Corporate Computer Forensics Investigation Adoption Antecedents in Malaysia's Critical Information Infrastructure Agencies
Uloženo v:
| Název: | Corporate Computer Forensics Investigation Adoption Antecedents in Malaysia's Critical Information Infrastructure Agencies |
|---|---|
| Autoři: | Wan Abdullah, Wan Abdul Malek, Hussin, Nurussobah, Ahmad, Mohd Nazir, Samsudin, Ahmad Zam Hariro, Jalil, Abdurrahman |
| Zdroj: | Journal of Information and Knowledge Management; Vol. 14 No. 2 (2024): October; 127-137 ; 2289-5337 ; 2231-8836 ; 10.24191/jikm.v14i2 |
| Informace o vydavateli: | UiTM Press |
| Rok vydání: | 2024 |
| Témata: | computer forensic investigation, digital information management, criminal evidence, computer crime, information management |
| Popis: | To counteract computer-related crimes that have affected many companies, Computer Forensics, which involves obtaining and analyzing digital information for use as evidence in civil, criminal, or administrative cases, has become a focal point of attention for top management. The objective of this study is to assess Tornatzky's TOE innovation adoption model in relation to the Information Assurance of Corporate Computer Forensics Investigation’s Action Plan among 210 respondents from Malaysia’s Critical Information Infrastructure agencies. The research results demonstrate a strong relationship between the TOE model and the Information Assurance of Corporate Computer Forensics Investigation, specifically in anticipatory, process, and postincident measures, with the exception of Tornatzky’s organizational factor. |
| Druh dokumentu: | article in journal/newspaper |
| Popis souboru: | application/pdf |
| Jazyk: | English |
| Relation: | https://journal.uitm.edu.my/ojs/index.php/JIKM/article/view/4474/2442; https://journal.uitm.edu.my/ojs/index.php/JIKM/article/view/4474 |
| DOI: | 10.24191/jikm.v14i2.4474 |
| Dostupnost: | https://journal.uitm.edu.my/ojs/index.php/JIKM/article/view/4474 https://doi.org/10.24191/jikm.v14i2.4474 |
| Rights: | Copyright (c) 2024 Wan Abdul Malek Wan Abdullah, Nurussobah Hussin, Mohd Nazir Ahmad, Ahmad Zam Hariro Samsudin, Abdurrahman Jalil ; https://creativecommons.org/licenses/by-nc-nd/4.0 |
| Přístupové číslo: | edsbas.3593AF08 |
| Databáze: | BASE |
| FullText | Text: Availability: 0 CustomLinks: – Url: https://journal.uitm.edu.my/ojs/index.php/JIKM/article/view/4474# Name: EDS - BASE (s4221598) Category: fullText Text: View record from BASE – Url: https://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=EBSCO&SrcAuth=EBSCO&DestApp=WOS&ServiceName=TransferToWoS&DestLinkType=GeneralSearchSummary&Func=Links&author=Abdullah%20W Name: ISI Category: fullText Text: Nájsť tento článok vo Web of Science Icon: https://imagesrvr.epnet.com/ls/20docs.gif MouseOverText: Nájsť tento článok vo Web of Science |
|---|---|
| Header | DbId: edsbas DbLabel: BASE An: edsbas.3593AF08 RelevancyScore: 969 AccessLevel: 3 PubType: Academic Journal PubTypeId: academicJournal PreciseRelevancyScore: 968.605590820313 |
| IllustrationInfo | |
| Items | – Name: Title Label: Title Group: Ti Data: Corporate Computer Forensics Investigation Adoption Antecedents in Malaysia's Critical Information Infrastructure Agencies – Name: Author Label: Authors Group: Au Data: <searchLink fieldCode="AR" term="%22Wan+Abdullah%2C+Wan+Abdul+Malek%22">Wan Abdullah, Wan Abdul Malek</searchLink><br /><searchLink fieldCode="AR" term="%22Hussin%2C+Nurussobah%22">Hussin, Nurussobah</searchLink><br /><searchLink fieldCode="AR" term="%22Ahmad%2C+Mohd+Nazir%22">Ahmad, Mohd Nazir</searchLink><br /><searchLink fieldCode="AR" term="%22Samsudin%2C+Ahmad+Zam+Hariro%22">Samsudin, Ahmad Zam Hariro</searchLink><br /><searchLink fieldCode="AR" term="%22Jalil%2C+Abdurrahman%22">Jalil, Abdurrahman</searchLink> – Name: TitleSource Label: Source Group: Src Data: Journal of Information and Knowledge Management; Vol. 14 No. 2 (2024): October; 127-137 ; 2289-5337 ; 2231-8836 ; 