Search Results - "Norhashim, Mariati"
-
1
Predictors of Employees’ Mobile Security Practice: An Analysis of Personal and Work-Related Variables
Published in Applied sciences (01-05-2022)“…Personal mobile devices form an integral part of business activities today. Mobile devices, nevertheless, pose various security issues and data privacy…”
Get full text
Journal Article -
2
Bank Concentration and Financial Risk in Jordan
Published in Montenegrin journal of economics (01-09-2020)“…The main aim of this paper is to investigate the relationship between bank concentration and bank risk in the Jordanian banking industry from 2005 to 2016…”
Get full text
Journal Article -
3
Investigating the business performance on the financial well-being of the Government retirees
Published in SHS web of conferences (2021)“…Population ageing; where there is growth in the percentage of older persons in the population; is becoming a worldwide phenomenon due to better healthcare and…”
Get full text
Journal Article -
4
Security monitoring and information security assurance behaviour among employees: An empirical analysis
Published in Information and computer security (12-06-2019)Get full text
Journal Article -
5
Cluster-Based Policy Making: Assessing Performance and Sustaining Competitiveness
Published in The Review of policy research (01-07-2008)“…Tremendous changes in technology, political and social frameworks, as well as the impacts of globalization, have put pressure on countries to become…”
Get full text
Journal Article -
6
Smart Partnership or Cronyism? A Malysian Perspective
Published in International journal of sociology and social policy (01-01-2005)“…Proposes that, arms length economic system (ALS) is not always appropriate for developing nations. The alternative of a relationship based system (RBS) which…”
Get full text
Journal Article -
7
Smart Partnership or Cronyism? A Malaysian Perspective
Published in International journal of sociology and social policy (01-01-2005)“…Proposes that, arms length economic system (ALS) is not always appropriate for developing nations. The alternative of a relationship based system (RBS) which…”
Get full text
Journal Article -
8
A typology of employees' information security behaviour
Published in 2016 4th International Conference on Information and Communication Technology (ICoICT) (01-05-2016)“…This study maps the typology of employee's information security behavior and links it to their knowledge of information security. A survey of the knowledge and…”
Get full text
Conference Proceeding