50 research outputs found

    Information security culture: A systematic literature review

    Get PDF
    Information security culture becomes an enabler towards minimising the protection of security risk and incidents. This research will systematically identify and analyse published research exploring factors influencing information security culture. A systematic literature review is conducted throughout this process.40 papers were used in our synthesis of evidence with nine compatibility factors has been found to influence information security culture in organisation setting. One thousand two hundred and four studies were identified as 40 fulfilled the inclusion criteria. Of these, most (13%) were assessed being high quality, and three were rated very poor.Nine common factors were identified which are cultural differences, security awareness, security behaviour, top management commitment, trust, information sharing, security knowledge, security policy, and belief.The most common factors found was security behaviour that highly influences information security culture from analysis conducted.The result of this study also shows the gap that there is lack of studies conducted in healthcare informatics environments setting. Findings are useful in developing theoretical model that shows factors influencing information security culture in healthcare informatics environmen

    IoT in banking: the trends, threats, and solution

    Get PDF
    The Internet of Things is the next step of the digital revolution that will change consumers' lives. The Internet of Things promises to be a worthy representative of an open course in technology, economics, and culture. IoT, without a doubt, has a promising future. The modern consumer actions and uses represent inescapable digital transformations for banking institutions. Emerging digital world developments guide all banking services' digital transformation. However, the security threats of using IoT in banking are increasing. Cybercriminals such as hacking, corruption, and financial violence, data breaches, and financial expenditure risks will continue to trouble the use of IoT in banking. Therefore, this research aims to study the banking industry's existing IoT uses, issues, and challenges in adopting the IoT in the banking industry. IoT threats are highlighted in this paper. This article sets out a model dimension of the process monitoring framework for IoT security risk management. Other than that, this paper also studies the existing security risk management model of IoT in banking. Moreover, preventive IoT protection initiatives and approaches to enhance IoT protection by implementing blockchain technology and Control Model Information Structure are addressed in this article

    Systematic literature review: factor for physical security and access control in maximun security protection

    Get PDF
    Physical security and access control as one of the installations should be upgraded to confirm the security and readiness of the asset belong to the group to continue safely. As the quick development in technology offers a boundless defence level for physical security and access control in the office, every organization must offer a passable budget pertinent to the transformation of the world today. Through a very humane approach of natural surveillance, access control, maintenance, and reinforcements of territory, this strategy will contribute to the field of physical security as a whole. The purpose of this paper is to recognize the features that regulate taking for perimeter protection and access control in maximum were identified and analysed. The findings have revealed that five categories of features can be used to study the taking for perimeter protection and access control in maximum security protection: physical security; access control; security standard and policy; security awareness program and security training and security protection. A Systematic Literature Review (SLR) was accepted since it uses a more rigorous and well-defined method to swotting the study indication pertinent to the study. Initially, 62 papers were retrieved by a manual search in six databases and 17 primary studies were finally included. Consequently, 5 factors education

    IoT security for smart grid environment: Issues and solutions

    Get PDF
    The Internet of Things (IoT) is the Internet's latest innovation today, where every physical object is situated or where measurement, as well as communication capacities, can be seamlessly synchronized to the Internet at various rates. The most important infrastructure, the smart grid, is called the extended version of the power grid with comprehensive Internet infrastructure. The smart grid will include billions of intelligent appliances: intelligent meters, actuators, vehicles and so on, despite a few correspondence infrastructures, whether public or private. Notwithstanding, security is viewed as one of the primary considerations hampering the large scope reception and arrangement of both the IoT vision and the smart grid. To date, the issues of IoT for the smart grid are rarely discussed empirically in any academic research. This study aims to examine security problems and challenges in the IoT smart grid system. Findings show various issues that we can categorize into three parts; component issues, system issues and network issues. As a result, this study proposes a mitigation plan for the problems highlighted by developing an IoT smart grid security component model

    Factors of emerging infectious disease outbreak prediction using big data analytics: A systematic literature review

    Get PDF
    Infectious disease is an illness that can be transmitted from an infected individual to another.During the pre-vaccine era, infectious disease epidemics caused major fatalities in the population.The invention of vaccines that have dramatically reduced fatalities caused by infectious disease, led to the establishment of Global Immunization Vision and Strategy initiative that aims at increasing national vaccination coverage around the world.However, the appearance of emerging infectious disease calls for an establishment of an early warning mechanisms that can predict the next outbreak.Mathematical and statistical model that has been used to predict infectious disease outbreak used single source datasets that is inadequate for public health policymaking.Literatures suggested using big data analytics to get a better and accurate model. Big data deals not only with structured data from electronic health records but also integrate unstructured data obtained from social medias and webpages.Thus, this paper aims at identifying the factors frequently used in studies on infectious disease outbreak prediction, focusing specifically on two common disease outbreak in southeast Asia: dengue fever and measles.A systematic literature review approach that search across four databases found 284 literatures, of which 10 literatures were selected in the final process.Based on the review, it seems that studies on measles outbreak employed only single source datasets of patient data retrieved from electronic health records. Further research on measles outbreak prediction should combine various types of big data to produce more accurate prediction results

