An investigation of health information system security policies compliance behaviour / Norshima Humaidi
Health Information System (HIS) has a higher degree of vulnerability towards threats of information security such as unauthorized access, use, disclosure, disruption, modification or destruction and duplication of passwords. Human error is a major security threat to information system’s security and...
| Auteur principal: | Norshima, Humaidi |
|---|---|
| Format: | Thèse |
| Publié: |
2016
|
| Sujets: |
Documents similaires
Evaluation of system requirements specfication compliance to corporate information security policy: case study of risk and incident reporting system (RIRS)
par: Siti Sabariah Yaakob
Publié: (2008)
par: Siti Sabariah Yaakob
Publié: (2008)
Assessing the employees awareness and usage of information security policy in federal inland revenue service, Nigeria
par: Gadzama, Wadzani Aduwamai
Publié: (2014)
par: Gadzama, Wadzani Aduwamai
Publié: (2014)
Information security policy compliance model for public sector
par: Abd. Rahim, Fuad Harriz
Publié: (2017)
par: Abd. Rahim, Fuad Harriz
Publié: (2017)
Information security policy compliance model for government agency
par: Ramli, Muhamad Amirnazmi
Publié: (2018)
par: Ramli, Muhamad Amirnazmi
Publié: (2018)
Value focused assessment of information system security
par: Asadi, Saman
Publié: (2014)
par: Asadi, Saman
Publié: (2014)
A dimension-based information security culture model for information security policy compliance behavior in Malaysian public universities
par: Akhyari, Nasir
Publié: (2019)
par: Akhyari, Nasir
Publié: (2019)
Testing and bug fixing of the information security management system
par: Vahdani, Omid
Publié: (2012)
par: Vahdani, Omid
Publié: (2012)
Information security policy compliance behaviour model for Malaysian federal public sector agencies
par: Kuppusamy, Puspadevi
Publié: (2022)
par: Kuppusamy, Puspadevi
Publié: (2022)
Readiness of local authorities in implementing information security management system (ISMS)
par: Mohd. Esa, Farah Saffarizan
Publié: (2014)
par: Mohd. Esa, Farah Saffarizan
Publié: (2014)
Comprehensive analysis on the influences of computer ethics on information security
par: Abdul Rahim, Fiza
Publié: (2009)
par: Abdul Rahim, Fiza
Publié: (2009)
Information security awareness model in social networking for teenagers
par: Mohamed Khazin, Mohamed Zul Hazmi
Publié: (2015)
par: Mohamed Khazin, Mohamed Zul Hazmi
Publié: (2015)
An information security awareness model for financial management infiormation system (FMIS) in Sudan
par: Mahmoud, Suliman Mohamed
Publié: (2014)
par: Mahmoud, Suliman Mohamed
Publié: (2014)
Information security compliance assessment using information security maturity model
par: Zadeh, HassanHossein
Publié: (2014)
par: Zadeh, HassanHossein
Publié: (2014)
Information security risk management awareness in e-government outsourced projects
par: Zalehah Muyet
Publié: (2011)
par: Zalehah Muyet
Publié: (2011)
Human resource information system for public health assistant : on-line induction course
par: Mohd. Ariffin, Mohd. Azman
Publié: (2001)
par: Mohd. Ariffin, Mohd. Azman
Publié: (2001)
Information security vulnerability in an Iranian context from human perspective(electrical industry)
par: Pouransafar, Malahat
Publié: (2013)
par: Pouransafar, Malahat
Publié: (2013)
Evaluation of Information Security Risks of E-Learning Systems: A Case Study on UUM Learning Zone
par: Tan, Wai Beng
Publié: (2011)
par: Tan, Wai Beng
Publié: (2011)
Feasibility study on incorporating IEC/ISO27001 information security management system (ISMS) standard in it services environment
par: Hau, Lian Hong
Publié: (2013)
par: Hau, Lian Hong
Publié: (2013)
Simulation on Network Security Design Architecture for Server Room in Rwanda Information Technology Agency
par: Eric, Karerangabo
Publié: (2009)
par: Eric, Karerangabo
Publié: (2009)
Evaluation of user's behaviours handling computer security incident in financial institution in Klang Valley
par: Nor Hidayah Mohd Jawawi
Publié: (2012)
par: Nor Hidayah Mohd Jawawi
Publié: (2012)
Spatial correlation analysis of obesity cases with Demographic and fast food outlets distribution / Siti Nur Zulaikha Che Humaidi
par: Che Humaidi, Siti Nur zulaikha
Publié: (2018)
par: Che Humaidi, Siti Nur zulaikha
Publié: (2018)
Exploring Health Information Using WAP Technology: Maternity and Children Guide
par: Abdul Jabar, Russul DH.
