Identify Human Error In Using Mobile Device That Lead To Security Threat
Human errors are the most critical issues that contributes to the information security threat. Mobile device are the main devices that can be manipulates by the attacker towards their victims. The attackers nowadays more interested in attacking the mobile devices because of the current trend which...
| Main Author: | Abdul Mubin, Norzul Masri |
|---|---|
| Format: | Thesis |
| Language: | English English |
| Published: |
2017
|
| Subjects: | |
| Online Access: | http://eprints.utem.edu.my/id/eprint/20742/ http://libraryopac.utem.edu.my/webopac20/Record/0000106618 |
| Abstract | Abstract here |
Similar Items
Classroom Management System Via Mobile Devices
by: Norazlin, Kamaludin
Published: (2009)
by: Norazlin, Kamaludin
Published: (2009)
A press touch code based secure graphical password scheme for smart devices
by: Al Noman Ranak, Md Sayfullah
Published: (2018)
by: Al Noman Ranak, Md Sayfullah
Published: (2018)
A malware analysis and detection system for mobile devices / Ali Feizollah
by: Ali, Feizollah
Published: (2017)
by: Ali, Feizollah
Published: (2017)
Real-Time Data Capturing for Reservoir Spillway Gate Operation Via Mobile Device
by: Faisal, Zulhumadi
Published: (2006)
by: Faisal, Zulhumadi
Published: (2006)
Enhancing the natural language processing for Malay language stemming, identifying and correcting misspelled words identifying neologism
by: Surayaini Basri
Published: (2015)
by: Surayaini Basri
Published: (2015)
Mobile Computing at Sultanah Bahiyah Library : Mapping Physical Book Rack Location Using Handheld Devices
by: Ahmad Nurzid, Rosli
Published: (2004)
by: Ahmad Nurzid, Rosli
Published: (2004)
Implementation Of Association Technique In Identify The Frequent Pairing Subject From Private Tutor Data
by: Asnor, Nur Hamizah
Published: (2017)
by: Asnor, Nur Hamizah
Published: (2017)
Generic nodal abstraction for enhancing human-agent collaborative model with an integrated security and trust aspects
by: Mohammed, Khudair Abbas
Published: (2019)
by: Mohammed, Khudair Abbas
Published: (2019)
Identifying Purchasing Patterns of Arab and Malaysian
Students Using Data Mining Technique
by: Abuhamdah, Anmar Fakhri Moh'd
Published: (2006)
by: Abuhamdah, Anmar Fakhri Moh'd
Published: (2006)
Adaptive low power error control for wireless links / Abdullah b. Muhammed.
by: Muhammed, Abdullah
Published: (2003)
by: Muhammed, Abdullah
Published: (2003)
Recurrent error-based ridge polynomial neural networks for time series forecasting
by: Hassan Saeed, Waddah Waheeb
Published: (2019)
by: Hassan Saeed, Waddah Waheeb
Published: (2019)
Development of SecureMet: A Tool for Aligning Security Metrics and Organizations Security Objectives
by: Noraini, Mohd Noor
Published: (2011)
by: Noraini, Mohd Noor
Published: (2011)
Agent based syntex error detection for C programming language
by: Syra G Mokunjil
Published: (2013)
by: Syra G Mokunjil
Published: (2013)
Lightweight security schemes for internet of things resource-constrained devices / Usman Ali
by: Usman , Ali
Published: (2024)
by: Usman , Ali
Published: (2024)
Strong Mobility Protocol For Mobile Wireless Sensor Networks
by: Muhammad, Javed
Published: (2015)
by: Muhammad, Javed
Published: (2015)
A Framework For Classification Software Security Using Common Vulnerabilities And Exposures
by: Hassan, Nor Hafeizah
Published: (2018)
by: Hassan, Nor Hafeizah
Published: (2018)
(Mobile Government) Mobile - Tourism Services Providers Guide System
by: Alksasbeh, Malek Zakarya Salameh
Published: (2008)
by: Alksasbeh, Malek Zakarya Salameh
Published: (2008)
A Template-Based Approach To Write Complete Security Requirements For Software Development Environment
by: Mustafa, Nuridawati
Published: (2020)
by: Mustafa, Nuridawati
Published: (2020)
A hybrid haptic stimulation prosthetic wearable device to recover the missing sensation of the upper limb amputees
by: Nemah, Mohammed Najeh
Published: (2019)
by: Nemah, Mohammed Najeh
Published: (2019)
Mobile Appointment System For Universities
by: Alshar'e, Marwan Ibrahim Ahmad
Published: (2008)
by: Alshar'e, Marwan Ibrahim Ahmad
Published: (2008)
A secure HEVC video watermarking scheme for authentication and copyright purposes
by: Elrowayati, Ali Abdulhafid
Published: (2020)
by: Elrowayati, Ali Abdulhafid
Published: (2020)
An investigation of health information system security policies compliance behaviour / Norshima Humaidi
by: Norshima, Humaidi
Published: (2016)
by: Norshima, Humaidi
Published: (2016)
The Implementation of Securing Plaintext File Using Cryptography Method in Web Based Environment
by: Hasnira, Md. Lazim
Published: (2004)
by: Hasnira, Md. Lazim
Published: (2004)
Secure System Development with UMLSEC : Application to a B2B System
by: Khairul Anwar, Sedek
Published: (2004)
by: Khairul Anwar, Sedek
Published: (2004)
Securing cloud data system (SCDS) for key exposure using AES algorithm
by: Thabet Albatol, Mohammed Samer Hasan
Published: (2021)
by: Thabet Albatol, Mohammed Samer Hasan
Published: (2021)
Design Mobile Guide For Tioman Island.
