Found about 7 results
Downloads: 176 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Review Papers, Information Technology, Malaysia, Volume 6 Issue 1, January 2017
180 - 186Cyberterrorism Definition Patterns and Mitigation Strategies: A Literature Review
Israa G. SEissa | Jamaludin Ibrahim [7] | Nor-Zaiasron Yahaya
Downloads: 164
Review Papers, Computer Science & Engineering, Malaysia, Volume 7 Issue 12, December 2018
268 - 277Online Radicalization: An Overview
Mohammad Zahid Mateen | Jamaludin Ibrahim [7]
Downloads: 129
Review Papers, Information Technology, Malaysia, Volume 7 Issue 12, December 2018
1410 - 1415Cyberwar Preparedness
Mamady Aissata Conde | Jamaludin Ibrahim [7]
Downloads: 114
Review Papers, Information Technology, Malaysia, Volume 3 Issue 12, December 2014
773 - 778Information Security in ICT from an Islamic Perspective
Jamaludin Ibrahim [7] | Fatima Ahmed Mohamed Nuhaabdulaziz Alyami Effra Altaf Haqani
Downloads: 113
Survey Paper, Information Technology, Malaysia, Volume 4 Issue 1, January 2015
1287 - 1292Survey on Mobile and Wireless Security Awareness: User Perspectives
Nadhirah binti Nazri [2] | Noor Azian binti Mohamad Ali | Jamaludin Ibrahim [7]
Downloads: 112
Research Paper, Information Security, Malaysia, Volume 6 Issue 12, December 2017
1095 - 1098Assessment of Cybersecurity Effectiveness in Serving Maqasid Al-Shariah
Yassir Izzadin | Jamaludin Ibrahim [7]
Downloads: 109
Review Papers, Information Technology, Malaysia, Volume 4 Issue 5, May 2015
1532 - 1536Cloud Computing: Cloud Adoption in Professional Practice
Nadhirah binti Nazri [2] | Jamaludin Ibrahim [7]