Suggested Topics within your search.
Suggested Topics within your search.
-
1
-
2
-
3
-
4by Sadiqah Aishah, Othman“... Model which has proven effective in mitigating cybersecurity risks through the first and second lines...”
Published 2023
Get full text
Get full text
Thesis -
5
-
6by Alam, RG Guntur“... massively in cyberspace and thus poses a security threat to smart city services. In Indonesia, cybersecurity...”
Published 2023
Get full text
Get full text
Get full text
Thesis -
7
-
8by Ali, Siti Hajar Aminah“... by cybersecurity field. Another different case of cybersecurity is the Distributed Denial of Services (DDoS...”
Published 2015
Get full text
Thesis -
9
-
10by Mohammed, Idi“...The effectiveness of Nigeria Cybersecurity strategy can have serious effect on the Cybersecurity...”
Published 2019
Get full text
Thesis -
11
-
12by Noor Suhani, Sulaiman“.... Responsibility norms are integrated into the model as a means to assess employees‘ behaviors toward cybersecurity...”
Published 2023
Get full text
Thesis -
13by Mohammed Abali, Aliyu“... security learning and a general support for cybersecurity protection. The project is a case study based...”
Published 2013
Get full text
Thesis -
14
-
15by Mohamed, Siti Hajar“... by CyberSecurity Malaysia shows that the computer crimes recorded an increase every year. Since the Malaysian...”
Published 2017
Get full text
Thesis -
16by Tan, Toh Hao“..., Readiness and Cybersecurity. Then, by using the SmartPLS 3.0, these constructs have been given the weightage...”
Published 2021
Get full text
Thesis -
17by Ahmad, Roshdi“... involving 213 respondents who were existing customers of CyberSecurity Malaysia (CSM), the results...”
Published 2017
Get full text
Thesis -
18by Rafsanjani, Ahmad Sahban“...Malicious Uniform Resource Locators (URLs) are one of the major threats in cybersecurity. Cyber...”
Published 2023
Get full text
Thesis -
19
-
20by Md Tahir, Mohamad Afizal“... CyberSecurity Malaysia (CSM) to deal and lead in computer forensic evidence. Malaysian Administrative...”
Published 2016
Get full text
Thesis