Unintentional information security behavior from the Qur’an and hadith’s perspective

As the world becomes more interconnected now than decades ago, information security incidents are more prevalent in organizations. The incidents are more likely caused by insiders and they can happen with or without intentions. Although some security studies state that unintentional security inciden...

Full description

Saved in:
Bibliographic Details
Main Authors: Barzak, Omar Mokhles, Abdul Molok , Nurul Nuha, Talib, Shuhaili, Mahmud, Murni
Format: Conference or Workshop Item
Language:English
English
Published: 2015
Subjects:
Online Access:http://irep.iium.edu.my/47341/1/Barzak%2C_Abdul_Molok%2C_Talib_%26_Mahmud_2015_-_Unintentional_information_security_behavior.pdf
http://irep.iium.edu.my/47341/4/IMAN2015_Program_v12.pdf
http://irep.iium.edu.my/47341/
http://unitech-kl.com/iman/program.html#
Tags: Add Tag
No Tags, Be the first to tag this record!
id my.iium.irep.47341
record_format dspace
spelling my.iium.irep.473412016-01-21T03:38:01Z http://irep.iium.edu.my/47341/ Unintentional information security behavior from the Qur’an and hadith’s perspective Barzak, Omar Mokhles Abdul Molok , Nurul Nuha Talib, Shuhaili Mahmud, Murni BP173.77 Islam and work T58.6 Management information systems As the world becomes more interconnected now than decades ago, information security incidents are more prevalent in organizations. The incidents are more likely caused by insiders and they can happen with or without intentions. Although some security studies state that unintentional security incidents could cause more damages to organizational information systems (IS) than intentional security incidents, The research in this area is still limited. This paper focuses on unintentional employees’ behaviors that have impacts on organizational information security, rather than unintentional behaviors in general IT practices. It explores unintentional information security behavior based on the perspective of the Qur’an and Hadith. Moreover, it provides some recommendations based on academic studies and Sharia teachings to overcome unintentional information security behavior. This paper starts with the discussion on information security behavior, human intentions based on the Sharia, and unintentional behavior under Islamic perspective. Finally, the significant of the study relies on the recommendation to reduce unintentional security threats based on information security studies and Sharia teachings by proposing a model to understand unintentional information security behavior and the factors that affect them. 2015 Conference or Workshop Item REM application/pdf en http://irep.iium.edu.my/47341/1/Barzak%2C_Abdul_Molok%2C_Talib_%26_Mahmud_2015_-_Unintentional_information_security_behavior.pdf application/pdf en http://irep.iium.edu.my/47341/4/IMAN2015_Program_v12.pdf Barzak, Omar Mokhles and Abdul Molok , Nurul Nuha and Talib, Shuhaili and Mahmud, Murni (2015) Unintentional information security behavior from the Qur’an and hadith’s perspective. In: International Conference on Islamic Applications in Computer Science and Technology, 1 ‐ 3 October 2015, Konya, Turkey. (Unpublished) http://unitech-kl.com/iman/program.html#
institution Universiti Islam Antarabangsa Malaysia
building IIUM Library
collection Institutional Repository
continent Asia
country Malaysia
content_provider International Islamic University Malaysia
content_source IIUM Repository (IREP)
url_provider http://irep.iium.edu.my/
language English
English
topic BP173.77 Islam and work
T58.6 Management information systems
spellingShingle BP173.77 Islam and work
T58.6 Management information systems
Barzak, Omar Mokhles
Abdul Molok , Nurul Nuha
Talib, Shuhaili
Mahmud, Murni
Unintentional information security behavior from the Qur’an and hadith’s perspective
description As the world becomes more interconnected now than decades ago, information security incidents are more prevalent in organizations. The incidents are more likely caused by insiders and they can happen with or without intentions. Although some security studies state that unintentional security incidents could cause more damages to organizational information systems (IS) than intentional security incidents, The research in this area is still limited. This paper focuses on unintentional employees’ behaviors that have impacts on organizational information security, rather than unintentional behaviors in general IT practices. It explores unintentional information security behavior based on the perspective of the Qur’an and Hadith. Moreover, it provides some recommendations based on academic studies and Sharia teachings to overcome unintentional information security behavior. This paper starts with the discussion on information security behavior, human intentions based on the Sharia, and unintentional behavior under Islamic perspective. Finally, the significant of the study relies on the recommendation to reduce unintentional security threats based on information security studies and Sharia teachings by proposing a model to understand unintentional information security behavior and the factors that affect them.
format Conference or Workshop Item
author Barzak, Omar Mokhles
Abdul Molok , Nurul Nuha
Talib, Shuhaili
Mahmud, Murni
author_facet Barzak, Omar Mokhles
Abdul Molok , Nurul Nuha
Talib, Shuhaili
Mahmud, Murni
author_sort Barzak, Omar Mokhles
title Unintentional information security behavior from the Qur’an and hadith’s perspective
title_short Unintentional information security behavior from the Qur’an and hadith’s perspective
title_full Unintentional information security behavior from the Qur’an and hadith’s perspective
title_fullStr Unintentional information security behavior from the Qur’an and hadith’s perspective
title_full_unstemmed Unintentional information security behavior from the Qur’an and hadith’s perspective
title_sort unintentional information security behavior from the qur’an and hadith’s perspective
publishDate 2015
url http://irep.iium.edu.my/47341/1/Barzak%2C_Abdul_Molok%2C_Talib_%26_Mahmud_2015_-_Unintentional_information_security_behavior.pdf
http://irep.iium.edu.my/47341/4/IMAN2015_Program_v12.pdf
http://irep.iium.edu.my/47341/
http://unitech-kl.com/iman/program.html#
_version_ 1643613172744060928
score 13.211869