Zuraini Ismail

Orcid: 0000-0002-2425-1205

According to our database1, Zuraini Ismail authored at least 30 papers between 2009 and 2020.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2020
Healthcare practitioner behaviours that influence unsafe use of hospital information systems.
Health Informatics J., 2020

Safe use of hospital information systems: an evaluation model based on a sociotechnical perspective.
Behav. Inf. Technol., 2020

2019
Sociotechnical factors influencing unsafe use of hospital information systems: A qualitative study in Malaysian government hospitals.
Health Informatics J., 2019

2017
Classification of Third-Party Applications on Facebook to Mitigate Users' Information Leakage.
Proceedings of the Recent Advances in Information Systems and Technologies, 2017

2016
The Impact of the Security Competency on "Self-Efficacy in Information Security" for Effective Health Information Security in Iran.
J. Medical Syst., 2016

Towards designing an EA readiness instrument: A systematic review.
Proceedings of the 4th IEEE International Colloquium on Information Science and Technology, 2016

2015
Classification of antecedents towards safety use of health information technology: A systematic review.
Int. J. Medical Informatics, 2015

Safety Use of Hospital Information Systems: A Preliminary Investigation.
Proceedings of the Knowledge Management in Organizations - 10th International Conference, 2015

2014
Information Privacy Concerns in Electronic Medical Records: A Preliminary Investigation.
Proceedings of the Knowledge Management in Organizations - 9th International Conference, 2014

Understanding Relationship Between Security Culture and Knowledge Management.
Proceedings of the Knowledge Management in Organizations - 9th International Conference, 2014

Botnet evolution: Network traffic indicators.
Proceedings of the 2014 International Symposium on Biometrics and Security Technologies, 2014

Enhanced Web Log Cleaning Algorithm for Web Intrusion Detection.
Proceedings of the Recent Advances in Information and Communication Technology, 2014

2013
Constructing Conceptual Model for Security Culture in Health Information Systems Security Effectiveness.
Proceedings of the Advances in Information Systems and Technologies [WorldCIST'13, 2013

Data Anonymization According to the Combination of Attributes on Social Network Sites.
Proceedings of the Security in Computing and Communications - International Symposium, 2013

A Conceptual Model for Privacy Preferences in Healthcare Environment.
Proceedings of the 8th International Conference on Knowledge Management in Organizations, 2013

Investigation of Key Resistance Factors in Knowledge Sharing Towards Information Security Culture in Healthcare Organization.
Proceedings of the 8th International Conference on Knowledge Management in Organizations, 2013

2012
A Tree Model for Identification of Threats as the First Stage of Risk Assessment in HIS.
J. Information Security, 2012

Adopting a Knowledge Management Concept in Securing the Privacy of Electronic Medical Record Systems.
Proceedings of the 7th International Conference on Knowledge Management in Organizations: Service and Cloud Computing, 2012

Analysis of Applying Enterprise Service Bus Architecture as a Cloud Interoperability and Resource Sharing Platform.
Proceedings of the 7th International Conference on Knowledge Management in Organizations: Service and Cloud Computing, 2012

Customers' trust in e-commerce: In collective culture setting.
Proceedings of the 2012 International Conference on Information Retrieval & Knowledge Management, 2012

Development of Malaysian Digital Forensics Investigator Competency Identification Methods.
Proceedings of the Advanced Machine Learning Technologies and Applications, 2012

2011
Trainees' Competency Based-Assessment Methods in Cyber Forensics Education or Training Programmes - A Review.
Proceedings of the Software Engineering and Computer Systems, 2011

Effectiveness of Using Integrated Algorithm in Preserving Privacy of Social Network Sites Users.
Proceedings of the Digital Information and Communication Technology and Its Applications, 2011

2010
Security threats categories in healthcare information systems.
Health Informatics J., 2010

Fuzzy Based Threat Analysis in Total Hospital Information System.
Proceedings of the Advances in Computer Science and Information Technology, 2010

Safeguarding Malaysia's critical national information infrastructure (CNII) against cyber terrorism: Towards development of a policy framework.
Proceedings of the Sixth International Conference on Information Assurance and Security, 2010

A framework for integrated risk management process using survival analysis approach in information security.
Proceedings of the Sixth International Conference on Information Assurance and Security, 2010

2009
Ethical awareness of computer use among undergraduate students.
SIGCAS Comput. Soc., 2009

Threats to Health Information Security.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009

Threats Identification in Healthcare Information Systems Using Genetic Algorithm and Cox Regression.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009


  Loading...