Corporate computer forensics investigation adoption antecedents in Malaysia's critical information infrastructure agencies

To counteract computer-related crimes that have affected many companies, Computer Forensics, which involves obtaining and analyzing digital information for use as evidence in civil, criminal, or administrative cases, has become a focal point of attention for top management. The objective of this stu...

Full description

Saved in:
Bibliographic Details
Main Authors: Wan Abdullah, Wan Abdul Malek, Hussin, Nurussobah, Ahmad, Mohd Nazir, Samsudin, Ahmad Zam Hariro, Jalil, Abdurrahman
Format: Article
Language:en
Published: Faculty of Information Management 2024
Subjects:
Online Access:https://ir.uitm.edu.my/id/eprint/119992/1/119992.pdf
https://ir.uitm.edu.my/id/eprint/119992/
https://journal.uitm.edu.my/ojs/index.php/JIKM
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:To counteract computer-related crimes that have affected many companies, Computer Forensics, which involves obtaining and analyzing digital information for use as evidence in civil, criminal, or administrative cases, has become a focal point of attention for top management. The objective of this study is to assess Tornatzky's TOE innovation adoption model in relation to the Information Assurance of Corporate Computer Forensics Investigation’s Action Plan among 210 respondents from Malaysia’s Critical Information Infrastructure agencies. The research results demonstrate a strong relationship between the TOE model and the Information Assurance of Corporate Computer Forensics Investigation, specifically in anticipatory, process, and postincident measures, with the exception of Tornatzky’s organizational factor.