Users' perception of the information security policy at Universiti Teknologi Malaysia
Securing information is essential for safeguarding the organization business operations as information is a business asset to any organization including education sector. One of the most imperative information security (InfoSec) controls identified is InfoSec policy. The purpose of this study is to...
| Auteur principal: | Sharif, Haniza |
|---|---|
| Format: | Thèse |
| Langue: | anglais |
| Publié: |
2009
|
| Sujets: | |
| Accès en ligne: | http://eprints.utm.my/5291/1/HanizaSharifMFSKSM2009.pdf |
Documents similaires
A dimension-based information security culture model for information security policy compliance behavior in Malaysian public universities
par: Akhyari, Nasir
Publié: (2019)
par: Akhyari, Nasir
Publié: (2019)
Awareness and acceptance analysis of information security policy
par: Muda, Mohd. Zuki
Publié: (2010)
par: Muda, Mohd. Zuki
Publié: (2010)
Information security awareness framework for enhancing security privacy among twitter users
par: Saeed Hussein, Abbas Yaslam
Publié: (2017)
par: Saeed Hussein, Abbas Yaslam
Publié: (2017)
Evaluating human factors of information security awareness in Taibah University
par: Alaskary, Abdulaziz Abdullah O.
Publié: (2019)
par: Alaskary, Abdulaziz Abdullah O.
Publié: (2019)
Information security compliance assessment using information security maturity model
par: Zadeh, HassanHossein
Publié: (2014)
par: Zadeh, HassanHossein
Publié: (2014)
An analysis on security awareness of social networks users
par: Darvishi, Mahdi
Publié: (2013)
par: Darvishi, Mahdi
Publié: (2013)
Secure policies for the distributed virtual machines in mobile cloud computing
par: Annane, Boubakeur
Publié: (2020)
par: Annane, Boubakeur
Publié: (2020)
A model on evaluating information security awareness in Majmaah University in Saudi Rabia
par: Saud Alharbi, Talal Nasser
Publié: (2018)
par: Saud Alharbi, Talal Nasser
Publié: (2018)
A model on evaluating information security awareness in Majmaah University in Saudi Arabia
par: Alharbi, Talal Nasser Saud
Publié: (2018)
par: Alharbi, Talal Nasser Saud
Publié: (2018)
Information security policy compliance model for public sector
par: Abd. Rahim, Fuad Harriz
Publié: (2017)
par: Abd. Rahim, Fuad Harriz
Publié: (2017)
A conceptual framework of information security database audit and assessment in university based organization
par: Ul Hasan, Muneeb
Publié: (2018)
par: Ul Hasan, Muneeb
Publié: (2018)
Modelling viable business process for information technology policy management
par: Alinaghian, Reza
Publié: (2013)
par: Alinaghian, Reza
Publié: (2013)
Information security curriculum framework at undergraduate level
par: Sanusi Arifin, Ab. Arif
Publié: (2009)
par: Sanusi Arifin, Ab. Arif
Publié: (2009)
Development of metamodel for information security risk management
par: Mohammed Ba Muqabel, Mohammed Salem
Publié: (2013)
par: Mohammed Ba Muqabel, Mohammed Salem
Publié: (2013)
An enhanced next generation security operation center framework for information system security management
par: Yau, Ti Dun
Publié: (2023)
par: Yau, Ti Dun
Publié: (2023)
Improving information system security by evaluating human factors
par: Soltanmohammadi, Saeed
Publié: (2013)
par: Soltanmohammadi, Saeed
Publié: (2013)
Factors affecting the information security awareness in maldives customs service
par: Naaif, Ibrahim
Publié: (2015)
par: Naaif, Ibrahim
Publié: (2015)
Control priorization model for improving information security risk assessment
par: Al-Safwani, Nadher Mohammed Ahmed
Publié: (2014)
par: Al-Safwani, Nadher Mohammed Ahmed
Publié: (2014)
The effect of usability and information quality on Malaysian user’s satisfaction of student information systems in higher education institutions
par: Atta, Mohammed Thamir
Publié: (2019)
par: Atta, Mohammed Thamir
Publié: (2019)
Adoption of knowledge management systems (KMS) in Universiti Teknologi Malaysia
par: Abubakari, Fatima
Publié: (2017)
par: Abubakari, Fatima
Publié: (2017)
Enhancing information security awareness and computer ethics for non-information technology company using integrated model
