Comprehensive analysis on the influences of computer ethics on information security
Many ethical issues related to computer remains to be a concern regardless the mode of activity. Computer security, therefore, must also be concerned with the actions of trusted computer users. Since businesses have increased their usage of computers, an organization must play a major role in develo...
| Main Author: | Abdul Rahim, Fiza |
|---|---|
| Format: | Thesis |
| Language: | English |
| Published: |
2009
|
| Subjects: | |
| Online Access: | http://eprints.utm.my/5324/ http://eprints.utm.my/5324/1/FizaAbdulRahimMFSKSM2009.pdf |
Similar Items
Investigating the student’s awareness on computer security and ethics
by: Aliyu, Mansur, et al.
Published: (2011)
by: Aliyu, Mansur, et al.
Published: (2011)
An ethical assessment of computer ethics using scenario approach
by: Masrom, Maslin, et al.
Published: (2010)
by: Masrom, Maslin, et al.
Published: (2010)
A review on cloud computing security
by: Teo, Marry, et al.
Published: (2018)
by: Teo, Marry, et al.
Published: (2018)
Data Security Issues In Cloud Computing: Review
by: Ahmed, Hussam Alddin Shihab, et al.
Published: (2016)
by: Ahmed, Hussam Alddin Shihab, et al.
Published: (2016)
Academic Planning for Faculty Computer Science & Information Technology / Adzni Abdul Rahim
by: Adzni , Abdul Rahim
Published: (2003)
by: Adzni , Abdul Rahim
Published: (2003)
A review of challenges and security risks of cloud computing
by: Hussam Alddin S., Ahmed, et al.
Published: (2017)
by: Hussam Alddin S., Ahmed, et al.
Published: (2017)
The practice of information security: An analysis of government employees in Tanzania using the Health Belief Model (HBM)
by: Koloseni, Daniel Ntabagi
Published: (2017)
by: Koloseni, Daniel Ntabagi
Published: (2017)
Model of security level classification for data in hybrid cloud computing
by: Shakir, Mohanaad, et al.
Published: (2016)
by: Shakir, Mohanaad, et al.
Published: (2016)
Analysis of Information Security Resource Requirements in Local Governments
by: Toto, Suharto, et al.
Published: (2022)
by: Toto, Suharto, et al.
Published: (2022)
Development of computer ethical framework for information security (educational context)
by: Namayander, Meysam
Published: (2009)
by: Namayander, Meysam
Published: (2009)
Methods of intrusion detection in information security incident detection: a comparative study
by: Tan, Fui Bee, et al.
Published: (2018)
by: Tan, Fui Bee, et al.
Published: (2018)
An investigation of health information system security policies compliance behaviour / Norshima Humaidi
by: Norshima, Humaidi
Published: (2016)
by: Norshima, Humaidi
Published: (2016)
Stegano-image as a digital signature to improve security authentication system in mobile computing
by: Mantoro, Teddy, et al.
Published: (2016)
by: Mantoro, Teddy, et al.
Published: (2016)
An investigation on cloud computing adoption within information technology companies
by: Mohammadi, A., et al.
Published: (2021)
by: Mohammadi, A., et al.
Published: (2021)
Information security behaviour : a descriptive analysis on a Malaysian public university
by: Ramlah Hussein, *, et al.
Published: (2011)
by: Ramlah Hussein, *, et al.
Published: (2011)
Information Security Analysis and Solution using LSB Steganography and
AES Cryptographic Algorithm
by: Nurul Adha, Oktarini Saputri, et al.
Published: (2023)
by: Nurul Adha, Oktarini Saputri, et al.
Published: (2023)
Study of Security Layers Under Attack on Different Layers of Cloud Computing
by: Fakhreldin, Mohammed Adam Ibrahim, et al.
Published: (2014)
by: Fakhreldin, Mohammed Adam Ibrahim, et al.
Published: (2014)
A comprehensive usability model for evaluating smartphone apps
by: Rahmat, Hazwani, et al.
Published: (2018)
by: Rahmat, Hazwani, et al.
Published: (2018)
Economic perspective analysis of protecting big data security and privacy
by: Tao, Hai, et al.
Published: (2019)
by: Tao, Hai, et al.
Published: (2019)
Securing e-learning environment: A study of security awareness and behavior of user
by: Wan Nurul Safawati, Wan Manan, et al.
Published: (2017)
by: Wan Nurul Safawati, Wan Manan, et al.
Published: (2017)
Cloud computing: Analysis of various services
by: Khan, Nawsher, et al.
