Please use this identifier to cite or link to this item:
http://hdl.handle.net/123456789/18964
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Ahmed Ali Otman Gouni | - |
dc.contributor.author | Dr. Siti Haryani Shaikh Ali | - |
dc.contributor.author | Dr. Amna Saad | - |
dc.contributor.author | (UniKL MIIT) | - |
dc.date.accessioned | 2018-05-31T07:44:44Z | - |
dc.date.available | 2018-05-31T07:44:44Z | - |
dc.date.issued | 2018-05-31 | - |
dc.identifier.uri | http://ir.unikl.edu.my/jspui/handle/123456789/18964 | - |
dc.description.abstract | The improvement of knowledge is very important in information security domain. due to its positive effect on users’ information security education. It is acknowledged that security education is playing a vital role to mitigate the risk of information security incidents and breaches that faced by users through their ordinary life. Although several approaches have been proposed in information security education, yet these threats continue to increase. To assist the effort of information security education, this research explores the effective factors that have been used in the approaches of information security education, investigates the gaps, and hence, proposes new factors that can help to developing an effective approach to information security education. | en_US |
dc.language.iso | en | en_US |
dc.subject | Information security education | en_US |
dc.subject | effective factors | en_US |
dc.subject | memory structure | en_US |
dc.subject | knowledge retention | en_US |
dc.title | Exploration of Factors that influence information security education | en_US |
dc.type | Other | en_US |
dc.conference.name | International Conference on Information & Communication Technology | en_US |
dc.conference.year | 2018 | en_US |
Appears in Collections: | Conference Paper |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
Exploring the factors.pdf | 91.06 kB | Adobe PDF | View/Open Request a copy |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.