par: Zainudin, Mohd. Eyzuan
Publié: (2010)
par: Zainudin, Mohd. Eyzuan
Publié: (2010)
Knowledge audit on research activities towards research university at Universiti Teknologi Malaysia (UTM)
par: Mohd. Najib, Nuur Shuhada
Publié: (2009)
par: Mohd. Najib, Nuur Shuhada
Publié: (2009)
Sistem penjanaan resume yang fleksibel pelajar Universiti Teknologi Malaysia
par: Mohd. Yassin, Nurdiyana
Publié: (2007)
par: Mohd. Yassin, Nurdiyana
Publié: (2007)
Information security awareness among system administrators and end-user perspectives
par: Selvan, Pugneswary Panner
Publié: (2016)
par: Selvan, Pugneswary Panner
Publié: (2016)
Enhancement of Universiti Teknologi Malaysia image map using Garmin handheld receiver
par: Othman, Nur Liyana
Publié: (2009)
par: Othman, Nur Liyana
Publié: (2009)
Cloud computing three-factor user authentication framework and protocols for telecare medical information system
par: Siddiqui, Zeeshan
Publié: (2015)
par: Siddiqui, Zeeshan
Publié: (2015)
Antecedents of business intelligence usage : a case study of Universiti Teknologi Malaysia (UTM)
par: Musa, Salamatu
Publié: (2019)
par: Musa, Salamatu
Publié: (2019)
Enhancement of information security management system by embedding corporate ethical virtue as ethical issues solution
par: Abd. Hashim, Nur Zafirah
Publié: (2015)
par: Abd. Hashim, Nur Zafirah
Publié: (2015)
Information security concerns towards best practices for IT outsourcing projects from the perspective of service provider in Iran
par: Parham, Nima
Publié: (2009)
par: Parham, Nima
Publié: (2009)
Consumer voice towards environmental green mobile phone: a case of Universiti Teknologi Malaysia students
par: Takhmina, Makhkamova
Publié: (2014)
par: Takhmina, Makhkamova
Publié: (2014)
Investigating customer relationship management and service quality in higher education in Malaysia case study : School of Graduate Studies, Universiti Teknologi Malaysia
par: Virgiyanti, Wiwied
Publié: (2007)
par: Virgiyanti, Wiwied
Publié: (2007)
Cyber risk insurance policy a proposed frameworkfor e-business in Malaysia
par: Lee, Siok Hwee
Publié: (2009)
par: Lee, Siok Hwee
Publié: (2009)
Secure-Spin with hashing to support mobility and security in wireless sensor network
par: Amri, Mohammad Hossein
Publié: (2013)
par: Amri, Mohammad Hossein
Publié: (2013)
Repurchase intention model for mobile shopping application users in Malaysia
par: Osmani, Mohammad
Publié: (2022)
par: Osmani, Mohammad
Publié: (2022)
The development of a for Pejabat Harta Bina, Universiti Teknologi Malaysia : a study for the guidelines
par: Mohammad, Izran Sarrazin
Publié: (2005)
par: Mohammad, Izran Sarrazin
Publié: (2005)
Fairness Categorization Policy Of Queuing Theory For Geographic Information System Job Scheduling
par: Kheoh, Hooi Leng
Publié: (2013)
par: Kheoh, Hooi Leng
Publié: (2013)
Users behavioural intention model of using smart wellness wearables in Malaysia
par: Niknejad, Naghmeh
Publié: (2019)
par: Niknejad, Naghmeh
Publié: (2019)
User value co-creation model for agile web development in Malaysia
par: Madi, Tameer
Publié: (2015)
par: Madi, Tameer
Publié: (2015)
Modeling user's intention to use e-government to citizen services in Malaysia
par: Namroush, Salahedin Ali
Publié: (2011)
par: Namroush, Salahedin Ali
Publié: (2011)
Policy-based managers coordination for self-adaptive software approach
par: Mansor Hamed, Abdelhamid Abdelhadi
Publié: (2013)
par: Mansor Hamed, Abdelhamid Abdelhadi
Publié: (2013)
Documents similaires
-
A dimension-based information security culture model for information security policy compliance behavior in Malaysian public universities
par: Akhyari, Nasir
Publié: (2019) -
Awareness and acceptance analysis of information security policy
par: Muda, Mohd. Zuki
Publié: (2010) -
Information security awareness framework for enhancing security privacy among twitter users
par: Saeed Hussein, Abbas Yaslam
Publié: (2017) -
Evaluating human factors of information security awareness in Taibah University
par: Alaskary, Abdulaziz Abdullah O.
Publié: (2019) -
Information security compliance assessment using information security maturity model
par: Zadeh, HassanHossein
Publié: (2014)