et al.
Published: (2015)
by: Khalaf, Emad Taha, et al.
Published: (2015)
IPTV network security: threats and countermeasures
by: M. S. A., Noman Ranak, et al.
Published: (2018)
by: M. S. A., Noman Ranak, et al.
Published: (2018)
A review on cloud computing security
by: Teo, Marry, et al.
Published: (2018)
by: Teo, Marry, et al.
Published: (2018)
An optimized electronic government services adoption model using structural equation and maximum attribute relative models
by: Witarsyah, Deden
Published: (2018)
by: Witarsyah, Deden
Published: (2018)
Estimating the Efficiency of Information Technology for Domain-Specific Mathematical Modelling
by: Mezhuyev, Vitaliy, et al.
Published: (2015)
by: Mezhuyev, Vitaliy, et al.
Published: (2015)
Conceptualizing a Model for the Effect of Information Culture on Electronic Commerce Adoption
by: Herzallah, Fadi A. T., et al.
Published: (2018)
by: Herzallah, Fadi A. T., et al.
Published: (2018)
Conceptualizing a model for the effect of information culture on electronic commerce adoption
by: Herzallah, Fadi A. T., et al.
Published: (2019)
by: Herzallah, Fadi A. T., et al.
Published: (2019)
Similar Items
-
Predicting self-care practices and glycaemic control using health belief model (HBM) in patients with insulin-treated diabetes in Malaysia
by: Aris, Aishairma
Published: (2016) -
Breast self examination and mammogram HBM questionnaire
by: Moey, Soo Foon, et al.
Published: (2019) -
An investigation of health information system security policies compliance behaviour / Norshima Humaidi
by: Norshima, Humaidi
Published: (2016) -
The influence of government support and awareness on M-Government adoption in rural Tanzania: The mediating role of perceived characteristics of innovation
by: Mandari, Herman Eliawaha
Published: (2017) -
Analysis of Information Security Resource Requirements in Local Governments
by: Toto, Suharto, et al.
Published: (2022)