Nurul Nuha Abdul Molok

Learn More
The explosion of online social networking (OSN) in recent years has caused damages to organisations due to leakage of information by their employees. Employees’ social networking behaviour, whether accidental or intentional, provides an opportunity for advanced persistent threats (APT) attackers to realise their social engineering techniques and(More)
IT outsourcing, a mean of acquiring IT resources externally, has become a popular trend worldwide not only among large organizations but also among small and medium-sized enterprises (SMEs). The uptake of IT outsourcing among SMEs in developing countries are noticeable, especially in the context of Malaysia. Knowing the state of preparation by SMEs toward(More)
With the rapid escalation of the online social networking (OSN) use, there have been some high profile cases reported in the media about information leakage by employees that are detrimental to organizations. However, academic literature rarely discusses the impacts of OSN on organizations. This conceptual paper explores employees’ OSN use behaviour that(More)
Despite the benefits of social media to organizations, the pervasive online social networking (OSN) among employees has been reported to be detrimental to organizations. The ubiquity of social technologies makes employees’ professional and personal boundaries unclear, allowing inadvertent leakage of organizational information through the public domain.(More)
The proliferation of online social networking (OSN) in recent years has caused organizations information security threats due to disclosure of information by their employees on their sites. The accessibility of OSN to anyone, at any time, using any devices, causes confidential and sensitive organizational information to be disclosed to unauthorised(More)
This paper discusses employees' information security behavior from the perspective of Islam and provides a behavioral framework that is developed based on the combination of Western contemporary studies and the Islamic principles. In particular, the framework is based on the categorizations of Muslims' behavior and the concepts of rewards and punishment in(More)
Cross-Site Scripting (XSS) and SQL injection are the top vulnerabilities found in web applications. Attacks to these vulnerabilities could have been minimised through placing a good filter before the web application processes the malicious strings. However adversaries could craft variations on the attack strings in such a way that they do not get filtered.(More)
The technological innovation and advancements in smart phones and wireless communication have reformed learning techniques such as Pervasive Learning (P-learning), Mobile Learning (m-learning) and Electronic Learning (e-learning). P-learning is the new form of innovative technologies for learning that occurs at the user’s will at anywhere, anytime and with(More)