Publié: (2012)
par: Abdul Jabar, Russul DH.
Publié: (2012)
Testing information security management system tool v2.1.1.0 based on ISO 27001:2005
par: Shehu, Abdulrahman Mustafa
Publié: (2012)
par: Shehu, Abdulrahman Mustafa
Publié: (2012)
Expert System For Classifying Shariah Compliance E-Business Companies
par: Wardah Atirah, Maharudin
Publié: (2008)
par: Wardah Atirah, Maharudin
Publié: (2008)
Systematic secure design guideline to improve integrity and availability of system security
par: Krishnan, Ashvini Devi
Publié: (2013)
par: Krishnan, Ashvini Devi
Publié: (2013)
Development of SecureMet: A Tool for Aligning Security Metrics and Organizations Security Objectives
par: Noraini, Mohd Noor
Publié: (2011)
par: Noraini, Mohd Noor
Publié: (2011)
Awareness and acceptance analysis of information security policy
par: Muda, Mohd. Zuki
Publié: (2010)
par: Muda, Mohd. Zuki
Publié: (2010)
A model of compliance on the quality system for software industry by ISO 9000 -3 / Burhani Amirudin.
par: Amirudin, Burhani
Publié: (1999)
par: Amirudin, Burhani
Publié: (1999)
Developing Cost And Risk Assessment Tool For Hybrid Approach In Information Security Risk Analysis
par: Mohd Zabawi, Ahmed Yaser
Publié: (2019)
par: Mohd Zabawi, Ahmed Yaser
Publié: (2019)
A secure map based graphical-password auhentication system
par: Alhebshi, Ebrahim
Publié: (2014)
par: Alhebshi, Ebrahim
Publié: (2014)
Health Information Management System (Modul Services)/ Mohd Zairee Zakaria
par: Mohd Zairee , Zakaria
Publié: (2003)
par: Mohd Zairee , Zakaria
Publié: (2003)
Secure System Development with UMLSEC : Application to a B2B System
par: Khairul Anwar, Sedek
Publié: (2004)
par: Khairul Anwar, Sedek
Publié: (2004)
Factors influencing security measures in IT outsourcing
par: Zainal, Mohd. Zairusham
Publié: (2014)
par: Zainal, Mohd. Zairusham
Publié: (2014)
Users' perception of the information security policy at Universiti Teknologi Malaysia
par: Sharif, Haniza
Publié: (2009)
par: Sharif, Haniza
Publié: (2009)
Operation management system for security department of Universiti Teknologi Malaysia(OMS-UTMSD)
par: Alfalet, Mohamed O. Ali
Publié: (2007)
par: Alfalet, Mohamed O. Ali
Publié: (2007)
Production information tracking system
par: Tioh, Keat Soon
Publié: (2008)
par: Tioh, Keat Soon
Publié: (2008)
Hospital information system modeling
par: Kaghazchi, Hamid Reza
Publié: (2008)
par: Kaghazchi, Hamid Reza
Publié: (2008)
Secure cloud storage model to preserve confidentiality and integrity
par: Brohi, Sarfraz Nawaz
Publié: (2015)
par: Brohi, Sarfraz Nawaz
Publié: (2015)
The analysis and development of secure software assessment model (SSAM)
par: Apau, Mohd. Nazer
Publié: (2007)
par: Apau, Mohd. Nazer
Publié: (2007)
An anti-malvertising model for university students to increase security awareness
par: Noorlaily Izwana Ibrahim
Publié: (2012)
par: Noorlaily Izwana Ibrahim
Publié: (2012)
Documents similaires
-
Evaluation of system requirements specfication compliance to corporate information security policy: case study of risk and incident reporting system (RIRS)
par: Siti Sabariah Yaakob
Publié: (2008) -
Assessing the employees awareness and usage of information security policy in federal inland revenue service, Nigeria
par: Gadzama, Wadzani Aduwamai
Publié: (2014) -
Information security policy compliance model for public sector
par: Abd. Rahim, Fuad Harriz
Publié: (2017) -
Information security policy compliance model for government agency
par: Ramli, Muhamad Amirnazmi
Publié: (2018) -
Value focused assessment of information system security
par: Asadi, Saman
Publié: (2014)