Factors influencing data leakage behaviour in Malaysian armed forces
Also available in printed version: QA76.9.A25 M6433 2017 raf
| Main Author: | Wan Adibah Hanis Wan Aziz |
|---|---|
| Other Authors: | Saiful Adli Ismail, supervisor |
| Format: | Master's thesis |
| Language: | English |
| Published: |
Universiti Teknologi Malaysia
2025
|
| Subjects: | |
| Online Access: | https://utmik.utm.my/handle/123456789/57866 |
| Abstract | Abstract here |
Similar Items
Data leakage model in the use of social media among Malaysian armed forces personnel
by: Nur Alfa Mazlin Masdan
Published: (2025)
by: Nur Alfa Mazlin Masdan
Published: (2025)
A security awareness model of data leakage prevention in private sector
by: Ain'natul Mardhiah Mohamad Hasbullah
Published: (2025)
by: Ain'natul Mardhiah Mohamad Hasbullah
Published: (2025)
Information security behaviours in enhancing awareness
by: Sasan Karami Zadeh
Published: (2025)
by: Sasan Karami Zadeh
Published: (2025)
A framework for data storage security in cloud computing relating to data integrity, privacy and trust
by: Negin Mirjafari
Published: (2025)
by: Negin Mirjafari
Published: (2025)
Analyzing security behaviour in managing passwords among staffs of community colleges
by: Hazila Hasan
Published: (2025)
by: Hazila Hasan
Published: (2025)
Credential purpose-based access control for personal data protection in web-based applications
by: Norjihan Abdul Ghani
Published: (2025)
by: Norjihan Abdul Ghani
Published: (2025)
Enhancing privacy on social network sites using classification and anonymisation
by: Sanaz Kavianpour
Published: (2025)
by: Sanaz Kavianpour
Published: (2025)
A case study for cyber hygiene awareness in ABC company.
by: Hairunnazri Haron
Published: (2025)
by: Hairunnazri Haron
Published: (2025)
Factors affecting the information security awareness in Maldives customs service
by: Ibrahim Naaif
Published: (2025)
by: Ibrahim Naaif
Published: (2025)
Development of metamodel for information security risk management
by: Mohammed Salem Mohammed Ba Muqabel
Published: (2025)
by: Mohammed Salem Mohammed Ba Muqabel
Published: (2025)
A new steganography technique using Knight's Tour algorithm, Affine Cipher and Huffman Coding
by: Alla Talib Mohsin
Published: (2025)
by: Alla Talib Mohsin
Published: (2025)
Information security awareness model for employees in bank Albilad
by: al-Haddad, Abdulqadeer Sheikh Aidaros
Published: (2025)
by: al-Haddad, Abdulqadeer Sheikh Aidaros
Published: (2025)
Information security awareness framework among clerical staff in islamic religious council
by: Mohd Talhah Anuar
Published: (2025)
by: Mohd Talhah Anuar
Published: (2025)
Information security governance framework implementation for intelligence department
by: Luqman Hakim Ibrahim
Published: (2025)
by: Luqman Hakim Ibrahim
Published: (2025)
Proposing guidelines for improving information assurance awareness based on information security awareness measurement framework
by: Heng, Shun Ling
Published: (2025)
by: Heng, Shun Ling
Published: (2025)
Evaluating information security culture in higher learning institution
by: Mehrdad Mansouri
Published: (2025)
by: Mehrdad Mansouri
Published: (2025)
Assessing the employees awareness and usage of information security policy in federal inland revenue service, Nigeria
by: Wadzani Aduwamai Gadzama
Published: (2025)
by: Wadzani Aduwamai Gadzama
Published: (2025)
Online consecutive secure multi-party computation algorithm for preserving privacy
by: Abdolreza Rasouli Kenari
Published: (2025)
by: Abdolreza Rasouli Kenari
Published: (2025)
Information security awareness and training program study on Wahda Bank-Libya
by: Abubaker Essid Abuhtera
Published: (2025)
by: Abubaker Essid Abuhtera
Published: (2025)
Analysis of user awareness on phishing attempt among student
by: Vanisri Nagalingam
Published: (2025)
by: Vanisri Nagalingam
