Zobrazeno 1 - 8
of 8
pro vyhledávání: '"Shuhaili Talib"'
Publikováno v:
2018 International Conference on Information and Communication Technology for the Muslim World (ICT4M).
This paper contributes by discussing the categorization of responsibilities of top management in information security to the four (4) leadership characteristics in Islam as defined and showed by the Prophet Muhammad (PBUH). Contemporary studies, most
Publikováno v:
2016 6th International Conference on Information and Communication Technology for The Muslim World (ICT4M).
This paper discusses employees' information security behavior from the perspective of Islam and provides a behavioral framework that is developed based on the combination of Western contemporary studies and the Islamic principles. In particular, the
Autor:
Siti Khalijah Bani, Akeem Olowolayemo, Sitti Munirah Abdul Razak, Shuhaili Talib, Melasari Salependi, Syakila Kunhamoo, Nur Fatihah Ahmad
Publikováno v:
The 5th International Conference on Information and Communication Technology for The Muslim World (ICT4M).
Social network emergence has had a remarkable impact on how people communicate and share information. It has increased revenues tremendously. However, it has added another problem to data confidentiality. This is due to the advances in communication
Publikováno v:
The 5th International Conference on Information and Communication Technology for The Muslim World (ICT4M).
The proliferation of online social media use amongst employees has been reported to be incriminating organizational information security. Despite the benefits of social media to organizations, there were cases of information leakage, malware, identit
Autor:
Akeem Olowolayemo, Shuhaili Talib, Nur Ain Ismail, Siti Zalifah Haron, Sharifah Aina Syed Naser, Asma Hanisah Mohammad Yusof
Publikováno v:
The 5th International Conference on Information and Communication Technology for The Muslim World (ICT4M).
People nowadays freely give out their personal information on social media without knowing the implications of such actions. The proliferation of social networking sites creates the illusion of fun that made people to overlook the downsides of using
Good security cannot be achieved through technical means alone and a solid understanding of the issues and how to protect one’s self is required from users. Whilst many initiatives, programs and strategies have been proposed to improve the level of
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::582e1f4ef90cfdb8612ef7f09b6c67ef
https://doi.org/10.4018/978-1-4666-2163-3.ch004
https://doi.org/10.4018/978-1-4666-2163-3.ch004
Publikováno v:
ARES
As technology such as the Internet, computers and mobile devices become ubiquitous throughout society, the need to ensure our information remains secure is imperative. Unfortunately, it has long been understood that good security cannot be achieved t
Publikováno v:
Scopus-Elsevier
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=dedup_wf_001::4aa362644bdfc2780e95bd736f0c0904
http://www.scopus.com/inward/record.url?eid=2-s2.0-84953410910&partnerID=MN8TOARS
http://www.scopus.com/inward/record.url?eid=2-s2.0-84953410910&partnerID=MN8TOARS