Skip to content
VuFind
Advanced
  • A systematic review of approac...
  • Cite this
  • Print
  • Export Record
    • Export to RefWorks
    • Export to EndNoteWeb
    • Export to EndNote
  • Permanent link
A systematic review of approaches to assessing cyber security awareness

A systematic review of approaches to assessing cyber security awareness

Purpose – The purpose of this paper is to survey, explore and inform researchers about the previous methodologies applied, target audience and coverage of previous assessment of cybersecurity awareness by capturing, summarizing, synthesizing and critically comment on it. It is also conducted to id...

Full description

Bibliographic Details
Main Authors: Abd Rahim, Noor Hayani, Hamid, Suraya, Mat Kiah, Miss Laiha, Shamshirband, Shahaboddin
Format: Article
Language:English
English
English
Published: Emerald Group Publishing Ltd. 2015
Subjects:
T Technology (General)
Online Access:http://irep.iium.edu.my/76155/
http://irep.iium.edu.my/76155/
http://irep.iium.edu.my/76155/
http://irep.iium.edu.my/76155/1/K-12-2014-0283.pdf
http://irep.iium.edu.my/76155/7/76155_A%20systematic%20review%20of%20approaches_scopus.pdf
http://irep.iium.edu.my/76155/8/76155_A%20systematic%20review%20of%20approaches_wos.pdf
  • Holdings
  • Description
  • Similar Items
  • Staff View

Internet

http://irep.iium.edu.my/76155/
http://irep.iium.edu.my/76155/
http://irep.iium.edu.my/76155/
http://irep.iium.edu.my/76155/1/K-12-2014-0283.pdf
http://irep.iium.edu.my/76155/7/76155_A%20systematic%20review%20of%20approaches_scopus.pdf
http://irep.iium.edu.my/76155/8/76155_A%20systematic%20review%20of%20approaches_wos.pdf

Similar Items

  • Enhancement of cybersecurity awareness program on personal data protection among youngsters in Malaysia: an assessment
    by: Abd Rahim, Noor Hayani, et al.
    Published: (2019)
  • An overview on cyber security awareness in Muslim countries
    by: Basamh, Saeed S., et al.
    Published: (2014)
  • Routing protocol design for secure WSN: Review and open research issues
    by: Md Zin, Shazana, et al.
    Published: (2014)
  • Integrate approriate approach for network security assessment in cyber warfare branch
    by: Mohd Azmi Bin Arifin
    Published: (2007)
  • CYBER SECURITY THREATS AND ATTACKS : ASSESSING MALAYSIA'S CYBER SECURITY STRATEGIES /
    by: Zaidah binti Minha Lt. Cdr
    Published: (2021)

Search Options

  • Advanced Search

Find More

  • Browse the Catalog

Need Help?

  • Search Tips
Cannot write session to /tmp/vufind_sessions/sess_esvi0llrgoice3gjt0cvvav1ac