An investigation of health information system security policies compliance behaviour / Norshima Humaidi
Health Information System (HIS) has a higher degree of vulnerability towards threats of information security such as unauthorized access, use, disclosure, disruption, modification or destruction and duplication of passwords. Human error is a major security threat to information system’s security and...
| Main Author: | Norshima, Humaidi |
|---|---|
| Format: | Thesis |
| Published: |
2016
|
| Subjects: |
Similar Items
Evaluation of system requirements specfication compliance to corporate information security policy: case study of risk and incident reporting system (RIRS)
by: Siti Sabariah Yaakob
Published: (2008)
by: Siti Sabariah Yaakob
Published: (2008)
Assessing the employees awareness and usage of information security policy in federal inland revenue service, Nigeria
by: Gadzama, Wadzani Aduwamai
Published: (2014)
by: Gadzama, Wadzani Aduwamai
Published: (2014)
Information security policy compliance model for public sector
by: Abd. Rahim, Fuad Harriz
Published: (2017)
by: Abd. Rahim, Fuad Harriz
Published: (2017)
Information security policy compliance model for government agency
by: Ramli, Muhamad Amirnazmi
Published: (2018)
by: Ramli, Muhamad Amirnazmi
Published: (2018)
Value focused assessment of information system security
by: Asadi, Saman
Published: (2014)
by: Asadi, Saman
Published: (2014)
A dimension-based information security culture model for information security policy compliance behavior in Malaysian public universities
by: Akhyari, Nasir
Published: (2019)
by: Akhyari, Nasir
Published: (2019)
Testing and bug fixing of the information security management system
by: Vahdani, Omid
Published: (2012)
by: Vahdani, Omid
Published: (2012)
Information security policy compliance behaviour model for Malaysian federal public sector agencies
by: Kuppusamy, Puspadevi
Published: (2022)
by: Kuppusamy, Puspadevi
Published: (2022)
Readiness of local authorities in implementing information security management system (ISMS)
by: Mohd. Esa, Farah Saffarizan
Published: (2014)
by: Mohd. Esa, Farah Saffarizan
Published: (2014)
Comprehensive analysis on the influences of computer ethics on information security
by: Abdul Rahim, Fiza
Published: (2009)
by: Abdul Rahim, Fiza
Published: (2009)
Information security awareness model in social networking for teenagers
by: Mohamed Khazin, Mohamed Zul Hazmi
Published: (2015)
by: Mohamed Khazin, Mohamed Zul Hazmi
Published: (2015)
An information security awareness model for financial management infiormation system (FMIS) in Sudan
by: Mahmoud, Suliman Mohamed
Published: (2014)
by: Mahmoud, Suliman Mohamed
Published: (2014)
Information security compliance assessment using information security maturity model
by: Zadeh, HassanHossein
Published: (2014)
by: Zadeh, HassanHossein
Published: (2014)
Information security risk management awareness in e-government outsourced projects
by: Zalehah Muyet
Published: (2011)
by: Zalehah Muyet
Published: (2011)
Human resource information system for public health assistant : on-line induction course
by: Mohd. Ariffin, Mohd. Azman
Published: (2001)
by: Mohd. Ariffin, Mohd. Azman
Published: (2001)
Information security vulnerability in an Iranian context from human perspective(electrical industry)
by: Pouransafar, Malahat
Published: (2013)
by: Pouransafar, Malahat
Published: (2013)
Evaluation of Information Security Risks of E-Learning Systems: A Case Study on UUM Learning Zone
by: Tan, Wai Beng
Published: (2011)
by: Tan, Wai Beng
Published: (2011)
Feasibility study on incorporating IEC/ISO27001 information security management system (ISMS) standard in it services environment
by: Hau, Lian Hong
Published: (2013)
by: Hau, Lian Hong
Published: (2013)
Simulation on Network Security Design Architecture for Server Room in Rwanda Information Technology Agency
by: Eric, Karerangabo
Published: (2009)
by: Eric, Karerangabo
Published: (2009)
Evaluation of user's behaviours handling computer security incident in financial institution in Klang Valley
by: Nor Hidayah Mohd Jawawi
Published: (2012)
by: Nor Hidayah Mohd Jawawi
Published: (2012)
Spatial correlation analysis of obesity cases with Demographic and fast food outlets distribution / Siti Nur Zulaikha Che Humaidi
by: Che Humaidi, Siti Nur zulaikha
Published: (2018)
by: Che Humaidi, Siti Nur zulaikha
Published: (2018)
Exploring Health Information Using WAP Technology: Maternity and Children Guide
by: Abdul Jabar, Russul DH.