10.24191/jikm.v14i2 – Name: Publisher Label: Publisher Information Group: PubInfo Data: UiTM Press – Name: DatePubCY Label: Publication Year Group: Date Data: 2024 – Name: Subject Label: Subject Terms Group: Su Data: <searchLink fieldCode="DE" term="%22computer+forensic+investigation%22">computer forensic investigation</searchLink><br /><searchLink fieldCode="DE" term="%22digital+information+management%22">digital information management</searchLink><br /><searchLink fieldCode="DE" term="%22criminal+evidence%22">criminal evidence</searchLink><br /><searchLink fieldCode="DE" term="%22computer+crime%22">computer crime</searchLink><br /><searchLink fieldCode="DE" term="%22information+management%22">information management</searchLink> – Name: Abstract Label: Description Group: Ab Data: To counteract computer-related crimes that have affected many companies, Computer Forensics, which involves obtaining and analyzing digital information for use as evidence in civil, criminal, or administrative cases, has become a focal point of attention for top management. The objective of this study is to assess Tornatzky's TOE innovation adoption model in relation to the Information Assurance of Corporate Computer Forensics Investigation’s Action Plan among 210 respondents from Malaysia’s Critical Information Infrastructure agencies. The research results demonstrate a strong relationship between the TOE model and the Information Assurance of Corporate Computer Forensics Investigation, specifically in anticipatory, process, and postincident measures, with the exception of Tornatzky’s organizational factor. – Name: TypeDocument Label: Document Type Group: TypDoc Data: article in journal/newspaper – Name: Format Label: File Description Group: SrcInfo Data: application/pdf – Name: Language Label: Language Group: Lang Data: English – Name: NoteTitleSource Label: Relation Group: SrcInfo Data: https://journal.uitm.edu.my/ojs/index.php/JIKM/article/view/4474/2442; https://journal.uitm.edu.my/ojs/index.php/JIKM/article/view/4474 – Name: DOI Label: DOI Group: ID Data: 10.24191/jikm.v14i2.4474 – Name: URL Label: Availability Group: URL Data: https://journal.uitm.edu.my/ojs/index.php/JIKM/article/view/4474<br />https://doi.org/10.24191/jikm.v14i2.4474 – Name: Copyright Label: Rights Group: Cpyrght Data: Copyright (c) 2024 Wan Abdul Malek Wan Abdullah, Nurussobah Hussin, Mohd Nazir Ahmad, Ahmad Zam Hariro Samsudin, Abdurrahman Jalil ; https://creativecommons.org/licenses/by-nc-nd/4.0 – Name: AN Label: Accession Number Group: ID Data: edsbas.3593AF08 |
| PLink | https://erproxy.cvtisr.sk/sfx/access?url=https://search.ebscohost.com/login.aspx?direct=true&site=eds-live&db=edsbas&AN=edsbas.3593AF08 |
| RecordInfo | BibRecord: BibEntity: Identifiers: – Type: doi Value: 10.24191/jikm.v14i2.4474 Languages: – Text: English Subjects: – SubjectFull: computer forensic investigation Type: general – SubjectFull: digital information management Type: general – SubjectFull: criminal evidence Type: general – SubjectFull: computer crime Type: general – SubjectFull: information management Type: general Titles: – TitleFull: Corporate Computer Forensics Investigation Adoption Antecedents in Malaysia's Critical Information Infrastructure Agencies Type: main BibRelationships: HasContributorRelationships: – PersonEntity: Name: NameFull: Wan Abdullah, Wan Abdul Malek – PersonEntity: Name: NameFull: Hussin, Nurussobah – PersonEntity: Name: NameFull: Ahmad, Mohd Nazir – PersonEntity: Name: NameFull: Samsudin, Ahmad Zam Hariro – PersonEntity: Name: NameFull: Jalil, Abdurrahman IsPartOfRelationships: – BibEntity: Dates: – D: 01 M: 01 Type: published Y: 2024 Identifiers: – Type: issn-locals Value: edsbas – Type: issn-locals Value: edsbas.oa Titles: – TitleFull: Journal of Information and Knowledge Management; Vol. 14 No. 2 (2024): October; 127-137 ; 2289-5337 ; 2231-8836 ; 10.24191/jikm.v14i2 Type: main |
| ResultId | 1 |
Nájsť tento článok vo Web of Science