Zuraini Ismail
Orcid: 0000-0002-2425-1205
According to our database1,
Zuraini Ismail
authored at least 32 papers
between 2006 and 2020.
Collaborative distances:
Collaborative distances:
Timeline
2006
2008
2010
2012
2014
2016
2018
2020
0
1
2
3
4
5
6
2
1
1
1
1
1
1
1
1
1
4
4
4
2
3
2
1
1
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2020
Healthcare practitioner behaviours that influence unsafe use of hospital information systems.
Health Informatics J., 2020
Safe use of hospital information systems: an evaluation model based on a sociotechnical perspective.
Behav. Inf. Technol., 2020
2019
Sociotechnical factors influencing unsafe use of hospital information systems: A qualitative study in Malaysian government hospitals.
Health Informatics J., 2019
2017
Classification of Third-Party Applications on Facebook to Mitigate Users' Information Leakage.
Proceedings of the Recent Advances in Information Systems and Technologies, 2017
2016
The Impact of the Security Competency on "Self-Efficacy in Information Security" for Effective Health Information Security in Iran.
J. Medical Syst., 2016
Proceedings of the 4th IEEE International Colloquium on Information Science and Technology, 2016
2015
Classification of antecedents towards safety use of health information technology: A systematic review.
Int. J. Medical Informatics, 2015
Proceedings of the Knowledge Management in Organizations - 10th International Conference, 2015
2014
Information Privacy Concerns in Electronic Medical Records: A Preliminary Investigation.
Proceedings of the Knowledge Management in Organizations - 9th International Conference, 2014
Proceedings of the Knowledge Management in Organizations - 9th International Conference, 2014
Proceedings of the 2014 International Symposium on Biometrics and Security Technologies, 2014
Proceedings of the Recent Advances in Information and Communication Technology, 2014
2013
Constructing Conceptual Model for Security Culture in Health Information Systems Security Effectiveness.
Proceedings of the Advances in Information Systems and Technologies [WorldCIST'13, 2013
Data Anonymization According to the Combination of Attributes on Social Network Sites.
Proceedings of the Security in Computing and Communications - International Symposium, 2013
Proceedings of the 8th International Conference on Knowledge Management in Organizations, 2013
Investigation of Key Resistance Factors in Knowledge Sharing Towards Information Security Culture in Healthcare Organization.
Proceedings of the 8th International Conference on Knowledge Management in Organizations, 2013
2012
A Tree Model for Identification of Threats as the First Stage of Risk Assessment in HIS.
J. Information Security, 2012
Adopting a Knowledge Management Concept in Securing the Privacy of Electronic Medical Record Systems.
Proceedings of the 7th International Conference on Knowledge Management in Organizations: Service and Cloud Computing, 2012
Analysis of Applying Enterprise Service Bus Architecture as a Cloud Interoperability and Resource Sharing Platform.
Proceedings of the 7th International Conference on Knowledge Management in Organizations: Service and Cloud Computing, 2012
Proceedings of the 2012 International Conference on Information Retrieval & Knowledge Management, 2012
Development of Malaysian Digital Forensics Investigator Competency Identification Methods.
Proceedings of the Advanced Machine Learning Technologies and Applications, 2012
2011
Trainees' Competency Based-Assessment Methods in Cyber Forensics Education or Training Programmes - A Review.
Proceedings of the Software Engineering and Computer Systems, 2011
Effectiveness of Using Integrated Algorithm in Preserving Privacy of Social Network Sites Users.
Proceedings of the Digital Information and Communication Technology and Its Applications, 2011
2010
Health Informatics J., 2010
Proceedings of the Advances in Computer Science and Information Technology, 2010
Safeguarding Malaysia's critical national information infrastructure (CNII) against cyber terrorism: Towards development of a policy framework.
Proceedings of the Sixth International Conference on Information Assurance and Security, 2010
A framework for integrated risk management process using survival analysis approach in information security.
Proceedings of the Sixth International Conference on Information Assurance and Security, 2010
2009
SIGCAS Comput. Soc., 2009
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009
Threats Identification in Healthcare Information Systems Using Genetic Algorithm and Cox Regression.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009
2008
Computer Ethics Awareness Among Undergraduate Students in Malaysian Higher Education Institutions.
Proceedings of the Australasian Conference on Information Systems, 2008
2006
Proceedings of the Australasian Conference on Information Systems, 2006