Users' perception of the information security policy at Universiti Teknologi Malaysia
Securing information is essential for safeguarding the organization business operations as information is a business asset to any organization including education sector. One of the most imperative information security (InfoSec) controls identified is InfoSec policy. The purpose of this study is to...
| Main Author: | Sharif, Haniza |
|---|---|
| Format: | Thesis |
| Language: | English |
| Published: |
2009
|
| Subjects: | |
| Online Access: | http://eprints.utm.my/5291/ http://eprints.utm.my/5291/1/HanizaSharifMFSKSM2009.pdf |
Similar Items
A dimension-based information security culture model for information security policy compliance behavior in Malaysian public universities
by: Akhyari, Nasir
Published: (2019)
by: Akhyari, Nasir
Published: (2019)
The Formulation of Comprehensive Information Security Culture Dimensions for Information Security Policy Compliance Study
by: Nasir, Akhyari, et al.
Published: (2018)
by: Nasir, Akhyari, et al.
Published: (2018)
Information Security Policy Compliance Behavior Based on Comprehensive Dimensions of Information Security Culture: A Conceptual Framework
by: Nasir, Akhyari, et al.
Published: (2017)
by: Nasir, Akhyari, et al.
Published: (2017)
A LANGUAGE TO REPRESENT SECURITY POLICY FOR MULTI-AGENCY HEALTH INFORMATION SYSTEM
by: Intan najua, kamal nasir, et al.
Published: (2008)
by: Intan najua, kamal nasir, et al.
Published: (2008)
User access control and security model
by: Crysdian, Cahyo, et al.
Published: (2000)
by: Crysdian, Cahyo, et al.
Published: (2000)
The influence of information security culture towards employee’s intention to comply with information security policy: The mediation effect of attitude, normative belief and self-efficacy
by: Mohd Rashid, Ab Hamid, et al.
Published: (2020)
by: Mohd Rashid, Ab Hamid, et al.
Published: (2020)
Exploring Studies of Information Security Culture in Malaysia
by: Nasir, Akhyari, et al.
Published: (2016)
by: Nasir, Akhyari, et al.
Published: (2016)
The perception of Muslim users on reliability of Islamic
websites
by: Mohammad Nassr, Rasheed, et al.
Published: (2014)
by: Mohammad Nassr, Rasheed, et al.
Published: (2014)
Evaluating the role of protection motivation theory in information security policy compliance: Insights from the banking sector using PLS-SEM approach
by: Alrawhani, Ebrahim Mohammed, et al.
Published: (2025)
by: Alrawhani, Ebrahim Mohammed, et al.
Published: (2025)
Information security curriculum framework at undergraduate level
by: Sanusi Arifin, Ab. Arif
Published: (2009)
by: Sanusi Arifin, Ab. Arif
Published: (2009)
An enhanced next generation security operation center framework for information system security management
by: Yau, Ti Dun
Published: (2023)
by: Yau, Ti Dun
Published: (2023)
Information security behaviour : a descriptive analysis on a Malaysian public university
by: Ramlah Hussein, *, et al.
Published: (2011)
by: Ramlah Hussein, *, et al.
Published: (2011)
Information security culture guidelines to improve employee’s security behavior: A review of empirical studies
by: Akhyari, N., et al.
Published: (2018)
by: Akhyari, N., et al.
Published: (2018)
Risk identification for an information security management system implementation
by: Ramli, Noraza, et al.
Published: (2012)
by: Ramli, Noraza, et al.
Published: (2012)
The effect of usability and information quality on Malaysian user’s satisfaction of student information systems in higher education institutions
by: Atta, Mohammed Thamir
Published: (2019)
by: Atta, Mohammed Thamir
Published: (2019)
An analysis on the dimensions of information security culture concept: A review
by: Akhyari, Nasir, et al.
Published: (2019)
by: Akhyari, Nasir, et al.
Published: (2019)
Natinonal Education Policy Information System for EPRD Education Planning and Policy Research Division Ministry of Education, Malaysia / Tan Chim Tat
by: Tan, Chim Tat
Published: (2002)
by: Tan, Chim Tat
Published: (2002)
Culture and user-interface design for older users in Malaysia
by: Hisham, Syariffanor, et al.
Published: (2007)
by: Hisham, Syariffanor, et al.
Published: (2007)
WAP Personal information center: Kajian kes di Fakulti Sains Komputer Teknologi Maklumat, Universiti Malaya / Zurita Basir
by: Zurita, Basir
Published: (2005)
by: Zurita, Basir
Published: (2005)
Analysis of Information Security Resource Requirements in Local Governments
by: Toto, Suharto, et al.