by: Alfughi, Ahmed Omar
Published: (2008)
by: Alfughi, Ahmed Omar
Published: (2008)
Mobile Reservation System for UUM INN
by: Fouad, Luma M.
Published: (2008)
by: Fouad, Luma M.
Published: (2008)
Using Mobile Phone To Access Academic Result In Universiti Utara Malaysia
by: Ashraf Ali F., Abdul Jalil
Published: (2008)
by: Ashraf Ali F., Abdul Jalil
Published: (2008)
Comparing the Vulnerability of Password Security on Windows XP Profesional and Red Hat Linux 9
by: Norkhushaini, Awang
Published: (2004)
by: Norkhushaini, Awang
Published: (2004)
Information security risk management framework for Social Engineering attack and digital prevention techniques
by: Shekh Abdullah -Al-Musa Ahmed
Published: (2020)
by: Shekh Abdullah -Al-Musa Ahmed
Published: (2020)
Simulation on Network Security Design Architecture for Server Room in Rwanda Information Technology Agency
by: Eric, Karerangabo
Published: (2009)
by: Eric, Karerangabo
Published: (2009)
The Challenges Of Understanding Security In Web Browser Case Study: Internet Explorer And Mozilla Firefox
by: Saleh, Ashraf Mousa
Published: (2008)
by: Saleh, Ashraf Mousa
Published: (2008)
Mobile Application for Post Childbirth Services (MPCB)
by: Otuom, Anas Mustafa Mohammad
Published: (2008)
by: Otuom, Anas Mustafa Mohammad
Published: (2008)
Managing Computer Lab-Mobile Agent Approach
by: Nor Shubaily, Khamis
Published: (2008)
by: Nor Shubaily, Khamis
Published: (2008)
Mobile-Based Notification System for University's Events
by: al-Zoubi, Qusay Mohammad Ibrahim
Published: (2009)
by: al-Zoubi, Qusay Mohammad Ibrahim
Published: (2009)
The Four Basic Pillars of Hajj's Mobile System
by: Makhzoom, Sakina M. A
Published: (2011)
by: Makhzoom, Sakina M. A
Published: (2011)
Mobile Searching And Ordering System For Canon Company
by: Sari Kamal, Moh'd Al-Rifaee
Published: (2008)
by: Sari Kamal, Moh'd Al-Rifaee
Published: (2008)
Identifying Test Cases for Stored Procedure Using Cyclomatic Complexity Approach
by: Rosmah, Ismail
Published: (2009)
by: Rosmah, Ismail
Published: (2009)
A secure message handler using microsoft cryptoapi
by: Eh Kan, Chessda Uttraphan
Published: (2003)
by: Eh Kan, Chessda Uttraphan
Published: (2003)
Developing Mobile Application For Parliament Election Process in Jordan.
by: Jebreen, Issam Yousef
Published: (2007)
by: Jebreen, Issam Yousef
Published: (2007)
Similar Items
-
Classroom Management System Via Mobile Devices
by: Norazlin, Kamaludin
Published: (2009) -
A press touch code based secure graphical password scheme for smart devices
by: Al Noman Ranak, Md Sayfullah
Published: (2018) -
A malware analysis and detection system for mobile devices / Ali Feizollah
by: Ali, Feizollah
Published: (2017) -
Real-Time Data Capturing for Reservoir Spillway Gate Operation Via Mobile Device
by: Faisal, Zulhumadi
Published: (2006) -
Enhancing the natural language processing for Malay language stemming, identifying and correcting misspelled words identifying neologism
by: Surayaini Basri
Published: (2015)
