Showing 1 - 3 results of 3 for search '"loophole"', query time: 0.05s Refine Results
  1. 1

    Trusting Cloud Computing for Personal Files by Mazlina, Abdul Majid, Jaber, Aws Naser, Mohamad Fadli, Zolkipli, Shahid, Anwar

    Published 2014
    “…In a recent research study concerning current and future (state-of-the-art) cloud security issues, we recognized a substantive number of security loopholes in information technology systems, and devised relevant solutions for such problems. …”
    Get full text
    Conference or Workshop Item
  2. 2

    CASI Method for Improving the Usability of IDS by Mazlina, Abdul Majid, Butt, Saad Masood, Suziyanti, Marjudi, Butt, Shahid Masood, Azura, Onn, Butt, Moaz Masood

    Published 2015
    “…The similarities and differences of usability evaluation methods and usability problems are summarized on the basis of usability factors, current evaluation methods and interfaces loopholes.…”
    Get full text
    Article
  3. 3

    Linking integrity with road pricing cause-and-effect model: A system dynamics simulation approach by Masriah, Mansur, Zetty Ain, Kamaruzzaman, Ahmad Afif, Ahmarofi, Cheng, Jack Kie, Hamirahanim, Abdul Rahman, K. A., Masri, Nadirah, Abdul Rahim, Sarifah Radiah, ShariffS

    Published 2022
    “…As a result, authorities should place a greater emphasis on these loopholes, as they will inevitably result in unexpected changes. …”
    Get full text
    Article