Author: Palaniappan Shamala Faculty of Computer Science and Information Technology University Tun Hussein Onn Malaysia (UTHM) Johor MalaysiaFaculty of Computer Science and Information Technology University Tun Hussein Onn Malaysia (UTHM) Johor Malaysia Rabiah Ahmad Center for Advanced Computing Technology Faculty of Information and Communication Technology UniversitiTeknikal Malaysia Melaka (UTeM) Melaka MalaysiaCenter for Advanced Computing Technology Faculty of Information and Communication Technology UniversitiTeknikal Malaysia Melaka (UTeM) Melaka Malaysia ZolaitAli HusseinCollege of Information Technology University of Bahrain Sakhir Kingdom of Bahrain Shahrin bin Sahib Center for Advanced Computing Technology Faculty of Information and Communication Technology UniversitiTeknikal Malaysia Melaka (UTeM) Melaka MalaysiaCenter for Advanced Computing Technology Faculty of Information and Communication Technology UniversitiTeknikal Malaysia Melaka (UTeM) Melaka Malaysia
Publisher: Emerald Group Publishing Ltd
E-ISSN: 1758-8847|17|2|193-219
ISSN: 1328-7265
Source: Journal of Systems and Information Technology, Vol.17, Iss.2, 2015-05, pp. : 193-219
Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.
Abstract
Related content
Homeland security and information
By Relyea H.C.
Government Information Quarterly, Vol. 19, Iss. 3, 2002-01 ,pp. :
Corporate information security management
By Mitchell Ruth C Marcella Rita Baxter Graeme
New Library World, Vol. 100, Iss. 5, 1999-05 ,pp. :
Government initiatives in information technology security
Asian Libraries, Vol. 6, Iss. 3-4, 1997-03 ,pp. :
Government initiatives in information technology security
Asian Libraries, Vol. 6, Iss. 34, 1997-12 ,pp. :