-
1
Citizen-centric privacy requirements engineering framework / Nor Asiakin Hasbullah
Published 2018“…Currently, the citizencentric perspective of privacy requirement is not well understood. To fill this gap, this research undertook a study with the objectives of (i) To investigate the availability and the content of privacy policy in e-government websites (ii) To investigate citizen’s privacy perception through their privacy concern and willingness to participate in public opinion platform (iii) To investigate citizen’s privacy requirement’s and need through their privacy preferences (iv) To propose citizencentric privacy requirements engineering framework by facilitating citizen engagement in fulfilling citizen privacy requirements. …”
Get full text
Book Section -
2
Children's online privacy protection: a comparative study between the acts in Malaysia with the Children's Online Privacy Protection Act (COPPA) 1998 / Nur Fasihah Shahrol Azam, Nur Izzati Mohd Hamdi and Nabila Abdullah.
Published 2013“…Although there are many laws that defines, govern and protect the activity of children and their legal rights and their online activity of the Malaysian internet users, none of them fills in the need of protection of the children's online privacy protection. Thus, in enhancing the laws that has been implemented, several provisions need to be inserted to overcome this lacuna. …”
Get full text
Student Project -
3
A comparative study on law governing invasion of privacy / Ahmad Faiz Razali... [ et al. ]
Published 2013“…This paper looks into the protection towards privacy in Malaysia, specifically physical and territorial privacy. …”
Get full text
Student Project -
4
A new technical framework for security, trust and privacy (STP) of RFID system / Mohd Faizal Mubarak
Published 2015“…We examined past works on RFID with privacy-preserving solutions dealing with issues on system integrity and availability. …”
Get full text
Thesis -
5
A new technical framework for security, trust and privacy (STP) of RFID system / Mohd Faizal Mubarak
Published 2015“…We examined past works on RFID with privacy-preserving solutions dealing with issues on system integrity and availability. …”
Get full text
Book Section -
6
The right to privacy in relation to the mass media: An analysis of the Malaysian position / Nurul Azureen Ahsin … [et al.]
Published 2011“…The right of privacy has been the subject of dispute for centuries. …”
Get full text
Student Project -
7
The rights to privacy in Malaysia: an analysis of the existing legal framework / Mohd Zulhelmey Abdullah @ Abd Halim ...[et al.]
Published 2009“…The rise in the number of privacy invasion practices coupled with the increasing sophistication of information technology and telecommunications nowadays has introduced a new sense of urgency for a greater protection of the right to privacy. …”
Get full text
Research Reports -
8
Digital privacy awareness among selected millennials in Kuala Lumpur and Selangor / Raja Nur Syafiqah Raja Nazarruddin
Published 2019“…Digital privacy is now a large part of concern in digital age. …”
Get full text
Student Project -
9
The conflict between national security and individual privacy rights in Malaysia – Where do the courts stand? / Md. Zubair Kasem Khan
Published 2015“…These technology-based measures are however also a cause of concern among Malaysians when it comes to individual privacy rights. This paper attempts to conceptualize the divergent notions of privacy and security and to justify the need for these two opposing notions in respect of electronic-based security measures in both public and private premises in Malaysia. …”
Get full text
Article -
10
Data security, control and privacy management of facebook usage among undergraduate students / Mohamad Ridhuan Mat Dangi … [et al.]
Published 2016“…This study was conducted on 290 respondents on a particular university regarding their Facebook usage upon data security and privacy control. A non-experimental research, particularly descriptive research and correlational research were applied in order to identify whether privacy and data security concerns, perceived privacy control and privacy concerns have a relationship with individual privacy management. …”
Get full text
Article -
11
A study on the need of a specific legislation governing rights of privacy in Malaysia / Nur Syamimi Liyana Nazmi … [et al.]
Published 2013“…Privacy is one of the top issues or rather controversial in our Malaysian legal branch nowadays. …”
Get full text
Student Project -
12
Contemporary legal issues in relation to selected aspect of invasion of privacy in Malaysia / Mohd Fahmi Abu Fatah Sanusi ... [et al.]
Published 2009“…The research that was conducted is on the comparison of the law or privacy. The research looks into the various privacy issues which most impact on our daily lives, that relating to email, Mykad, photograph and media reporting. …”
Get full text
Student Project -
13
Ehancing security and privacy in local area network with TORVPN using : raspberry pi as access point / Mohamad AfiqHakimi Rosli
Published 2019“…Hence, the combination of Tor and VPN service was the best creation and method that needed for a normal user to enhance its security and privacy inside local area network while surfing over the Internet. …”
Get full text
Thesis -
14
The effect of attitudes, subjective norms and perceived security and privacy on the use of SMS banking among bank customers in Johor / Nur Nabila Husna Zanal Abdin
Published 2019“…This study is conduct with several variables which are attitudes, subjective norms and perceived security and privacy that affect the intention to use SMS banking. …”
Get full text
Student Project -
15
Public figures rights to privacy: a legal perspectives / Aida Najihah Mhd Nazli, Siti Nur Farrah Abdul Rahman, Siti Syuhada Mohd Isa
Published 2009“…The individual's right to privacy is a fundamental human right. They are still subjected to the protection of rights same as the ordinary people. …”
Get full text
Student Project -
16
Impact of ICT on Privacy and Personal Data Protection in Two Malaysian Academic Libraries / Nurul Azurah Mohd Roni, Mohd Kamal Mohd Napiah and Basri Hassan
Published 2011“…The finding also shows that library users were aware about their privacy and personal data protection and they realize that their privacy and personal data protection were threatened.…”
Get full text
Conference or Workshop Item -
17
Ethical issues pertaining to 'Student RFID Tag' / Norhamiza Yarani
Published 2006“…The results are students do care about their privacy and health and also hope that the implementation of RFID tag will not violate their privacy. …”
Get full text
Thesis -
18
Customer satisfaction towards the service quality of internet banking in Standard Chartered / Raniza Abdul Razak
Published 2010“…The service quality factors that have been measured are efficiency, reliability, responsiveness, fulfillment and privacy. Based on the respondents’ feedback, fulfillment and privacy are the factors that have the highest mean, with 3.9643 while efficiency is at the lowest with average mean, 3.5619. …”
Get full text
Student Project -
19
Modified shielding function for multi-biometric authentication and template protection / Abayomi Jegede... [et al.]
Published 2017“…However, unprotected biometric data can be used to violate the security of the authentication system and the privacy of legitimate users. This paper proposes and implements a modified shielding function which provides multi-biometric authentication, template security and user privacy simultaneously. …”
Get full text
Article -
20
Willingness to use e-government services in Ministry Of Higher Education Malaysia / Amilatul Azwa Kamaruzaman
Published 2017“…There are four variables that was highlighted in this study which are security and privacy, human computer literate and website design. …”
Get full text
Student Project