Skip to content
MyTheses
  • Feedback
  • Book Bag: 0 items (Full)
  • HOME
  • MYTHESES
  • BLOG
  • AI ASSISTANT
  • INSTITUTION
  • GUIDE & TUTORIAL
  • CONTACT
    • English
    • Français
    • 日本語
    • 中文(简体)
    • 中文(繁體)
    • اللغة العربية
    • हिंदी
Advanced
  • Identify Human Error In Using...
  • Cite this
  • Text this
  • Print
  • Export Record
    • Export to RefWorks
    • Export to EndNoteWeb
    • Export to EndNote
  • Add to Book Bag Remove from Book Bag
  • Permanent link

QR Code

Identify Human Error In Using Mobile Device That Lead To Security Threat

Human errors are the most critical issues that contributes to the information security threat. Mobile device are the main devices that can be manipulates by the attacker towards their victims. The attackers nowadays more interested in attacking the mobile devices because of the current trend which...

Full description

Bibliographic Details
Main Author: Abdul Mubin, Norzul Masri
Format: Thesis
Language:English
English
Published: 2017
Subjects:
Q Science (General)
QA76 Computer software
Online Access:http://eprints.utem.edu.my/id/eprint/20742/1/Identify%20Human%20Error%20In%20Using%20Mobile%20Device%20That%20Lead%20To%20Security%20Threat%20-%20Norzul%20Masri%20Abdul%20Mubin%20-%2024%20Pages.pdf
http://eprints.utem.edu.my/id/eprint/20742/2/Identify%20Human%20Error%20In%20Using%20Mobile%20Device%20That%20Lead%20To%20Security%20Threat.pdf
  • Holdings
  • Description
  • Similar Items
  • Staff View

Internet

http://eprints.utem.edu.my/id/eprint/20742/1/Identify%20Human%20Error%20In%20Using%20Mobile%20Device%20That%20Lead%20To%20Security%20Threat%20-%20Norzul%20Masri%20Abdul%20Mubin%20-%2024%20Pages.pdf
http://eprints.utem.edu.my/id/eprint/20742/2/Identify%20Human%20Error%20In%20Using%20Mobile%20Device%20That%20Lead%20To%20Security%20Threat.pdf

Similar Items

  • Classroom Management System Via Mobile Devices
    by: Norazlin, Kamaludin
    Published: (2009)
  • A press touch code based secure graphical password scheme for smart devices
    by: Al Noman Ranak, Md Sayfullah
    Published: (2018)
  • Real-Time Data Capturing for Reservoir Spillway Gate Operation Via Mobile Device
    by: Faisal, Zulhumadi
    Published: (2006)
  • A secure method to detect wormhole attack in mobile adhoc network
    by: Ardestani, Parichehr Manouchehri
    Published: (2013)
  • Mobile Computing at Sultanah Bahiyah Library : Mapping Physical Book Rack Location Using Handheld Devices
    by: Ahmad Nurzid, Rosli
    Published: (2004)

Search Options

  • Search History
  • Advanced Search

Find More

  • Browse the Catalog
  • Browse Alphabetically
  • Explore Channels
  • Course Reserves
  • New Items

Need Help?

  • Search Tips
  • Ask a Librarian
  • FAQs