Showing 1 - 20 results of 118 for search '"privacy"', query time: 0.08s Refine Results
  1. 1

    Citizen-centric privacy requirements engineering framework / Nor Asiakin Hasbullah by Hasbullah, Nor Asiakin

    Published 2018
    “…Currently, the citizencentric perspective of privacy requirement is not well understood. To fill this gap, this research undertook a study with the objectives of (i) To investigate the availability and the content of privacy policy in e-government websites (ii) To investigate citizen’s privacy perception through their privacy concern and willingness to participate in public opinion platform (iii) To investigate citizen’s privacy requirement’s and need through their privacy preferences (iv) To propose citizencentric privacy requirements engineering framework by facilitating citizen engagement in fulfilling citizen privacy requirements. …”
    Get full text
    Book Section
  2. 2

    Children's online privacy protection: a comparative study between the acts in Malaysia with the Children's Online Privacy Protection Act (COPPA) 1998 / Nur Fasihah Shahrol Azam, Nur Izzati Mohd Hamdi and Nabila Abdullah. by Shahrol Azam, Nur Fasihah, Mohd Hamdi, Nur Izzati, Abdullah, Nabila

    Published 2013
    “…Although there are many laws that defines, govern and protect the activity of children and their legal rights and their online activity of the Malaysian internet users, none of them fills in the need of protection of the children's online privacy protection. Thus, in enhancing the laws that has been implemented, several provisions need to be inserted to overcome this lacuna. …”
    Get full text
    Student Project
  3. 3

    A comparative study on law governing invasion of privacy / Ahmad Faiz Razali... [ et al. ] by Razali, Ahmad Faiz, Faiz, Farhan Zafry, Johari, Joaina, Shaped, Khairul Ikhwan

    Published 2013
    “…This paper looks into the protection towards privacy in Malaysia, specifically physical and territorial privacy. …”
    Get full text
    Student Project
  4. 4

    A new technical framework for security, trust and privacy (STP) of RFID system / Mohd Faizal Mubarak by Mubarak, Mohd Faizal

    Published 2015
    “…We examined past works on RFID with privacy-preserving solutions dealing with issues on system integrity and availability. …”
    Get full text
    Thesis
  5. 5

    A new technical framework for security, trust and privacy (STP) of RFID system / Mohd Faizal Mubarak by Mubarak, Mohd Faizal

    Published 2015
    “…We examined past works on RFID with privacy-preserving solutions dealing with issues on system integrity and availability. …”
    Get full text
    Book Section
  6. 6
  7. 7

    The rights to privacy in Malaysia: an analysis of the existing legal framework / Mohd Zulhelmey Abdullah @ Abd Halim ...[et al.] by Abdullah @ Abd Halim, Mohd Zulhelmey, Kamarudin, Irma, Abu Bakar, Syatirah, Yusoff, Rosnelim

    Published 2009
    “…The rise in the number of privacy invasion practices coupled with the increasing sophistication of information technology and telecommunications nowadays has introduced a new sense of urgency for a greater protection of the right to privacy. …”
    Get full text
    Research Reports
  8. 8
  9. 9

    The conflict between national security and individual privacy rights in Malaysia – Where do the courts stand? / Md. Zubair Kasem Khan by Kasem Khan, Md. Zubair

    Published 2015
    “…These technology-based measures are however also a cause of concern among Malaysians when it comes to individual privacy rights. This paper attempts to conceptualize the divergent notions of privacy and security and to justify the need for these two opposing notions in respect of electronic-based security measures in both public and private premises in Malaysia. …”
    Get full text
    Article
  10. 10

    Data security, control and privacy management of facebook usage among undergraduate students / Mohamad Ridhuan Mat Dangi … [et al.] by Mat Dangi, Mohamad Ridhuan

    Published 2016
    “…This study was conducted on 290 respondents on a particular university regarding their Facebook usage upon data security and privacy control. A non-experimental research, particularly descriptive research and correlational research were applied in order to identify whether privacy and data security concerns, perceived privacy control and privacy concerns have a relationship with individual privacy management. …”
    Get full text
    Article
  11. 11
  12. 12

