Information security awareness model in social networking for teenagers
Social networking services such as Facebook, Twitter, Instagram and WeChat has become very popular among teenagers. Socialising through these services have become part of their everyday life. Teenagers have been sharing a lot of information about themselves in social networks. However, lack of infor...
| Auteur principal: | Mohamed Khazin, Mohamed Zul Hazmi |
|---|---|
| Format: | Thèse |
| Langue: | anglais |
| Publié: |
2015
|
| Sujets: | |
| Accès en ligne: | http://eprints.utm.my/81610/1/MohamedZulHazmiMAIS2015.pdf |
Documents similaires
An information security awareness model for financial management infiormation system (FMIS) in Sudan
par: Mahmoud, Suliman Mohamed
Publié: (2014)
par: Mahmoud, Suliman Mohamed
Publié: (2014)
Information security risk management awareness in e-government outsourced projects
par: Zalehah Muyet
Publié: (2011)
par: Zalehah Muyet
Publié: (2011)
Assessing the employees awareness and usage of information security policy in federal inland revenue service, Nigeria
par: Gadzama, Wadzani Aduwamai
Publié: (2014)
par: Gadzama, Wadzani Aduwamai
Publié: (2014)
An anti-malvertising model for university students to increase security awareness
par: Noorlaily Izwana Ibrahim
Publié: (2012)
par: Noorlaily Izwana Ibrahim
Publié: (2012)
Simulation on Network Security Design Architecture for Server Room in Rwanda Information Technology Agency
par: Eric, Karerangabo
Publié: (2009)
par: Eric, Karerangabo
Publié: (2009)
Assessing cloud computing security level of awareness among IT and non IT students in UTM
par: Mohammed, Alwuhayd Muteb
Publié: (2014)
par: Mohammed, Alwuhayd Muteb
Publié: (2014)
Value focused assessment of information system security
par: Asadi, Saman
Publié: (2014)
par: Asadi, Saman
Publié: (2014)
Guidelines for improving security awareness courses in technical and vocational training corporation in Saudi Arabia
par: Almalki, Hassan Mohammed
Publié: (2014)
par: Almalki, Hassan Mohammed
Publié: (2014)
Testing and bug fixing of the information security management system
par: Vahdani, Omid
Publié: (2012)
par: Vahdani, Omid
Publié: (2012)
Comprehensive analysis on the influences of computer ethics on information security
par: Abdul Rahim, Fiza
Publié: (2009)
par: Abdul Rahim, Fiza
Publié: (2009)
Readiness of local authorities in implementing information security management system (ISMS)
par: Mohd. Esa, Farah Saffarizan
Publié: (2014)
par: Mohd. Esa, Farah Saffarizan
Publié: (2014)
Information security vulnerability in an Iranian context from human perspective(electrical industry)
par: Pouransafar, Malahat
Publié: (2013)
par: Pouransafar, Malahat
Publié: (2013)
An analysis on security awareness of social networks users
par: Darvishi, Mahdi
Publié: (2013)
par: Darvishi, Mahdi
Publié: (2013)
A secure method to detect wormhole attack in mobile adhoc network
par: Ardestani, Parichehr Manouchehri
Publié: (2013)
par: Ardestani, Parichehr Manouchehri
Publié: (2013)
Evaluation of Information Security Risks of E-Learning Systems: A Case Study on UUM Learning Zone
par: Tan, Wai Beng
Publié: (2011)
par: Tan, Wai Beng
Publié: (2011)
Secure cloud storage model to preserve confidentiality and integrity
par: Brohi, Sarfraz Nawaz
Publié: (2015)
par: Brohi, Sarfraz Nawaz
Publié: (2015)
The analysis and development of secure software assessment model (SSAM)
par: Apau, Mohd. Nazer
Publié: (2007)
par: Apau, Mohd. Nazer
Publié: (2007)
Feasibility study on incorporating IEC/ISO27001 information security management system (ISMS) standard in it services environment
par: Hau, Lian Hong
Publié: (2013)
par: Hau, Lian Hong
Publié: (2013)
Development of SecureMet: A Tool for Aligning Security Metrics and Organizations Security Objectives
par: Noraini, Mohd Noor
Publié: (2011)
par: Noraini, Mohd Noor
Publié: (2011)
Testing information security management system tool v2.1.1.0 based on ISO 27001:2005
par: Shehu, Abdulrahman Mustafa
Publié: (2012)
par: Shehu, Abdulrahman Mustafa
Publié: (2012)
Enhancing cybersecurity awareness through role and performance based training model
par: Khan, Nouman Qadeer
Publié: (2013)
par: Khan, Nouman Qadeer
Publié: (2013)
Operation management system for security department of Universiti Teknologi Malaysia(OMS-UTMSD)
par: Alfalet, Mohamed O. Ali
Publié: (2007)
par: Alfalet, Mohamed O. Ali
Publié: (2007)
Security Issues In Shared Key Authentication on IEEE 802.11 Wireless Standards and UUM Wireless Network.
par: El Omari, Abdullah Abdelmonem M.
