Information security behaviour assessment in software-as-a-service cloud environment
This research aims at assessing the information security behaviour in Software as a Service (SaaS) cloud computing environment. Organisations are still struggling with information security breaches despite various technical protections to secure SaaS applications. This is due to the fact that liuman...
| Main Author: | Abdul Hamid, Hanifah |
|---|---|
| Format: | Thesis |
| Language: | English English |
| Published: |
UTeM
2018
|
| Subjects: | |
| Online Access: | http://eprints.utem.edu.my/id/eprint/23787/1/Information%20Security%20Behaviour%20Assessment%20In%20Software-As-A-Service%20Cloud%20Environment%20-%20Hanifah%20Abdul%20Hamid%20-%2024%20Pages.pdf http://eprints.utem.edu.my/id/eprint/23787/2/Information%20security%20behaviour%20assessment%20in%20software-as-a-service%20cloud%20environment.pdf |
Similar Items
Security Risk Issues And Controls For Cloud Computing In Iraqi Government Organisations
by: Al-Zaidi., Qusay Kanaan Kadhim
Published: (2019)
by: Al-Zaidi., Qusay Kanaan Kadhim
Published: (2019)
Improving data integrity as a service model (DIaaS) in cloud computing for privacy preserving support
by: Abdullah Al-Jaberi, Mohammad Faez
Published: (2014)
by: Abdullah Al-Jaberi, Mohammad Faez
Published: (2014)
Implementation of management information base software for simple network management protocol
by: Tamtam, Abdurrzzag Giuma
Published: (1997)
by: Tamtam, Abdurrzzag Giuma
Published: (1997)
Characteristics of positive cloud to ground flashes in Malaysia and correlation with cloud top height
by: Thuraisamy, Yugeswari
Published: (2018)
by: Thuraisamy, Yugeswari
Published: (2018)
Power system security assessment in electrical operation system
by: Maikale, Babagana Digol
Published: (2021)
by: Maikale, Babagana Digol
Published: (2021)
Secure deep learning inference with intel software guard extension on intel ice lake-SP xeon processor
by: Phuah, Chai Ling
Published: (2022)
by: Phuah, Chai Ling
Published: (2022)
FPGA based software radio modem design
by: Abdul Hamid, Hazly Amir
Published: (2003)
by: Abdul Hamid, Hazly Amir
Published: (2003)
Equipment tracking and security system for hospital environment using WLAN indoor location tracking system
by: Fhelelboom, Zuher H. M.
Published: (2007)
by: Fhelelboom, Zuher H. M.
Published: (2007)
Static security assessment on power system using artificial neural network
by: Rahmat, Mohd. Fadli
Published: (2005)
by: Rahmat, Mohd. Fadli
Published: (2005)
Hardware/software system-on-chip co-verification platform based on logic-based environment for application programming interfacing
by: Teo, Hong Yap
Published: (2015)
by: Teo, Hong Yap
Published: (2015)
Static security assessment in deregulated power system using
artificial inteligence techniques
by: Ali Ilsaeh, Ibrahem Salem
Published: (2009)
by: Ali Ilsaeh, Ibrahem Salem
Published: (2009)
Simulation of web performance with different IP environment using plone software
by: Ahmad Fairuz, Ahmad
Published: (2014)
by: Ahmad Fairuz, Ahmad
Published: (2014)
Ray tracing simulation for microcellular environment
by: Abdul Hamid, Zarina
Published: (1995)
by: Abdul Hamid, Zarina
Published: (1995)
The Awareness Of Information Security Breach Among User IT In KPTMBP
by: Othman, Intan Safina
Published: (2016)
by: Othman, Intan Safina
Published: (2016)
Preliminary assessment using homer software for harnessing renewable energy from sewage treatment plant
by: Aziz Bogal, Nor Azam
Published: (2014)
by: Aziz Bogal, Nor Azam
Published: (2014)
Power system static security assessment under contingencies and load increases using artificial neural
by: Al-Masri, Ahmed Naufal A.
Published: (2008)
by: Al-Masri, Ahmed Naufal A.
