Showing 1 - 20 results of 28 for search '"privacy"', query time: 0.06s Refine Results
  1. 1
  2. 2

    Workplace privacy in Malaysia: A legal comparison by Ayub, Zainal Amin, Mohamed Yusoff, Zuryati

    Published 2008
    “…These collections of data have significant importance regarding the issues of its security and individual privacy. Furthermore, the Malaysian Federal Constitution does not specifically recognise privacy as one of the fundamental rights and the Personal Data Protection Bill is yet to be enforced. …”
    Get full text
    Book Section
  3. 3

    Privacy-preserving in web services using hippocratic database by Abdul Ghani, Norjihan, Mohamed Sidek, Zailani

    Published 2008
    “…Sometimes, web services need to release the data they own to third parties. Because privacy is an important concern in web services, there are several research efforts have been devoted to address issues related to the development of privacy-preserving data management techniques. …”
    Book Section
  4. 4

    Citizen-centric privacy requirements engineering framework / Nor Asiakin Hasbullah by Hasbullah, Nor Asiakin

    Published 2018
    “…Currently, the citizencentric perspective of privacy requirement is not well understood. To fill this gap, this research undertook a study with the objectives of (i) To investigate the availability and the content of privacy policy in e-government websites (ii) To investigate citizen’s privacy perception through their privacy concern and willingness to participate in public opinion platform (iii) To investigate citizen’s privacy requirement’s and need through their privacy preferences (iv) To propose citizencentric privacy requirements engineering framework by facilitating citizen engagement in fulfilling citizen privacy requirements. …”
    Get full text
    Book Section
  5. 5

    A secure and privacy preserving iris biometric authentication scheme with matrix transformation by Udzir, Nur Izura, Abdullah, Azizol, Mahmod, Ramlan

    Published 2017
    “…The approach provides a high level template security and user privacy. It is also robust against replay attack, cross matching and loss of identity.…”
    Get full text
    Book Section
  6. 6

    Effectiveness of using integrated algorithm in preserving privacy of social network sites users by Kavianpour, S., Ismail, Zuraini, Mohtasebi, A.

    Published 2011
    “…Spreading information can be harmful for users' privacy. In this paper, first we describe some definitions of social networks and their privacy threats. …”
    Book Section
  7. 7

    Privacy policy preference (P3P) in e-commerce: key for improvement by Said, A. A., Che Hussin, Ab. Razak, Dahlan, Halina Mohamed, Hossein Pour, M. M.

    Published 2012
    “…This study will investigate the concept of a privacy policy and the role of a platform for privacy policy preference (P3P) in e-commerce. …”
    Book Section
  8. 8

    Social network sites: information disclosure, perceived vulnerability, privacy concerns and perceived benefits by Salleh, Norsaremah, Hussein, Ramlah, Mohamed, Norshidah, Abdul Karim, Nor Shahriza, Ahlan, Abdul Rahman, Aditiwarman, Umar

    Published 2012
    “…Although SNS offer many benefits to the users, information privacy seemed to be overlooked. Based on the protection motivation theory, this study investigated the factors that might influence youth to disclose information about themselves on the SNS. …”
    Book Section
  9. 9

    A new technical framework for security, trust and privacy (STP) of RFID system / Mohd Faizal Mubarak by Mubarak, Mohd Faizal

    Published 2015
    “…We examined past works on RFID with privacy-preserving solutions dealing with issues on system integrity and availability. …”
    Get full text
    Book Section
  10. 10

    The cost effect, customer support, and privacy issue on the usage of cloud storage among Indonesian students in Universiti Utara Malaysia by NidaKhansa, Alfatihah, Mohd Saifudin, Adam

    Published 2020
    “…This article is about finding out the problems commonly encountered by users in using a cloud storage system, which cost effects, customer support, and privacy issues. With a clear and specific exposure, it is expected that users can concern and pay attention to this issue. …”
    Get full text
    Book Section
  11. 11

    Smart home security system by Bahrin, Muhammad Harith, Abdul Rahim, Ruzairi, Tee, Kian Sek, Abdul Manaf, Mohamad Shukri, Wahap, Ahmad Ridhwan, Mohamed Din, Shahrulnizahani, Ahmad, Nasarudin, Mohd Nayan, Norkharziana, Mohd Zain, Rasif, Pusppanathan, Jaysuman

    Published 2022
    “…However, in the IoT world, an increase in the phenomenon of user privacy data leakage and security vulnerability should not be ignored. …”
    Get full text
    Book Section
  12. 12

    E-government, e-surveillance, and ethical issues from Malaysian perspective by Masrom, M.

