Researchers

Researchers

A B C D E F G H I J K L M N O P Q R S T U V W X Y Z


Nurul Nuha Binti Abdul Molok
Assistant Professor

Print CV Email Me

Staff Details

  • ICT ~ Information, Computer And Communications Technology (ICT) ~ Security System ~ Other Security System n.e.c.
  • ICT ~ Information, Computer And Communications Technology (ICT) ~ Other Information, Computer and Communication Technology (ICT) n.e.c.
  • Economics, Business And Management ~ Economics, Business And Management ~ Management ~ Management Information System
  • Economics, Business And Management ~ Economics, Business And Management ~ Technology Management ~ Ethics, Security and Safety
  • Social Science ~ Social Science ~ Social Issues and Problems ~ At-Risk Behaviour
BUSINESS CONTINUITY AND DISASTER RECOVERY 2018/2019 2021/2022
CONTROL AND AUDIT OF INFORMATION SYSTEMS 2017/2018
DISSERTATION 2014/2015
FINAL YEAR PROJECT 1 2019/2020
FINAL YEAR PROJECT I 2007/2008 2008/2009 2013/2014 2014/2015 2016/2017 2017/2018 2020/2021 2021/2022
FINAL YEAR PROJECT II 2007/2008 2008/2009 2015/2016 2016/2017 2019/2020 2020/2021 2021/2022
INDUSTRIAL ATTACHMENT 2013/2014 2014/2015 2015/2016 2016/2017 2017/2018
INFORMATION SECURITY 2015/2016
INFORMATION SECURITY GOVERNANCE 2015/2016 2016/2017 2017/2018 2018/2019 2019/2020 2020/2021 2021/2022 2023/2024
IT SECURITY I 2007/2008 2008/2009 2015/2016
MANAGEMENT INFORMATION SYSTEM 2006/2007 2007/2008 2008/2009 2013/2014 2014/2015 2015/2016 2018/2019
MANAGEMENT INFORMATION SYSTEMS 2021/2022
MANAGEMENT OF INFORMATION SECURITY 2019/2020 2020/2021 2021/2022 2022/2023 2023/2024 2024/2025
PRACTICAL TRAINING 2006/2007 2007/2008 2008/2009
PRINCIPLES OF IT SECURITY 2016/2017
RISK MANAGEMENT 2013/2014 2014/2015 2018/2019 2019/2020 2020/2021 2021/2022 2022/2023 2023/2024 2024/2025
USRAH IN ACTION 1 2021/2022 2022/2023 2023/2024
USRAH IN ACTION 2 2022/2023 2023/2024
In Progress
2021 - Present INFORMATION SECURITY RISK MANAGEMENT
2020 - Present Kajian Hukum Mengenai Kesan Permainan Digital Terhadap Masyarakat
2020 - Present Kajian Hukum Mengenai Kesan Permainan Digital Terhadap Masyarakat
2019 - Present The Development of Cybersecurity Awareness Model using CTC ? Chaos Theory of Careers for Secondary Schools.
2019 - Present The Development of Cybersecurity Awareness Model using CTC ? Chaos Theory of Careers for Secondary Schools.
2008 - Present Intelligent Cyberspace Security
2008 - Present Intelligent Cyberspace Security
Completed
2019 - 2022 The Development of Cybersecurity Awareness Model using CTC ? Chaos Theory of Careers for Secondary Schools.
2014 - 2017 A Model for Information Security Risk Management and Auditing Processes in Malaysian Universities
2014 - 2017 A Model for Information Security Risk Management and Auditing Processes in Malaysian Universities
2011 - 2013 Exploring the use of Online Social Networking among Employees in Malaysian Organizations: Looking Potential Threats to Information Security
2011 - 2013 Exploring the use of Online Social Networking among Employees in Malaysian Organizations: Looking Potential Threats to Information Security
2007 - 2020 Managing IT Outsourcing Partnership in Malaysia Organizations: Exploring the Perspectives of the Service Receivers Using the Multiple Case Studies Approach
2007 - 2020 Managing IT Outsourcing Partnership in Malaysia Organizations: Exploring the Perspectives of the Service Receivers Using the Multiple Case Studies Approach
Article
2020 Underlying Structure of Online Risks and Harm among Bangladeshi Teenagers. Applied Information Systems and Management , 3 (1) pp.7-14
2020 A systematic literature review of cyber security education models’ implementations. Malaysian Journal of Youth Studies , Edisi Khas 1 (1) pp.1-20
2020 Socio-technical mitigation effort to combat cyber propaganda: a systematic literature mapping. IEEE Access , 8 pp.92929-92944
2020 Cyber security awareness among secondary school students in Malaysia. Journal of Information Systems and Digital Technologies , 2 (2) pp.28-41
2019 Incorporating Islamic principles in information security behaviour: a conceptual framework. Journal of Information Systems and Digital Technologies , 1 (2) pp.24-39
2019 Persuasive technology in the Islamic perspective: the principles and strategies. International Journal on Perceptive andCognitive Computing (IJPCC) , 5 (2) pp.107-115
2018 A case analysis of securing organisations against information leakage through online social networking. International Journal of Information Management , 43 pp.351-356
2016 Unintentional information security behavior from the Qur’an and Hadith’s perspective. International Journal on Islamic Applications in Computer Science And Technology , 4 (3) pp.1-10
2015 Risk assessment model for organizational information security. ARPN Journal of Engineering and Applied Sciences , 10 (23) pp.17607-17613
2012 Online social networking: a source of intelligence for advanced persistent threats. International Journal of Cyber Warfare and Terrorism , 2 (1) pp.1-13
2011 Information Leakage through online social networking: opening the doorway for advanced persistence threats. The Journal of the Australian Institute of Professional Intelligence Officers (AIPIO) , 19 (2) pp.38-55