Publié: (2007)
par: El Omari, Abdullah Abdelmonem M.
Publié: (2007)
Evaluation of system requirements specfication compliance to corporate information security policy: case study of risk and incident reporting system (RIRS)
par: Siti Sabariah Yaakob
Publié: (2008)
par: Siti Sabariah Yaakob
Publié: (2008)
Hospital information system modeling
par: Kaghazchi, Hamid Reza
Publié: (2008)
par: Kaghazchi, Hamid Reza
Publié: (2008)
Feasibility study of incorporating remote healthcare system using wireless body area network from the security perspective
par: Vadivelu, Tamil Chelvi
Publié: (2013)
par: Vadivelu, Tamil Chelvi
Publié: (2013)
Systematic secure design guideline to improve integrity and availability of system security
par: Krishnan, Ashvini Devi
Publié: (2013)
par: Krishnan, Ashvini Devi
Publié: (2013)
Developing Cost And Risk Assessment Tool For Hybrid Approach In Information Security Risk Analysis
par: Mohd Zabawi, Ahmed Yaser
Publié: (2019)
par: Mohd Zabawi, Ahmed Yaser
Publié: (2019)
Enhancement of task oriented maintenance model using secure software desgin maintenence
par: Abdulrazak, Essa Zaki
Publié: (2013)
par: Abdulrazak, Essa Zaki
Publié: (2013)
Client to client attacks protection in cloud computing by a secure virtualization model
par: Abadi, Ahad Akbar
Publié: (2013)
par: Abadi, Ahad Akbar
Publié: (2013)
A model to enhance security of live virtual machine migration in cloud computing
par: Hosseini, Kambiz Mohammad
Publié: (2013)
par: Hosseini, Kambiz Mohammad
Publié: (2013)
Feasibility of social networking media in project communications management based on task-technology fit
par: Saw, Jui Hau
Publié: (2012)
par: Saw, Jui Hau
Publié: (2012)
Requirement Model for Water Billing Information System
par: Zainal Abidin, Shariff Ghazali
Publié: (2004)
par: Zainal Abidin, Shariff Ghazali
Publié: (2004)
Secure software development practice selection model
par: Kanniah, Sri Lakshmi
Publié: (2020)
par: Kanniah, Sri Lakshmi
Publié: (2020)
Generic nodal abstraction for enhancing human-agent collaborative model with an integrated security and trust aspects
par: Mohammed, Khudair Abbas
Publié: (2019)
par: Mohammed, Khudair Abbas
Publié: (2019)
A secure virtualization model for cloud computing to defend against distributed denial-of service attacks
par: Farahmandian, Sara
Publié: (2013)
par: Farahmandian, Sara
Publié: (2013)
The Requirement Model of a Ploughing Incentive Information System
par: Norfazlin, Rashid
Publié: (2011)
par: Norfazlin, Rashid
Publié: (2011)
Factors influencing security measures in IT outsourcing
par: Zainal, Mohd. Zairusham
Publié: (2014)
par: Zainal, Mohd. Zairusham
Publié: (2014)
Analysys on security issue of service dilevery model software as a service (SAAS) in public cloud computing
par: Muhammad Fisal Zakaria
Publié: (2012)
par: Muhammad Fisal Zakaria
Publié: (2012)
Web Based PhD Thesis Management Information System for Tripoli Faculty of Computer Technology in Libya.(WBPTMS)
par: Sayeh, Salaheddin. S. Mohamed
Publié: (2011)
par: Sayeh, Salaheddin. S. Mohamed
Publié: (2011)
Documents similaires
-
An information security awareness model for financial management infiormation system (FMIS) in Sudan
par: Mahmoud, Suliman Mohamed
Publié: (2014) -
Information security risk management awareness in e-government outsourced projects
par: Zalehah Muyet
Publié: (2011) -
Assessing the employees awareness and usage of information security policy in federal inland revenue service, Nigeria
par: Gadzama, Wadzani Aduwamai
Publié: (2014) -
An anti-malvertising model for university students to increase security awareness
par: Noorlaily Izwana Ibrahim
Publié: (2012) -
Simulation on Network Security Design Architecture for Server Room in Rwanda Information Technology Agency
par: Eric, Karerangabo
Publié: (2009)