Corporate Computer Forensics Investigation Adoption Antecedents in Malaysia's Critical Information Infrastructure Agencies

Uloženo v:
Podrobná bibliografie
Název: Corporate Computer Forensics Investigation Adoption Antecedents in Malaysia's Critical Information Infrastructure Agencies
Autoři: Wan Abdullah, Wan Abdul Malek, Hussin, Nurussobah, Ahmad, Mohd Nazir, Samsudin, Ahmad Zam Hariro, Jalil, Abdurrahman
Zdroj: Journal of Information and Knowledge Management; Vol. 14 No. 2 (2024): October; 127-137 ; 2289-5337 ; 2231-8836 ; 10.24191/jikm.v14i2
Informace o vydavateli: UiTM Press
Rok vydání: 2024
Témata: computer forensic investigation, digital information management, criminal evidence, computer crime, information management
Popis: To counteract computer-related crimes that have affected many companies, Computer Forensics, which involves obtaining and analyzing digital information for use as evidence in civil, criminal, or administrative cases, has become a focal point of attention for top management. The objective of this study is to assess Tornatzky's TOE innovation adoption model in relation to the Information Assurance of Corporate Computer Forensics Investigation’s Action Plan among 210 respondents from Malaysia’s Critical Information Infrastructure agencies. The research results demonstrate a strong relationship between the TOE model and the Information Assurance of Corporate Computer Forensics Investigation, specifically in anticipatory, process, and postincident measures, with the exception of Tornatzky’s organizational factor.
Druh dokumentu: article in journal/newspaper
Popis souboru: application/pdf
Jazyk: English
Relation: https://journal.uitm.edu.my/ojs/index.php/JIKM/article/view/4474/2442; https://journal.uitm.edu.my/ojs/index.php/JIKM/article/view/4474
DOI: 10.24191/jikm.v14i2.4474
Dostupnost: https://journal.uitm.edu.my/ojs/index.php/JIKM/article/view/4474
https://doi.org/10.24191/jikm.v14i2.4474
Rights: Copyright (c) 2024 Wan Abdul Malek Wan Abdullah, Nurussobah Hussin, Mohd Nazir Ahmad, Ahmad Zam Hariro Samsudin, Abdurrahman Jalil ; https://creativecommons.org/licenses/by-nc-nd/4.0
Přístupové číslo: edsbas.3593AF08
Databáze: BASE
FullText Text:
  Availability: 0
CustomLinks:
  – Url: https://journal.uitm.edu.my/ojs/index.php/JIKM/article/view/4474#
    Name: EDS - BASE (s4221598)
    Category: fullText
    Text: View record from BASE
  – Url: https://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=EBSCO&SrcAuth=EBSCO&DestApp=WOS&ServiceName=TransferToWoS&DestLinkType=GeneralSearchSummary&Func=Links&author=Abdullah%20W
    Name: ISI
    Category: fullText
    Text: Nájsť tento článok vo Web of Science
    Icon: https://imagesrvr.epnet.com/ls/20docs.gif
    MouseOverText: Nájsť tento článok vo Web of Science
Header DbId: edsbas
DbLabel: BASE
An: edsbas.3593AF08
RelevancyScore: 969
AccessLevel: 3
PubType: Academic Journal
PubTypeId: academicJournal
PreciseRelevancyScore: 968.605590820313
IllustrationInfo
Items – Name: Title
  Label: Title
  Group: Ti
  Data: Corporate Computer Forensics Investigation Adoption Antecedents in Malaysia's Critical Information Infrastructure Agencies
– Name: Author
  Label: Authors
  Group: Au
  Data: <searchLink fieldCode="AR" term="%22Wan+Abdullah%2C+Wan+Abdul+Malek%22">Wan Abdullah, Wan Abdul Malek</searchLink><br /><searchLink fieldCode="AR" term="%22Hussin%2C+Nurussobah%22">Hussin, Nurussobah</searchLink><br /><searchLink fieldCode="AR" term="%22Ahmad%2C+Mohd+Nazir%22">Ahmad, Mohd Nazir</searchLink><br /><searchLink fieldCode="AR" term="%22Samsudin%2C+Ahmad+Zam+Hariro%22">Samsudin, Ahmad Zam Hariro</searchLink><br /><searchLink fieldCode="AR" term="%22Jalil%2C+Abdurrahman%22">Jalil, Abdurrahman</searchLink>
– Name: TitleSource
  Label: Source
  Group: Src
  Data: Journal of Information and Knowledge Management; Vol. 14 No. 2 (2024): October; 127-137 ; 2289-5337 ; 2231-8836 ; 10.24191/jikm.v14i2
– Name: Publisher
  Label: Publisher Information
  Group: PubInfo
  Data: UiTM Press
– Name: DatePubCY
  Label: Publication Year
  Group: Date
  Data: 2024
– Name: Subject
  Label: Subject Terms
  Group: Su
