Showing 1 - 9 results of 9 for search '"privacy"', query time: 0.06s Refine Results
  1. 1

    The rights to privacy in Malaysia: an analysis of the existing legal framework / Mohd Zulhelmey Abdullah @ Abd Halim ...[et al.] by Abdullah @ Abd Halim, Mohd Zulhelmey, Kamarudin, Irma, Abu Bakar, Syatirah, Yusoff, Rosnelim

    Published 2009
    “…The rise in the number of privacy invasion practices coupled with the increasing sophistication of information technology and telecommunications nowadays has introduced a new sense of urgency for a greater protection of the right to privacy. …”
    Get full text
    Research Reports
  2. 2

    E-tourism: young consumers’ perceptions on the service quality of tourism related websites / Anderson Ngelambong, Jazira Anuar and Saerah Saien by Ngelambong, Anderson, Anuar, Jazira, Saien, Saerah

    Published 2009
    “…However, the security and privacy, and personalization dimensions deserve considerable attention from online tourism suppliers for further improvement. …”
    Get full text
    Research Reports
  3. 3

    An exploratory survey of online shoppers in Malaysian / Dr Kiranjit Kaur … [et al.] by Kaur, Kiranjit (Associate Professor Dr), Iyer, Mangalam Gopala (Associate Professor), Abdul Jabar, Noraziah, Abdul Hamid, Norliza

    Published 2005
    “…Consumers also feared a lack of privacy and security that may result in their names and addresses being put on unwanted mailing lists, receiving spam mail, and the possible abuse of credit card information given online. …”
    Get full text
    Research Reports
  4. 4

    Credibility on the web: a study of the credibility of consumer information on Malaysian e-commerce websites / Dr. Kiranjit Kaur …[et al.] by Kaur, Kiranjit (Dr.), Iyer, Mangalam Gopala, Abdul Jabar, Noraziah, Abdul Hamid, Norliza

    Published 2004
    “…The results show that the majority of the websites were not credible as they did not contain sufficient information on claims, disclaimers and warnings, guarantees, market coverage, timeliness, source of information/advice, authority and credentials, commercial influences, protection of privacy and personal information, as well as information on cancellation, return, delivery and payment terms, which were considered to be important in assessing credibility. …”
    Get full text
    Research Reports
  5. 5

    Security performance analysis of photography service system / Farah Shazwani Ismail by Ismail, Farah Shazwani

    Published 2019
    “…The purpose of these attacks were conducted is to testing and finding the vulnerabilities of the system because the system deals with the customers’ privacy data which is the photos and the videos owned by the customers. …”
    Get full text
    Research Reports
  6. 6

    Online shopping: an exercise with Malaysian and Thai product and service e-commerce websites / Dr. Kiranjit Kaur … [et al.] by Kaur, Kiranjit (Dr.) Associate Professor, Iyer, Mangalam Gopala (Associate Professor), Abdul Jabar, Noraziah, Abdul Hamid, Norliza

    Published 2005
    “…The study recommends that web traders should provide more easily accessible information on security and privacy issues as well as clear information on cancellation of orders and refunds to promote shopping online and to build confidence in their consumers. …”
    Get full text
    Research Reports
  7. 7

    Bridging civil society in electronic government participation: a case study in Majlis Perbandaran Sungai Petani Kedah (MPSPK) / Nazni Noordin, Zaherawati Zakaria, Hadzli Ishak by Noordin, Nazni, Zakaria, Zaherawati, Ishak, Hadzli

    Published 2013
    “…On top of that, among three independent variables that tested, which is, security and privacy of e- government application, attitudes of residents towards participation in e-government and effectiveness of e-government, the most dominant factor was attitude of residents. …”
    Get full text
    Research Reports
  8. 8

    Dynamic user management model in interactive networked collaborative environment / Siti Zaleha Zainal Abidin … [et al.] by Zainal Abidin, Siti Zaleha, Omar, Nasiroh, Idrus, Zainura, Idrus, Zanariah

    Published 2012
    “…Furthermore, managing users in virtual space is challenging because it involves security, privacy and permission to information resources.…”
    Get full text
    Research Reports
  9. 9

    Telefon awam untuk kegunaan pelajar (kolej kediaman di universiti) / Mohd Farhan Ahmad Shukri by Ahmad Shukri, Mohd Farhan

    Published 2005
    “…Selain itu juga,terdapat juga masalah yang dihadapi oleh pengguna telefon awam ini,terutamanya oleh pelajar universiti,seperti tiada privacy apabila bercakap,lenguh di pergelangan tangan dan tidak berkonsepkan mesra pengguna.Hal lain yang berkaitan dengan telefon awam ialah masalah ketidakpelbagaian dari segi pembayaran.Pada kebiasaannya telefon awam sekarang menggunakan dua jenis kaedah pembayaran iaitu penggunaan syiling dan kad telefon.Ramai yang mengeluh dan tidak berpuas hati dengan keadaan telefon awam sekarang dan ini dibuktikan lagi dalam penyelidikkan yang dijalankan melalui kaedah soal selidik kepada para pelajar.Rata-rata mereka mencadangkan yang telefon awam yang ada sekarang supaya boleh menerima wang kertas selain dari kaedah konvensional.Mereka juga mencadangkan supaya menukar rekabentuk yang ada sekarang kelihatan lebih menarik dan meggunakan wama yang lebih ceria dan menepati konsep Gaya Hidup Moden’.…”
    Get full text
    Research Reports