    Published 2016
    “…This situation has destroyed people's privacy even though the main purpose of having electronic surveillance is for security and safety purposes. …”
    Book Section
  13. 13

    A conceptual framework integration of UTAUT and HBM on evaluating the adoption of electronic payment system in Malaysia by Jaafar, Ishaq, Tasmin, Rosmaini, Ramlan, Rohaizan, Abdul Hamid, Nor Aziati, Ngadiman, Yunos

    Published 2020
    “…This is because the electronic payment system is faced with the related risk to security and privacy (Ivarsson, 2008).…”
    Get full text
    Book Section
  14. 14

    Training New Housing Entrepreneurs — A Malaysian Scenario by Jaafar, Mastura, Syed Abu Bakar, Syed Putra, Wan Daud, Wan Mohd Dzulkifli

    Published 2015
    “…Housing is a basic human need that not only serves as a shelter, but also is a simultaneous source of luxury, investment, privacy, and comfort. In Malaysia, the housing sector is an indispensable indicator of economic empowerment because the meeting of housing needs for all people has long been an objective of national policy [1]. …”
    Get full text
    Book Section
  15. 15

    A framework for development of information security with computer ethics : educational perspective by Namayandeh, Meysam, Masrom, Maslin, Ismail, Zuraini

    Published 2008
    “…However, at the same time, information technology has raised some ethical issues such as unauthorised access and use of computer systems, software piracy and information privacy. The current development in Information and Communication Technology has impacted all sectors in our daily life technically or routinely. …”
    Book Section
  16. 16

    Awareness to computer ethics : a comparative study of two Malaysian Higher Education Institutions by Masrom, Maslin, Ismail, Zuraini, Hussein, Ramlah

    Published 2008
    “…Issues caused by computer technology use such as privacy protection, information gaps and many others basically have three unique characteristics. …”
    Book Section
  17. 17

    Customers' trust in e-commerce: in collective culture setting by Meskaran, Fatemeh, Ismail, Zuraini

    Published 2012
    “…The review process revealed that reputation, security, privacy and type of payment are probable antecedents of trust in collective culture setting. …”
    Book Section
  18. 18

    Acknowledging The Third Gender: Khunsa by Rahim, Rohani Abdul, Yaacob, Mohd Fadhly, Fandi, Fieza Fazlin

    Published 2016
    “…They are marginalized into an edge that had cause distress to their mentality as their privacy and right had been jeopardized. Many human right instruments only protect the right of male and female but failed to identify the right of a Khuntha. …”
    Get full text
    Book Section
  19. 19

    An examination of ethical computer awareness using confirmatory factor models by Masrom, Maslin, Ismail, Zuraini

    Published 2008
    “…However, at the same time information technology has raised some ethical issues such as unauthorised access and use of computer systems, software piracy and information privacy. In today’s world, computers are one of the core technologies, and they have become central to the operations of industry, military, education, research and many others. …”
    Book Section
  20. 20

    STANDy (Standing Bench) / Ahmad Yusri Abu Bakar by Abu Bakar, Ahmad Yusri

    Published 2018
    “…The design was influence by the existing bench but the design has upgraded into a new type of furniture that purpose for a stand resting so the user wouldn't have to seat just lay their back and rest while waiting This design are purpose on the airport area which is KLIA where the waiting seat are limited and people has to seat anywhere while waiting their flight .The design also has been made for a privacy and has an organic and modern concept that suitable for international places like the airport . …”
    Get full text
    Book Section