Published: (2012)
by: Khan, Nawsher, et al.
Published: (2012)
The Formulation of Comprehensive Information Security Culture Dimensions for Information Security Policy Compliance Study
by: Nasir, Akhyari, et al.
Published: (2018)
by: Nasir, Akhyari, et al.
Published: (2018)
Editorial article: on the boundaries of trust and security in computing and communications systems
by: Pathan, Al-Sakib Khan
Published: (2014)
by: Pathan, Al-Sakib Khan
Published: (2014)
Factors Influencing the Continuous Use of Cloud Computing Services in Organization Level
by: Al-Sharafi, Mohammed A., et al.
Published: (2017)
by: Al-Sharafi, Mohammed A., et al.
Published: (2017)
Novel approach for secure cover file of hidden data in the unused area within EXE file using computation between cryptography and steganography
by: Naji, Ahmed Wathik, et al.
Published: (2009)
by: Naji, Ahmed Wathik, et al.
Published: (2009)
Smart home security
by: Mohammad Syafi Azim, Mohd Razam
Published: (2019)
by: Mohammad Syafi Azim, Mohd Razam
Published: (2019)
Model driven security frameworks for addressing security problems of Service Oriented Architecture
by: Saleem, M. Q., et al.
Published: (2010)
by: Saleem, M. Q., et al.
Published: (2010)
A Rule Extraction Algorithm That Scales Between Fidelity and Comprehensibility
by: Muthu Anbananthen, Kalaiarasi Sonai, et al.
Published: (2012)
by: Muthu Anbananthen, Kalaiarasi Sonai, et al.
Published: (2012)
Comprehensive review of the development of the harmony search algorithm and its applications
by: Al-Omoush, A.A., et al.
Published: (2019)
by: Al-Omoush, A.A., et al.
Published: (2019)
Trust Evaluation Model in IoT Environment: A Comprehensive Survey
by: ABDULKARIM ALHANDI, SOMYA, et al.
Published: (2023)
by: ABDULKARIM ALHANDI, SOMYA, et al.
Published: (2023)
A secure audio steganography approach
by: Zamani, Mazdak, et al.
Published: (2009)
by: Zamani, Mazdak, et al.
Published: (2009)
Inculcating secure coding for beginners
by: A. Aziz, Normaziah, et al.
Published: (2017)
by: A. Aziz, Normaziah, et al.
Published: (2017)
Enhancement of multicast network security
by: Ali, Sellami, et al.
Published: (2013)
by: Ali, Sellami, et al.
Published: (2013)
Using computer analysis of student writing to improve lesson planning
by: Fooks, Ian, et al.
Published: (2018)
by: Fooks, Ian, et al.
Published: (2018)
Computer-aided system for extending the performance of diabetes analysis and prediction
by: Murad, Saydul Akbar, et al.
Published: (2021)
by: Murad, Saydul Akbar, et al.
Published: (2021)
Next generation security operation center framework
by: Mohamad Fadli, Zolkipli, et al.
Published: (2018)
by: Mohamad Fadli, Zolkipli, et al.
Published: (2018)
Information Security Policy Compliance Behavior Based on Comprehensive Dimensions of Information Security Culture: A Conceptual Framework
by: Nasir, Akhyari, et al.
Published: (2017)
by: Nasir, Akhyari, et al.
Published: (2017)
Postprocessing algorithm for security features extraction
by: Rozita, Mohd Yusof, et al.
Published: (2012)
by: Rozita, Mohd Yusof, et al.
Published: (2012)
Multibiometric systems and template security survey
by: Khalaf, Emad Taha, et al.
Published: (2015)
by: Khalaf, Emad Taha, et al.
Published: (2015)
IPTV network security: threats and countermeasures
by: M. S. A., Noman Ranak, et al.
Published: (2018)
by: M. S. A., Noman Ranak, et al.
Published: (2018)
Similar Items
-
Investigating the student’s awareness on computer security and ethics
by: Aliyu, Mansur, et al.
Published: (2011) -
An ethical assessment of computer ethics using scenario approach
by: Masrom, Maslin, et al.
Published: (2010) -
A review on cloud computing security
by: Teo, Marry, et al.
Published: (2018) -
Data Security Issues In Cloud Computing: Review
by: Ahmed, Hussam Alddin Shihab, et al.
Published: (2016) -
Academic Planning for Faculty Computer Science & Information Technology / Adzni Abdul Rahim
by: Adzni , Abdul Rahim
Published: (2003)