Published: (2022)
by: Toto, Suharto, et al.
Published: (2022)
Information security culture for guiding employee’s security behaviour: A pilot study
by: Akhyari, Nasir, et al.
Published: (2020)
by: Akhyari, Nasir, et al.
Published: (2020)
The mediation effect of intention to use information system on the association between usability and user's satisfaction in UMP
by: Atta, Mohammed Thamir, et al.
Published: (2018)
by: Atta, Mohammed Thamir, et al.
Published: (2018)
Online banking information systems acceptance: an empirical examination of system characteristics and web security
by: Chandio, Fida Hussain, et al.
Published: (2017)
by: Chandio, Fida Hussain, et al.
Published: (2017)
Conceptualizing and Validating Information Security Culture as a Multidimensional Second-Order Formative Construct
by: Nasir, Akhyari, et al.
Published: (2018)
by: Nasir, Akhyari, et al.
Published: (2018)
The Effect of Security and Privacy Perceptions on Customers’ Trust to Accept Internet Banking Services: An Extension of TAM
by: Al-Sharafi, Mohammed A., et al.
Published: (2016)
by: Al-Sharafi, Mohammed A., et al.
Published: (2016)
3D smart user interactive system with real-time responding tele-robotic proprioceptive information
by: Tee, Tiam Hee *, et al.
Published: (2013)
by: Tee, Tiam Hee *, et al.
Published: (2013)
A practical and user friendly interface of fuzzy logic rule based system for maintenance policy decision making
by: Hasan Basari, Abd. Samad, et al.
Published: (2008)
by: Hasan Basari, Abd. Samad, et al.
Published: (2008)
Integrating Strategic Information Security with Strategic Information Systems Planning (SISP)
by: Selamat, Md. Hafiz, et al.
Published: (2006)
by: Selamat, Md. Hafiz, et al.
Published: (2006)
Energy-efficient data security schemes for mobile users in cloud environment / Abdul Nasir Khan
by: Khan, Abdul Nasir
Published: (2014)
by: Khan, Abdul Nasir
Published: (2014)
Conceptualizing a framework to enhance information security culture and compliance behavior in organizations through protection motivation theory
by: Alrawhani, Ebrahim Mohammed, et al.
Published: (2024)
by: Alrawhani, Ebrahim Mohammed, et al.
Published: (2024)
Guideline for privacy and security in Cloud First Security Environment
by: Abdul Aziz, Normaziah, et al.
Published: (2017)
by: Abdul Aziz, Normaziah, et al.
Published: (2017)
Graphical user interfaces
by: Shah, Asadullah, et al.
Published: (2011)
by: Shah, Asadullah, et al.
Published: (2011)
CST233 – Information Security & Assurance June 2018
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2018)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2018)
CST233- Information Security and Assurance June 2019
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2019)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2019)
A secure approach for health information exchange using mobile personal health records / Mohamed Shabbir Hamza Abdulnabi
by: Mohamed Shabbir Hamza , Abdulnabi
Published: (2018)
by: Mohamed Shabbir Hamza , Abdulnabi
Published: (2018)
Investigating customer relationship management and service quality in higher education in Malaysia case study : School of Graduate Studies, Universiti Teknologi Malaysia
by: Virgiyanti, Wiwied
Published: (2007)
by: Virgiyanti, Wiwied
Published: (2007)
The development of a for Pejabat Harta Bina, Universiti Teknologi Malaysia : a study for the guidelines
by: Mohammad, Izran Sarrazin
Published: (2005)
by: Mohammad, Izran Sarrazin
Published: (2005)
Modeling user's intention to use e-government to citizen services in Malaysia
by: Namroush, Salahedin Ali
Published: (2011)
by: Namroush, Salahedin Ali
Published: (2011)
Security Mechanism for MANETs
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2009)
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2009)
Security Mechanism for MANETs
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2008)
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2008)
Similar Items
-
A dimension-based information security culture model for information security policy compliance behavior in Malaysian public universities
by: Akhyari, Nasir
Published: (2019) -
The Formulation of Comprehensive Information Security Culture Dimensions for Information Security Policy Compliance Study
by: Nasir, Akhyari, et al.
Published: (2018) -
Information Security Policy Compliance Behavior Based on Comprehensive Dimensions of Information Security Culture: A Conceptual Framework
by: Nasir, Akhyari, et al.
Published: (2017) -
A LANGUAGE TO REPRESENT SECURITY POLICY FOR MULTI-AGENCY HEALTH INFORMATION SYSTEM
by: Intan najua, kamal nasir, et al.
Published: (2008) -
User access control and security model
by: Crysdian, Cahyo, et al.
Published: (2000)