Search Results - "Computer security"

Refine Results
  1. 1
  2. 2
  3. 3
  4. 4

    Aligning cloud computing security with business strategy by Mohamed Hassan El-Hoby, Hany, A. F. Salah, Mohammed, Suhaimi, Mohd Adam

    Published 2014
    “…A business value will be achieved through the proposed model by aligning the cloud computing security with the business strategy and increase the security procedures to verify the authenticated users through the virtual system.…”
    Get full text
    Get full text
  5. 5
  6. 6
  7. 7
  8. 8
  9. 9

    Computer security control practices: views of future employees in Malaysia by Zainol, Zaini, Puat Nelson, Sherliza

    Published 2015
    “…However, it is of our concern to find that, there were students who put little attention on their computers’ security. And hence, posed potential threats to their future employers. …”
    Get full text
    Get full text
  10. 10

    Securing information system & computer security self-efficacy effect by Al-Shawabkeh, Mahmoud

    Published 2013
    “…CONTENT PART I: Securing Information System PART II: Computer Security Self Efficacy Information Systems Theories -TAM , Technology Adoption Model, TTF Social Cognitive Theory Computer security self efficacy -Computer self-efficacy -Internet self-efficacy -Confidentiality -Integrity -Availability -Perceived Risk -Perceived Trust -Online Anxiety …”
    Get full text
    Get full text
    Get full text
  11. 11
  12. 12

    Computer security and ethics awareness among IIUM students: an empirical study by Aliyu, Mansur, Abdallah, Nahel A. O., Lasisi, Nojeem A., Diyar, Dahir, Zeki, Ahmed M.

    Published 2010
    “…This is especially the case among university students who are generally regarded as major violators of computer ethics and computer security. This paper follows previous work on computer security and ethics. …”
    Get full text
    Get full text
  13. 13
  14. 14
  15. 15

    Computer security factors effects towards online usage of internet banking system by Al-Shawabkeh, Mahmoud M. M., Mohd Saudi, Madihah, Moha Alwi, Najwa Hayaati

    Published 2014
    “…Outcomes confirm that confidentiality and availability effects computer security self-efficacy while in turn computer security self-efficacy impacts on usage. …”
    Get full text
    Get full text
  16. 16

    Computer security factors effects towards online usage of internet banking system by Al-Shawabkeh, Mahmoud, Mohd Saudi, Madihah, Moha Alwi, Najwa Hayaati

    Published 2015
    “…Outcomes confirm that confidentiality and availability effects computer security self-efficacy while in turn computer security self-efficacy impacts on usage. …”
    Get full text
    Get full text
    Get full text
  17. 17

    Computer security self-efficacy effect: an extension of Technology-to-Performance Chain Model by Al-Shawabkeh, Mahmoud, Mohd Saudi, Madihah, Mohd Alwi, Najwa Hayaati

    Published 2012
    “…The study will try to answer the question “to what extent has the computer security self-efficacy affected user’s perception of secure online banking system effectiveness“. …”
    Get full text
    Get full text
    Get full text
  18. 18

    Improve cloud computing security using RSA encryption with Fermat's little theorem by Mohamed Shereek, Balkees, Muda, Zaiton, Yasin, Sharifah

    Published 2014
    “…Hence we provide a new method for Cloud Computing Security by applying RSA algorithm and Fermat's theorem together. …”
    Get full text
    Get full text
  19. 19

    Computer security self-efficacy factors influencing e-banking utilization and user satisfaction by Al-Shawabkeh, Mahmoud, Mohd Saudi, Madihah, Moha Alwi, Najwa Hayaati

    Published 2012
    “…This study determined the computer security factors that affecting the E-Banking utilization and user satisfaction. …”
    Get full text
    Get full text
  20. 20

    Information Security Management Systems (ISMS) and Computer Security Self-Efficacy (CSSE) model comparison by Al-Shawabkeh, Mahmoud M. M., Mohd Saudi, Madihah, Mohd Alwi, Najwa Hayati, Azman, Norhidayah

    Published 2016
    “…Therefore to overcome the stated issues, this paper presents an analysis of two commonly used models: the Information Security Management System ISO/IEC 27001:2015 and Computer Security Self-Efficacy (CSSE). Findings confirm the suitability of both models for e-Banking computer security policies.…”
    Get full text
    Get full text
    Get full text