Information Security Management Systems (ISMS) and Computer Security Self-Efficacy (CSSE) model comparison
Information security models designed based on a different set of assumptions which are based on the characteristics of information system, motivations of organization to protect information, goals of the attacker and data validation of the model. The threats to information security are real and grow...
Main Authors: | Al-Shawabkeh, Mahmoud M. M., Mohd Saudi, Madihah, Mohd Alwi, Najwa Hayati, Azman, Norhidayah |
---|---|
Format: | Conference or Workshop Item |
Language: | English English |
Published: |
2016
|
Subjects: | |
Online Access: | http://irep.iium.edu.my/50428/ http://irep.iium.edu.my/50428/ http://irep.iium.edu.my/50428/1/1570255495a.pdf http://irep.iium.edu.my/50428/4/50428_abstract.pdf |
Similar Items
-
Design and simulation of RF-CMOS spiral inductors for ISM band RFID reader circuits
by: Uddin, Md. Jasim, et al.
Published: (2009) -
Security aspects and efforts towards secure Internet of things
by: Wan Abdul Rahman, Wan Fariza, et al.
Published: (2017) -
Computer security factors effects towards online usage of internet banking system
by: Al-Shawabkeh, Mahmoud, et al.
Published: (2015) -
Computer security factors effects towards online usage of internet banking system
by: Al-Shawabkeh, Mahmoud M. M., et al.
Published: (2014) -
Internet of things security vulnerabilities and recommended solutions
by: Olanrewaju, Rashidah Funke, et al.
Published: (2018)