  Data: <searchLink fieldCode="DE" term="%22computer+forensic+investigation%22">computer forensic investigation</searchLink><br /><searchLink fieldCode="DE" term="%22digital+information+management%22">digital information management</searchLink><br /><searchLink fieldCode="DE" term="%22criminal+evidence%22">criminal evidence</searchLink><br /><searchLink fieldCode="DE" term="%22computer+crime%22">computer crime</searchLink><br /><searchLink fieldCode="DE" term="%22information+management%22">information management</searchLink>
– Name: Abstract
  Label: Description
  Group: Ab
  Data: To counteract computer-related crimes that have affected many companies, Computer Forensics, which involves obtaining and analyzing digital information for use as evidence in civil, criminal, or administrative cases, has become a focal point of attention for top management. The objective of this study is to assess Tornatzky's TOE innovation adoption model in relation to the Information Assurance of Corporate Computer Forensics Investigation’s Action Plan among 210 respondents from Malaysia’s Critical Information Infrastructure agencies. The research results demonstrate a strong relationship between the TOE model and the Information Assurance of Corporate Computer Forensics Investigation, specifically in anticipatory, process, and postincident measures, with the exception of Tornatzky’s organizational factor.
– Name: TypeDocument
  Label: Document Type
  Group: TypDoc
  Data: article in journal/newspaper
– Name: Format
  Label: File Description
  Group: SrcInfo
  Data: application/pdf
– Name: Language
  Label: Language
  Group: Lang
  Data: English
– Name: NoteTitleSource
  Label: Relation
  Group: SrcInfo
  Data: https://journal.uitm.edu.my/ojs/index.php/JIKM/article/view/4474/2442; https://journal.uitm.edu.my/ojs/index.php/JIKM/article/view/4474
– Name: DOI
  Label: DOI
  Group: ID
  Data: 10.24191/jikm.v14i2.4474
– Name: URL
  Label: Availability
  Group: URL
  Data: https://journal.uitm.edu.my/ojs/index.php/JIKM/article/view/4474<br />https://doi.org/10.24191/jikm.v14i2.4474
– Name: Copyright
  Label: Rights
  Group: Cpyrght
  Data: Copyright (c) 2024 Wan Abdul Malek Wan Abdullah, Nurussobah Hussin, Mohd Nazir Ahmad, Ahmad Zam Hariro Samsudin, Abdurrahman Jalil ; https://creativecommons.org/licenses/by-nc-nd/4.0
– Name: AN
  Label: Accession Number
  Group: ID
  Data: edsbas.3593AF08
PLink https://erproxy.cvtisr.sk/sfx/access?url=https://search.ebscohost.com/login.aspx?direct=true&site=eds-live&db=edsbas&AN=edsbas.3593AF08
RecordInfo BibRecord:
  BibEntity:
    Identifiers:
      – Type: doi
        Value: 10.24191/jikm.v14i2.4474
    Languages:
      – Text: English
    Subjects:
      – SubjectFull: computer forensic investigation
        Type: general
      – SubjectFull: digital information management
        Type: general
      – SubjectFull: criminal evidence
        Type: general
      – SubjectFull: computer crime
        Type: general
      – SubjectFull: information management
        Type: general
    Titles:
      – TitleFull: Corporate Computer Forensics Investigation Adoption Antecedents in Malaysia's Critical Information Infrastructure Agencies
        Type: main
  BibRelationships:
    HasContributorRelationships:
      – PersonEntity:
          Name:
            NameFull: Wan Abdullah, Wan Abdul Malek
      – PersonEntity:
          Name:
            NameFull: Hussin, Nurussobah
      – PersonEntity:
          Name:
            NameFull: Ahmad, Mohd Nazir
      – PersonEntity:
          Name:
            NameFull: Samsudin, Ahmad Zam Hariro
      – PersonEntity:
          Name:
            NameFull: Jalil, Abdurrahman
    IsPartOfRelationships:
      – BibEntity:
          Dates:
            – D: 01
              M: 01
              Type: published
              Y: 2024
          Identifiers:
            – Type: issn-locals
              Value: edsbas
            – Type: issn-locals
              Value: edsbas.oa
          Titles:
            – TitleFull: Journal of Information and Knowledge Management; Vol. 14 No. 2 (2024): October; 127-137 ; 2289-5337 ; 2231-8836 ; 10.24191/jikm.v14i2
              Type: main
ResultId 1