Researchers

Shuhaili Bt. Talib
Assistant Professor
- KULLIYYAH OF INFORMATION AND COMMUNICATION TECHNOLOGY
- IIUM Gombak Campus
- shuhaili@iium.edu.my
Staff Details
- ICT ~ Information, Computer And Communications Technology (ICT) ~ Security System ~ Other Security System n.e.c.
BUSINESS CONTINUITY AND DISASTER RECOVERY | 2017/2018 2019/2020 2020/2021 2022/2023 |
CONTROL AND AUDIT OF INFORMATION SYSTEMS | 2018/2019 2021/2022 2022/2023 |
DISSERTATION | 2014/2015 |
FINAL YEAR PROJECT 1 | 2019/2020 |
FINAL YEAR PROJECT I | 2013/2014 2014/2015 2015/2016 2017/2018 2020/2021 2021/2022 |
FINAL YEAR PROJECT II | 2012/2013 2014/2015 2015/2016 2016/2017 2017/2018 2019/2020 2020/2021 2021/2022 |
INDUSTRIAL ATTACHMENT | 2012/2013 2013/2014 2014/2015 2015/2016 2016/2017 2017/2018 |
INFORMATION RESOURCE AND STRATEGY MANAGEMENT | 2014/2015 2015/2016 |
INFORMATION SECURITY | 2012/2013 2013/2014 2014/2015 2015/2016 |
IT SECURITY I | 2005/2006 2006/2007 2007/2008 |
MANAGEMENT INFORMATION SYSTEM | 2012/2013 2015/2016 2016/2017 2017/2018 2018/2019 |
MANAGEMENT INFORMATION SYSTEMS | 2021/2022 2022/2023 |
PRACTICAL TRAINING | 2005/2006 2006/2007 2012/2013 |
RISK MANAGEMENT | 2015/2016 2019/2020 2020/2021 |
In Progress |
|
---|---|
2020 - Present | Investigating Students' Perspectives in Sustaining Their Education Quality Through E-Learning: A Study of In-house LMS Users |
2020 - Present | Investigating Students' Perspectives in Sustaining Their Education Quality Through E-Learning: A Study of In-house LMS Users |
2019 - Present | The Development of Cybersecurity Awareness Model using CTC ? Chaos Theory of Careers for Secondary Schools. |
2019 - Present | The Development of Cybersecurity Awareness Model using CTC ? Chaos Theory of Careers for Secondary Schools. |
2008 - Present | Intelligent Cyberspace Security |
2008 - Present | Intelligent Cyberspace Security |
Completed |
|
2019 - 2022 | The Development of Cybersecurity Awareness Model using CTC ? Chaos Theory of Careers for Secondary Schools. |
2014 - 2019 | User Awareness on the Authenticity of Mobile Quran |
2014 - 2019 | User Awareness on the Authenticity of Mobile Quran |
Article |
|
---|---|
2020 | Cyber security awareness among secondary school students in Malaysia. Journal of Information Systems and Digital Technologies , 2 (2) pp.28-41 |
2019 | Incorporating Islamic principles in information security behaviour: a conceptual framework. Journal of Information Systems and Digital Technologies , 1 (2) pp.24-39 |
2016 | Unintentional information security behavior from the Qur’an and Hadith’s perspective. International Journal on Islamic Applications in Computer Science And Technology , 4 (3) pp.1-10 |
2015 | Risk assessment model for organizational information security. ARPN Journal of Engineering and Applied Sciences , 10 (23) pp.17607-17613 |
2011 | Establishing a personalized information security culture. International Journal of Mobile Computing and Multimedia Communications (IJMCMC) , 3 (1) pp.63-79 |
Conference or Workshop Item |
|
2018 | Responsibility-value alignment in information security governance. In: 2018 International Conference on Information and Communication Technology for the Muslim World (ICT4M) |
2017 | Exploring the factors influencing top management involvement and participation in information security. In: Pacific Asia Conference on Information Systems 2017 (PACIS 2017) |
2016 | User awareness in the authenticity of mobile Quran apps. In: Simposium Kebangsaan Sistem Autentikasi Al-Quran dan Al-Hadith (SAHIH 2016) |
2016 | Information security behavior among employees from the Islamic perspective. In: 2016 6th International Conference on Information and Communication Technology for The Muslim World (ICT4M 2016) |
2015 | Unintentional information security behavior from the Qur’an and hadith’s perspective. In: International Conference on Islamic Applications in Computer Science and Technology |
2015 | Mobile Quran app security vulnerabilities. In: 5th International Conference on Computing and Informatics, ICOCI 2015 |
2015 | Information security awareness through the use of social media. In: 5th International Conference on Information & Communication Technology for The Muslim World (ICT4M 2014) |
2014 | Social networks privacy policy awareness among undergraduate students: the case of Twitter. In: 2014 The 5th International Conference on Information & Communication Technology for the Muslim World (ICT4M 2014) |
2014 | Perception analysis of social networks’ privacy policy: Instagram as a case study. In: 2014 5th International Conference on Information and Communication Technology for The Muslim World (ICT4M 2014) |
2010 | An analysis of information security awareness within home and work environments. In: 2010 International Conference on Availability, Reliability and Security |
Book |
|
Book Section |
Advanced Search