Researchers

Researchers

A B C D E F G H I J K L M N O P Q R S T U V W X Y Z


Shuhaili Bt. Talib
Assistant Professor

Print CV Email Me

Staff Details

  • ICT ~ Information, Computer And Communications Technology (ICT) ~ Security System ~ Other Security System n.e.c.
BUSINESS CONTINUITY AND DISASTER RECOVERY 2017/2018 2019/2020 2020/2021
CONTROL AND AUDIT OF INFORMATION SYSTEMS 2018/2019 2021/2022 2022/2023
DISSERTATION 2014/2015
FINAL YEAR PROJECT 1 2019/2020
FINAL YEAR PROJECT I 2013/2014 2014/2015 2015/2016 2017/2018 2020/2021 2021/2022 2022/2023
FINAL YEAR PROJECT II 2012/2013 2014/2015 2015/2016 2016/2017 2017/2018 2019/2020 2020/2021 2021/2022
INDUSTRIAL ATTACHMENT 2012/2013 2013/2014 2014/2015 2015/2016 2016/2017 2017/2018
INFORMATION RESOURCE AND STRATEGY MANAGEMENT 2014/2015 2015/2016
INFORMATION SECURITY 2012/2013 2013/2014 2014/2015 2015/2016
IT SECURITY I 2005/2006 2006/2007 2007/2008
MANAGEMENT INFORMATION SYSTEM 2012/2013 2015/2016 2016/2017 2017/2018 2018/2019
MANAGEMENT INFORMATION SYSTEMS 2021/2022 2022/2023
PRACTICAL TRAINING 2005/2006 2006/2007 2012/2013
RISK MANAGEMENT 2015/2016 2019/2020 2020/2021
In Progress
2020 - Present Investigating Students' Perspectives in Sustaining Their Education Quality Through E-Learning: A Study of In-house LMS Users
2020 - Present Investigating Students' Perspectives in Sustaining Their Education Quality Through E-Learning: A Study of In-house LMS Users
2019 - Present The Development of Cybersecurity Awareness Model using CTC ? Chaos Theory of Careers for Secondary Schools.
2019 - Present The Development of Cybersecurity Awareness Model using CTC ? Chaos Theory of Careers for Secondary Schools.
2008 - Present Intelligent Cyberspace Security
2008 - Present Intelligent Cyberspace Security
Completed
2019 - 2022 The Development of Cybersecurity Awareness Model using CTC ? Chaos Theory of Careers for Secondary Schools.
2014 - 2019 User Awareness on the Authenticity of Mobile Quran
2014 - 2019 User Awareness on the Authenticity of Mobile Quran
Article
2020 Cyber security awareness among secondary school students in Malaysia. Journal of Information Systems and Digital Technologies , 2 (2) pp.28-41
2019 Incorporating Islamic principles in information security behaviour: a conceptual framework. Journal of Information Systems and Digital Technologies , 1 (2) pp.24-39
2016 Unintentional information security behavior from the Qur’an and Hadith’s perspective. International Journal on Islamic Applications in Computer Science And Technology , 4 (3) pp.1-10
2015 Risk assessment model for organizational information security. ARPN Journal of Engineering and Applied Sciences , 10 (23) pp.17607-17613
2011 Establishing a personalized information security culture. International Journal of Mobile Computing and Multimedia Communications (IJMCMC) , 3 (1) pp.63-79

Conference or Workshop Item

2018 Responsibility-value alignment in information security governance. In: 2018 International Conference on Information and Communication Technology for the Muslim World (ICT4M)
2017 Exploring the factors influencing top management involvement and participation in information security. In: Pacific Asia Conference on Information Systems 2017 (PACIS 2017)
2016 User awareness in the authenticity of mobile Quran apps. In: Simposium Kebangsaan Sistem Autentikasi Al-Quran dan Al-Hadith (SAHIH 2016)
2016 Information security behavior among employees from the Islamic perspective. In: 2016 6th International Conference on Information and Communication Technology for The Muslim World (ICT4M 2016)
2015 Unintentional information security behavior from the Qur’an and hadith’s perspective. In: International Conference on Islamic Applications in Computer Science and Technology
2015 Mobile Quran app security vulnerabilities. In: 5th International Conference on Computing and Informatics, ICOCI 2015
2015 Information security awareness through the use of social media. In: 5th International Conference on Information & Communication Technology for The Muslim World (ICT4M 2014)
2014 Social networks privacy policy awareness among undergraduate students: the case of Twitter. In: 2014 The 5th International Conference on Information & Communication Technology for the Muslim World (ICT4M 2014)
2014 Perception analysis of social networks’ privacy policy: Instagram as a case study. In: 2014 5th International Conference on Information and Communication Technology for The Muslim World (ICT4M 2014)
2010 An analysis of information security awareness within home and work environments. In: 2010 International Conference on Availability, Reliability and Security

Book

Book Section