Author of the publication

A framework for integrated risk management process using survival analysis approach in information security.

, , and . IAS, page 185-190. IEEE, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A framework for integrated risk management process using survival analysis approach in information security., , and . IAS, page 185-190. IEEE, (2010)Constructing Conceptual Model for Security Culture in Health Information Systems Security Effectiveness., , and . WorldCIST, volume 206 of Advances in Intelligent Systems and Computing, page 213-220. Springer, (2013)Healthcare practitioner behaviours that influence unsafe use of hospital information systems., , , , , , and . Health Informatics J., (2020)Data Anonymization According to the Combination of Attributes on Social Network Sites., , and . SSCC, volume 377 of Communications in Computer and Information Science, page 272-280. Springer, (2013)Ethical awareness of computer use among undergraduate students., , and . SIGCAS Comput. Soc., 39 (1): 27-40 (2009)Development of Malaysian Digital Forensics Investigator Competency Identification Methods., , and . AMLTA, volume 322 of Communications in Computer and Information Science, page 554-565. Springer, (2012)Safety Use of Hospital Information Systems: A Preliminary Investigation., and . KMO, volume 224 of Lecture Notes in Business Information Processing, page 707-721. Springer, (2015)Examining Factors Influencing IT Outsourcing Success in Malaysian Organizations., , , and . ACIS, (2006)Security threats categories in healthcare information systems., , and . Health Informatics J., 16 (3): 201-209 (2010)Customers' trust in e-commerce: In collective culture setting., and . CAMP, page 182-186. IEEE, (2012)