Published: (2008)
Eliciting security requirements for internet of things software application development using semi-formalized model approach
by: Ibrahim, Asma Asdayana
Published: (2022)
by: Ibrahim, Asma Asdayana
Published: (2022)
System identification software package
by: Ismail, Iza Wanee
Published: (2007)
by: Ismail, Iza Wanee
Published: (2007)
Cloud Computing For Iraqi Ministry Of Finance
by: Ahmed Dawod, Salman
Published: (2014)
by: Ahmed Dawod, Salman
Published: (2014)
Investigation on the occurrence of tles associated positive cloud to ground (+CG) lightning in UMP Pekan
by: Chan, Hwee Geem
Published: (2019)
by: Chan, Hwee Geem
Published: (2019)
The development of software platform for identification unit
by: Ismail, Siti Khadijah
Published: (2011)
by: Ismail, Siti Khadijah
Published: (2011)
ARM microprocessor software based emulator
by: Gathan, Sunil Shashikant
Published: (2013)
by: Gathan, Sunil Shashikant
Published: (2013)
CAD software for semiconductor device modeling
by: Othman, Yasmin
Published: (2004)
by: Othman, Yasmin
Published: (2004)
Locating nearby cloud to ground lightning from measurements of induced voltages on overhead conductor's ends
by: Adzis, Zuraimy
Published: (2012)
by: Adzis, Zuraimy
Published: (2012)
Characteristics of cloud-to-ground lightning based on electric field measurement and high-speed image observation
by: Ramlee, Nor Asrina
Published: (2022)
by: Ramlee, Nor Asrina
Published: (2022)
Development of simple education process control software
by: Azizan, Mahathir Fansuri
Published: (2008)
by: Azizan, Mahathir Fansuri
Published: (2008)
Cost of security in power system transmission
by: Mohd. Zaki, Nor Azlin
Published: (2009)
by: Mohd. Zaki, Nor Azlin
Published: (2009)
Allocation of security cost in a pure pool-based electricity market desgin on load contribution towards security problem
by: Jasmani, Noor Zarith Iffa
Published: (2009)
by: Jasmani, Noor Zarith Iffa
Published: (2009)
Determination of ATC and security for power system using A1 technique
by: Abdul Gani, Ahmad Zhafri
Published: (2011)
by: Abdul Gani, Ahmad Zhafri
Published: (2011)
Implementation of instruction decoding logic using hardware and software
by: Su, Chee Siong
Published: (2010)
by: Su, Chee Siong
Published: (2010)
Development of network monitoring software for local area networks
by: Baba Ali, Ibrahim
Published: (1999)
by: Baba Ali, Ibrahim
Published: (1999)
The design and development of an educational software on automatic speech recognition
by: Hong , Kai Sze
Published: (2004)
by: Hong , Kai Sze
Published: (2004)
Enhanced model to minimize future downtime : case study of Malaysia cloud providers towards near-zero downtime
by: Clement, Clarissa Terry
Published: (2015)
by: Clement, Clarissa Terry
Published: (2015)
Analysis and implementation of security algorithms for wireless communications
by: Hassan Ali, Abdinasir
Published: (2010)
by: Hassan Ali, Abdinasir
Published: (2010)
Design of a secured facsimile communication system
by: Zakaria, Zakir Hamdi
Published: (2002)
by: Zakaria, Zakir Hamdi
Published: (2002)
Hardware acceleration of secure hash algorithm 3
by: Ng, Lai Boon
Published: (2020)
by: Ng, Lai Boon
Published: (2020)
Implementation of fingerprint biometric template system in embedded software design
by: Zakaria, Nor Farizan
Published: (2006)
by: Zakaria, Nor Farizan
Published: (2006)
Enhanced bandwidth management model using software defined networking
by: Emilia Rosa Jimson
Published: (2019)
by: Emilia Rosa Jimson
Published: (2019)
Network management software using simple network management protocol
by: Minniappan, Pannirselvam S.
Published: (1996)
by: Minniappan, Pannirselvam S.
Published: (1996)
High resolution impulse analysing system - hardware and software implementation
by: Kassim, Ahmad Tarmimi
Published: (2015)
by: Kassim, Ahmad Tarmimi
Published: (2015)
Similar Items
-
Security Risk Issues And Controls For Cloud Computing In Iraqi Government Organisations
by: Al-Zaidi., Qusay Kanaan Kadhim
Published: (2019) -
Improving data integrity as a service model (DIaaS) in cloud computing for privacy preserving support
by: Abdullah Al-Jaberi, Mohammad Faez
Published: (2014) -
Implementation of management information base software for simple network management protocol
by: Tamtam, Abdurrzzag Giuma
Published: (1997) -
Characteristics of positive cloud to ground flashes in Malaysia and correlation with cloud top height
by: Thuraisamy, Yugeswari
Published: (2018) -
Power system security assessment in electrical operation system
by: Maikale, Babagana Digol
Published: (2021)