    Contemporary legal issues in relation to selected aspect of invasion of privacy in Malaysia / Mohd Fahmi Abu Fatah Sanusi ... [et al.] by Abu Fatah Sanusi, Mohd Fahmi, Ahmad Hazizi, 'Ainul Yaqeen, Ismam, Malissa Idayu, Mohd Daud, Noor Amalina

    Published 2009
    “…The research that was conducted is on the comparison of the law or privacy. The research looks into the various privacy issues which most impact on our daily lives, that relating to email, Mykad, photograph and media reporting. …”
    Get full text
    Student Project
  13. 13

    Ehancing security and privacy in local area network with TORVPN using : raspberry pi as access point / Mohamad AfiqHakimi Rosli by Rosli, Mohamad AfiqHakimi

    Published 2019
    “…Hence, the combination of Tor and VPN service was the best creation and method that needed for a normal user to enhance its security and privacy inside local area network while surfing over the Internet. …”
    Get full text
    Thesis
  14. 14

    The effect of attitudes, subjective norms and perceived security and privacy on the use of SMS banking among bank customers in Johor / Nur Nabila Husna Zanal Abdin by Zanal Abdin, Nur Nabila Husna

    Published 2019
    “…This study is conduct with several variables which are attitudes, subjective norms and perceived security and privacy that affect the intention to use SMS banking. …”
    Get full text
    Student Project
  15. 15

    Public figures rights to privacy: a legal perspectives / Aida Najihah Mhd Nazli, Siti Nur Farrah Abdul Rahman, Siti Syuhada Mohd Isa by Mhd Nazli, Aida Najihah, Abdul Rahman, Siti Nur Farrah, Mohd Isa, Siti Syuhada

    Published 2009
    “…The individual's right to privacy is a fundamental human right. They are still subjected to the protection of rights same as the ordinary people. …”
    Get full text
    Student Project
  16. 16

    Impact of ICT on Privacy and Personal Data Protection in Two Malaysian Academic Libraries / Nurul Azurah Mohd Roni, Mohd Kamal Mohd Napiah and Basri Hassan by Mohd Roni, Nurul Azurah, Mohd Napiah, Mohd Kamal, Hassan, Basri

    Published 2011
    “…The finding also shows that library users were aware about their privacy and personal data protection and they realize that their privacy and personal data protection were threatened.…”
    Get full text
    Conference or Workshop Item
  17. 17

    Ethical issues pertaining to 'Student RFID Tag' / Norhamiza Yarani by Yarani, Norhamiza

    Published 2006
    “…The results are students do care about their privacy and health and also hope that the implementation of RFID tag will not violate their privacy. …”
    Get full text
    Thesis
  18. 18

    Customer satisfaction towards the service quality of internet banking in Standard Chartered / Raniza Abdul Razak by Abdul Razak, Raniza

    Published 2010
    “…The service quality factors that have been measured are efficiency, reliability, responsiveness, fulfillment and privacy. Based on the respondents’ feedback, fulfillment and privacy are the factors that have the highest mean, with 3.9643 while efficiency is at the lowest with average mean, 3.5619. …”
    Get full text
    Student Project
  19. 19

    Modified shielding function for multi-biometric authentication and template protection / Abayomi Jegede... [et al.] by Jegede, Abayomi, Udzir, Nur Izura, Abdullah, Azizol, Mahmod, Ramlan

    Published 2017
    “…However, unprotected biometric data can be used to violate the security of the authentication system and the privacy of legitimate users. This paper proposes and implements a modified shielding function which provides multi-biometric authentication, template security and user privacy simultaneously. …”
    Get full text
    Article
  20. 20

    Willingness to use e-government services in Ministry Of Higher Education Malaysia / Amilatul Azwa Kamaruzaman by Kamaruzaman, Amilatul Azwa

    Published 2017
    “…There are four variables that was highlighted in this study which are security and privacy, human computer literate and website design. …”
    Get full text
    Student Project