DETERMINING CRITICAL SUCCESS FACTORS OF INFORMATION SECURITY KNOWLEDGE TOWARDS ORGANISATIONS' INFORMATION SECURITY EFFECTIVENESS : /
This thesis is seek to investigate the critical success factors of information security knowledge (ISK) in Malaysian public sector organisation (MPSO). Through systematic literature review (SLR), this thesis proposes five critical success factors of ISK that affect the organisations' informati...
Saved in:
| Main Author: | Rohana Mohamad Rashid (Author) |
|---|---|
| Corporate Author: | Centre for Graduate Studies Universiti Pertahanan Nasional Malaysia |
| Format: | Thesis Book |
| Language: | English |
| Published: |
Kuala Lumpur :
Universiti Pertahanan Nasional Malaysia,
2020.
|
| Series: | Tesis
Thesis |
| Subjects: | |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
Principles of information security
by: Whitman, Michael E
Published: (2003)
by: Whitman, Michael E
Published: (2003)
Management of information security
by: Whitman
Published: (2004)
by: Whitman
Published: (2004)
Information security governance
by: Von Solms, Sebastiaan H., et al.
Published: (2009)
by: Von Solms, Sebastiaan H., et al.
Published: (2009)
Roadmap to information security for IT and InfoSec managers
by: Whitman, Michael E., 1964-
Published: (2011)
by: Whitman, Michael E., 1964-
Published: (2011)
IT governance and information security guides, standards, and frameworks
by: Maleh, Yassine, et al.
Published: (2022)
by: Maleh, Yassine, et al.
Published: (2022)
Information security governance and management framework model and toolset for CISOs and decision makers
by: Volchkov, Andrej
Published: (2019)
by: Volchkov, Andrej
Published: (2019)
Information security management global challenges in 21st century
by: Goel, Suresh
Published: (2009)
by: Goel, Suresh
Published: (2009)
Information security policies, procedures, and standards a practitioner's reference
by: Landoll, Douglas J.
Published: (2016)
by: Landoll, Douglas J.
Published: (2016)
Advances in enterprise information technology security
Published: (2007)
Published: (2007)
Improving information security practices through computational intelligence
Published: (2016)
Published: (2016)
Security in computing
by: Pfleegar, Charles P.
Published: (1997)
by: Pfleegar, Charles P.
Published: (1997)
Information security management handbook
Published: (2007)
Published: (2007)
Information security management handbook
Published: (2007)
Published: (2007)
Information security management handbooks
by: lh
by: lh
Information security management handbook
Published: (2012)
Published: (2012)
Information protection playbook
Published: (2013)
Published: (2013)
Information security the complete reference
by: Rhodes-Ousley, Mark
Published: (2013)
by: Rhodes-Ousley, Mark
Published: (2013)
Information security principles and practice
by: Stamp
Published: (2006)
by: Stamp
Published: (2006)
Information Security : Principles and Practice /
by: Stamp, Mark
Published: (2022)
by: Stamp, Mark
Published: (2022)
Information Security Management Handbook
Published: (2012)
Published: (2012)
Information security a practical approach
by: Bhaskar
Published: (2008)
by: Bhaskar
Published: (2008)
Principles of information security
by: Whitman, Michael E., et al.
Published: (2012)
by: Whitman, Michael E., et al.
Published: (2012)
Principles of information security
by: Whitman, Michael E. 1964-, et al.
Published: (2009)
by: Whitman, Michael E. 1964-, et al.
Published: (2009)
Principles of information security
by: Whitman, Michael E., et al.
Published: (2022)
by: Whitman, Michael E., et al.
Published: (2022)
Principles of information security
by: Whitman, Michael E., et al.
Published: (2016)
by: Whitman, Michael E., et al.
Published: (2016)
Computer and information security
Published: (2016)
Published: (2016)
Management of information security
by: Whitman, Michael E. 1964-, et al.
Published: (2019)
by: Whitman, Michael E. 1964-, et al.
Published: (2019)
Simple computer security disinfect your PC
Published: (2007)
Published: (2007)
Managing information security
Published: (2014)
Published: (2014)
Information security culture a human firewall approach
by: Omar Zakaria
Published: (2013)
by: Omar Zakaria
Published: (2013)
Information security and technology
by: Ponnappa, B.M
Published: (2004)
by: Ponnappa, B.M
Published: (2004)
Information security and technology
by: Ponnappa, B.M
Published: (2004)
by: Ponnappa, B.M
Published: (2004)
Information hiding techniques for steganography and digital watermarking
by: lh
by: lh
Information security a strategic approach
by: LeVeque
Published: (2006)
by: LeVeque
Published: (2006)
Introduction to information security a strategic-based approach
by: Shimeall, Timothy
Published: (2014)
by: Shimeall, Timothy
Published: (2014)
Information security and IT risk management
by: Agrawal, Manish
Published: (2014)
by: Agrawal, Manish
Published: (2014)
Information security management handbook, 2008 CD-ROM edition
Security and loss prevention an introduction
by: Purpura, Philip P., 1950-
Published: (2013)
by: Purpura, Philip P., 1950-
Published: (2013)
Principles of information systems security text and cases
by: Dhillon 1963-
Published: (2007)
by: Dhillon 1963-
Published: (2007)
Critical security studies an introduction
by: Peoples, Columba
Published: (2010)
by: Peoples, Columba
Published: (2010)
Similar Items
-
Principles of information security
by: Whitman, Michael E
Published: (2003) -
Management of information security
by: Whitman
Published: (2004) -
Information security governance
by: Von Solms, Sebastiaan H., et al.
Published: (2009) -
Roadmap to information security for IT and InfoSec managers
by: Whitman, Michael E., 1964-
Published: (2011) -
IT governance and information security guides, standards, and frameworks
by: Maleh, Yassine, et al.
Published: (2022)