Our privacy: How to be assured in cyberspace
We have tonnes of confidential information digitised and stored in every possible storage media in cyberspace, via both popular applications, being direct cloud-based services and/or social media platform, and applications that are designed for a specific group of professionals. However, one questio...
Main Author: | Zulhuda, Sonny |
---|---|
Format: | Conference or Workshop Item |
Language: | English English |
Published: |
2016
|
Subjects: | |
Online Access: | http://irep.iium.edu.my/51210/ http://irep.iium.edu.my/51210/1/ISACA_CIAG_2016.pdf http://irep.iium.edu.my/51210/7/51210.pdf |
Similar Items
-
Right to privacy: development, cases and commentaries
by: Zulhuda, Sonny
Published: (2013) -
Utilization of cyberspace by terrorist groups and the applicability of the Malaysian law on terrorism
by: Labanieh, Mohamad Fateh, et al.
Published: (2016) -
Privacy in cyber era : a reality check
by: Zulhuda, Sonny
Published: (2012) -
Privacy Impact Assessment (PIA): From management tools towards a privacy culture
by: Zulhuda, Sonny
Published: (2013) -
Right to privacy in Malaysia : development,cases and commentaries
by: Zulhuda, Sonny
Published: (2011)