Published: (2025)
Sistem penilaian tahap keselamatan rangkaian berpandukan network rating model
by: Ab. Aziz Ikhwan Ab. Wahab
Published: (2025)
by: Ab. Aziz Ikhwan Ab. Wahab
Published: (2025)
A cloud security audit quality model for a commercial bank in Malaysia
by: Mariana Md. Hashim
Published: (2025)
by: Mariana Md. Hashim
Published: (2025)
A cloud security audit quality model for a commercial bank in Malaysia
by: Mariana Md. Hashim
Published: (2025)
by: Mariana Md. Hashim
Published: (2025)
A FAPA based model for protection flooding attack in a cloud system
by: Raihan Palash
Published: (2025)
by: Raihan Palash
Published: (2025)
Bimodal recognition based on thumbprint and thumb image using bayesian classfier
by: Low, Zhi Wei
Published: (2025)
by: Low, Zhi Wei
Published: (2025)
Non technical approach to multi layered network security against malware
by: Christine Simfukwe
Published: (2025)
by: Christine Simfukwe
Published: (2025)
An embedded system for networking security applying cryptographic acceleration in field programmable gate array hardware
by: Vishnu Paramasivam
Published: (2025)
by: Vishnu Paramasivam
Published: (2025)
Hybrid fuzzy techniques for unsupervised intrusion detection system
by: Witcha Chimphlee
Published: (2025)
by: Witcha Chimphlee
Published: (2025)
Airline special service request (SSR) passengers tracking system using RFID
by: Foo, Yong Jing
Published: (2025)
by: Foo, Yong Jing
Published: (2025)
Analisa penggunaan sumber bagi simulasi serangan teragih ke atas hos sistem pengesanan pencerobohan (Full text)
Published: (2025)
Published: (2025)
Support vector machine for solving small dataset problem
by: Ahmad Rijal Abdul Rahman
Published: (2025)
by: Ahmad Rijal Abdul Rahman
Published: (2025)
Secured messaging system
by: Abd. Rahim Mat Sidek
Published: (2025)
by: Abd. Rahim Mat Sidek
Published: (2025)
Study of secure firewall filtering mechanism for network security
by: Mohammed Mustafa Mohammed
Published: (2025)
by: Mohammed Mustafa Mohammed
Published: (2025)
Analysis issues of computer network security management for disposable dishes companies in Iran
by: Fatemeh Honarjoo
Published: (2025)
by: Fatemeh Honarjoo
Published: (2025)
Secure wireless implementation based on IEEE 802.1x network standard
by: al-Slakhi, Mahmoud H.R
Published: (2025)
by: al-Slakhi, Mahmoud H.R
Published: (2025)
A framework for information security management to increase security awareness in it departments of non-public companies in Malaysia
by: Mohammad Javad Rajabi
Published: (2025)
by: Mohammad Javad Rajabi
Published: (2025)
Public key infrastructure authentication framework (PKIAF) for Malaysian public sector
by: Noraida Aman Nor
Published: (2025)
by: Noraida Aman Nor
Published: (2025)
Security in voice over internet protocol (VOIP) : implementation and analysis
by: Maimun Rizal
Published: (2025)
by: Maimun Rizal
Published: (2025)
A virus disaster recovery plan framework for academic computing center
by: Mohamed Ismail Gurhan
Published: (2025)
by: Mohamed Ismail Gurhan
Published: (2025)
Improving a multi-factor authentication using multiple graphical password and PDA
by: Jalal Mawlud H.Bradi
Published: (2025)
by: Jalal Mawlud H.Bradi
Published: (2025)
Similar Items
-
Data leakage model in the use of social media among Malaysian armed forces personnel
by: Nur Alfa Mazlin Masdan
Published: (2025) -
A security awareness model of data leakage prevention in private sector
by: Ain'natul Mardhiah Mohamad Hasbullah
Published: (2025) -
Information security behaviours in enhancing awareness
by: Sasan Karami Zadeh
Published: (2025) -
A framework for data storage security in cloud computing relating to data integrity, privacy and trust
by: Negin Mirjafari
Published: (2025) -
Analyzing security behaviour in managing passwords among staffs of community colleges
by: Hazila Hasan
Published: (2025)