Conference or Workshop Item

2019 A comparative review of ISMS implementation based on ISO 27000 Series in organizations of different business sectors. In: International Conference Computer Science and Engineering (IC2SE)
2019 Exploring staff perception of InfoSec policy compliance: Palestine Universities empirical study. In: 1st International Conference of Intelligent Computing and Engineering (ICOICE 2019)
2019 A comparative review of ISMS implementation based on ISO 27000 series in organizations of different business sectors. In: 1st International Conference Computer Science and Engineering (IC2SE 2019)
2019 Information security policy perceived compliance among staff in Palestine universities: An empirical pilot study. In: 2019 IEEE Jordan International Joint Conference on Electrical Engineering and Information Technology (JEEIT)
2019 Advanced persistent threats awareness and readiness: a case study in Malaysian financial institutions. In: 2018 Cyber Resilience Conference (CRC 2018)
2018 Responsibility-value alignment in information security governance. In: 2018 International Conference on Information and Communication Technology for the Muslim World (ICT4M)
2018 Persuasive technology from Islamic perspective. In: 2018 International Conference on Information and Communication Technology for the Muslim World (ICT4M)
2017 Exploring the factors influencing top management involvement and participation in information security. In: Pacific Asia Conference on Information Systems 2017 (PACIS 2017)
2016 Persuasive technology for improving information security awareness and behavior: literature review. In: 2016 6th International Conference on Information and Communication Technology for The Muslim World (ICT4M 2016)
2016 Information security behavior among employees from the Islamic perspective. In: 2016 6th International Conference on Information and Communication Technology for The Muslim World (ICT4M 2016)
2015 Unintentional information security behavior from the Qur’an and hadith’s perspective. In: International Conference on Islamic Applications in Computer Science and Technology
2015 A conceptual framework for measuring the acceptance of pervasive learning. In: 5th International Conference on Computing and Informatics (ICOCI 2015)
2015 Information security awareness through the use of social media. In: 5th International Conference on Information & Communication Technology for The Muslim World (ICT4M 2014)
2015 Protecting youth from social media risks through information security practices and Islamic principles. In: 3rd International Conference on Islamic Applications in Computer Science And Technology
2014 Inadvertent Leakage of Organisational Information through Online Social Networking. In: International Research Invention & Innovation Exhibition 2014
2013 Disclosure of organizational information on social media: Perspectives from security managers. In: Pacific Asia Conference on Information Systems
2011 Disclosure of organizational information by employees on Facebook: Looking at the potential for information security risks. In: 22nd Australasian Conference on Information Systems (ACIS)
2011 Exploring the use of online social networking by employees: Looking at the potential for information leakage. In: Pacific Asia Conference on Information Systems
2010 Understanding the factors of information leakage through online social networking to safeguard organizational information. In: Australasian Conference for Information Systems
2010 Information leakage through online social networking: Opening the doorway for advanced persistence threats. In: Australian Information Security Management Conference

Book

2017 A case study of advanced persistent threats on financial institutions in Malaysia. IIUM Press . ISBN 9789674187903
2010 The information systems integration plan: for satellite remote sensing subsystems. VDM Verlag Dr. Muller . ISBN 3639219635

Book Section