Most universities rely heavily on Information Technology (IT) to process their information and support their vision and mission. This rapid advancement in internet technology leads to increased cyberattacks in Higher Education Institutions (HEIs). To secure their infrastructure from cyberattacks, they must implement the best cybersecurity risk management approach, which involves technological and education-based solutions, to safeguard their environment. However, the main challenges in existing cybersecurity risk management approaches are limited knowledge of how organizations can determine or minimize the significance of risks. As a result, this research seeks to advance understanding to establish a risk assessment model for universities t...
Higher education institutions (HEIs) are increasingly relying on digital technologies for classroom ...
Cyber security has emerged as a critical concern in today's digital age, affecting various sectors a...
M.Com. (Computer Auditing)Abstract: This research investigated the different information technology ...
Most universities rely heavily on Information Technology (IT) to process their information and suppo...
Cybersecurity, as a security management requirement, is essential to understanding data security in ...
Cybersecurity, as a security management requirement, is essential to understanding data security in ...
Universities, like other businesses, use information communication technology (ICT) to promote globa...
Malaysian organizations are following different methods for cybersecurity risk assessment such as Co...
The demands for information security in higher education will continue to increase. Serious data bre...
The demands for information security in higher education will continue to increase. Serious data bre...
Cyber risks, data loss or data leakage, loss exposure are one of the most customer and business sign...
Due to the large volume of data they manage, Higher Education Institutions (HEIs) are perfect target...
With the recent uptake of fiber connectivity, broadband and internet, access has become readily avai...
The COVID-19 pandemic is a disruptive era for the academic emerging technologies as a result of impl...
Information is one of the important and valuable assets for the life of an organization's business. ...
Higher education institutions (HEIs) are increasingly relying on digital technologies for classroom ...
Cyber security has emerged as a critical concern in today's digital age, affecting various sectors a...
M.Com. (Computer Auditing)Abstract: This research investigated the different information technology ...
Most universities rely heavily on Information Technology (IT) to process their information and suppo...
Cybersecurity, as a security management requirement, is essential to understanding data security in ...
Cybersecurity, as a security management requirement, is essential to understanding data security in ...
Universities, like other businesses, use information communication technology (ICT) to promote globa...
Malaysian organizations are following different methods for cybersecurity risk assessment such as Co...
The demands for information security in higher education will continue to increase. Serious data bre...
The demands for information security in higher education will continue to increase. Serious data bre...
Cyber risks, data loss or data leakage, loss exposure are one of the most customer and business sign...
Due to the large volume of data they manage, Higher Education Institutions (HEIs) are perfect target...
With the recent uptake of fiber connectivity, broadband and internet, access has become readily avai...
The COVID-19 pandemic is a disruptive era for the academic emerging technologies as a result of impl...
Information is one of the important and valuable assets for the life of an organization's business. ...
Higher education institutions (HEIs) are increasingly relying on digital technologies for classroom ...
Cyber security has emerged as a critical concern in today's digital age, affecting various sectors a...
M.Com. (Computer Auditing)Abstract: This research investigated the different information technology ...