The application of Malaysian cyber security laws in regulating cyber insider threats in Malaysian organisations

The data security of an organisation is not only susceptible to malicious outsiders and exploitative attackers but also to insider threats. Preventing insider threats is particularly challenging, especially when they originate from seemingly trusted and authorised insiders. Currently, in Malaysia th...

Full description

Bibliographic Details
Main Author: Afiqah, Abdul Razak
Format: Thesis
Language:English
English
English
Published: 2025
Subjects:
Online Access:https://etd.uum.edu.my/11965/1/permission%20to%20deposit-allow%20embargo%2024%20months-s828932.pdf
https://etd.uum.edu.my/11965/2/s828932_01.pdf
https://etd.uum.edu.my/11965/3/s828932_02.pdf
https://etd.uum.edu.my/11965/
Abstract Abstract here