Published: (2012)
by: Abdul Jabar, Russul DH.
Published: (2012)
Testing information security management system tool v2.1.1.0 based on ISO 27001:2005
by: Shehu, Abdulrahman Mustafa
Published: (2012)
by: Shehu, Abdulrahman Mustafa
Published: (2012)
Expert System For Classifying Shariah Compliance E-Business Companies
by: Wardah Atirah, Maharudin
Published: (2008)
by: Wardah Atirah, Maharudin
Published: (2008)
Systematic secure design guideline to improve integrity and availability of system security
by: Krishnan, Ashvini Devi
Published: (2013)
by: Krishnan, Ashvini Devi
Published: (2013)
Development of SecureMet: A Tool for Aligning Security Metrics and Organizations Security Objectives
by: Noraini, Mohd Noor
Published: (2011)
by: Noraini, Mohd Noor
Published: (2011)
Awareness and acceptance analysis of information security policy
by: Muda, Mohd. Zuki
Published: (2010)
by: Muda, Mohd. Zuki
Published: (2010)
A model of compliance on the quality system for software industry by ISO 9000 -3 / Burhani Amirudin.
by: Amirudin, Burhani
Published: (1999)
by: Amirudin, Burhani
Published: (1999)
Developing Cost And Risk Assessment Tool For Hybrid Approach In Information Security Risk Analysis
by: Mohd Zabawi, Ahmed Yaser
Published: (2019)
by: Mohd Zabawi, Ahmed Yaser
Published: (2019)
A secure map based graphical-password auhentication system
by: Alhebshi, Ebrahim
Published: (2014)
by: Alhebshi, Ebrahim
Published: (2014)
Health Information Management System (Modul Services)/ Mohd Zairee Zakaria
by: Mohd Zairee , Zakaria
Published: (2003)
by: Mohd Zairee , Zakaria
Published: (2003)
Secure System Development with UMLSEC : Application to a B2B System
by: Khairul Anwar, Sedek
Published: (2004)
by: Khairul Anwar, Sedek
Published: (2004)
Factors influencing security measures in IT outsourcing
by: Zainal, Mohd. Zairusham
Published: (2014)
by: Zainal, Mohd. Zairusham
Published: (2014)
Users' perception of the information security policy at Universiti Teknologi Malaysia
by: Sharif, Haniza
Published: (2009)
by: Sharif, Haniza
Published: (2009)
Operation management system for security department of Universiti Teknologi Malaysia(OMS-UTMSD)
by: Alfalet, Mohamed O. Ali
Published: (2007)
by: Alfalet, Mohamed O. Ali
Published: (2007)
Production information tracking system
by: Tioh, Keat Soon
Published: (2008)
by: Tioh, Keat Soon
Published: (2008)
Hospital information system modeling
by: Kaghazchi, Hamid Reza
Published: (2008)
by: Kaghazchi, Hamid Reza
Published: (2008)
Secure cloud storage model to preserve confidentiality and integrity
by: Brohi, Sarfraz Nawaz
Published: (2015)
by: Brohi, Sarfraz Nawaz
Published: (2015)
The analysis and development of secure software assessment model (SSAM)
by: Apau, Mohd. Nazer
Published: (2007)
by: Apau, Mohd. Nazer
Published: (2007)
An anti-malvertising model for university students to increase security awareness
by: Noorlaily Izwana Ibrahim
Published: (2012)
by: Noorlaily Izwana Ibrahim
Published: (2012)
Similar Items
-
Evaluation of system requirements specfication compliance to corporate information security policy: case study of risk and incident reporting system (RIRS)
by: Siti Sabariah Yaakob
Published: (2008) -
Assessing the employees awareness and usage of information security policy in federal inland revenue service, Nigeria
by: Gadzama, Wadzani Aduwamai
Published: (2014) -
Information security policy compliance model for public sector
by: Abd. Rahim, Fuad Harriz
Published: (2017) -
Information security policy compliance model for government agency
by: Ramli, Muhamad Amirnazmi
Published: (2018) -
Value focused assessment of information system security
by: Asadi, Saman
Published: (2014)