    Healthcare Practitioner Behaviours That Influence Unsafe Use Of Hospital Information Systems

    Get PDF
    This study aims to investigate healthcare practitioner behaviour in adopting Health Information Systems which could affect patients’ safety and quality of health. A qualitative study was conducted based on a semi-structured interview protocol on 31 medical doctors in three Malaysian government hospitals implementing the Total Hospital Information Systems. The period of study was between March and May 2015. A thematic qualitative analysis was performed on the resultant data to categorize them into relevant themes. Four themes emerged as healthcare practitioners’ behaviours that influence the unsafe use of Hospital Information Systems. The themes include (1) carelessness, (2) workarounds, (3) noncompliance to procedure, and (4) copy and paste habit. By addressing these behaviours, the hospital management could further improve patient safety and the quality of patient care

    Measurement Tool for Assessing Research Information Management System Success

    Get PDF
    Research Information Management System (RIMS) has become necessary for any research affiliated institutions including “Research University” to improve research efficiency, management and overall performance to gain competitive advantages. Despite other challenges, there is still a lack of effective tools in research affiliated institutions for managing research information. The success or failure of RIMS implementation largely relies on the level of systems success and user acceptance. Therefore, the measurement of Information Systems success remains a top concern for researchers, practitioners, and managers. As such, prior studies of this research have extended DeLone and McLean success model into three dimensions (technological, organization and human). This paper presents a pilot study to validate the relevancy of items thus ensuring the reliability of the proposed measurement tool for RIMS success. As a result, this study proposes RIMS success model measurement tools. The findings of this study indicate that the survey instruments used in this study are reliable and feasible to be used for further related studies

    Fundamentals of Entrepreneurship ENT300 The Soapranos / Noor Ashyikin Jamali… [et al.]

    Get PDF
    The project we want to propose is a service which is housecleaning. We have chosen to be known as The Soapranos Housecleaning Enterprise. We choose this name because we believe that it will attract and get a good response from our customers. We provide our customers with a proper standard of cleaning and multi services. So, we have to ensure that our services will meet up the expectation of our company name. It is our priority to provide the best and quality services for our customers. The name given is to create an impression to the customer where it will make them feel we are here to help them to create comfortable and secure environment

    A pilot analysis of factors affecting defense against social engineering attacks in the armed forces environment

    Get PDF
    Social engineering is a technique of deceiving people into giving away confidential information that could be useful to gain unauthorized access to an information system. Even to the most secured system, social engineering is a formidable threat. It is one of the most devastating threats to organizations and businesses. Unlike traditional hacking, social engineering is less or non-technological. It manipulates characteristics of human nature, exploiting people’s desire to be kind and helpful. The psychology leverage makes social engineering hard to defend against. This paper presents the identification of factors related to social engineering in the context of armed forces through a review of related literature. Prior works from previous studies are discussed, and factors have been identified based on certain criterion. This study executed a pilot analysis on 30 samples of respondents among Malaysian armed forces personnel. As a result, nine factors are identified that may affect defense against social engineering in the armed forces: Authority, Reciprocation, Commitment and Consistency, Diffusion of Responsibility, Scarcity, Friendliness and Liking, Awareness, Social Proof, and Trust

    Descriptive findings regarding factors influencing mobile application acceptance among millennial in Malaysia

    Get PDF
    Although mobile phones have been used widely by millennial generation within the age group of 20-34 there is very limited knowledge about their intention to use mobile application. This paper presents descriptive results regarding factors influencing mobile application intention behavior among millennial based on the response of university students in Malaysia. Theoretical background of this study was based on a review of relevant model of technology acceptance and the second generation of the Unified Theory of Acceptance and Use of Technology (UTAUT2) was used as the theoretical basis for this study. Of 200 of questionnaire distributed within two months of data collection, 77 valid returned questionnaires were used for the analysis. A reliability as well as descriptive analysis were performed. Based on results, all factors have shown good Cronbach Alpha Values. Descriptively, the result has demonstrated high percentage and frequency in participants’ agreement of the measurement items of the construct except for Social Influence. For future work, an inferential statistical analysis can be performed to uncover predicting power of the factors over the acceptance of the mobile application
    corecore