Mariana Yusoff
Universiti Teknikal Malaysia Melaka
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Mariana Yusoff.
workshop on information security applications | 2013
Palaniappan Shamala; Rabiah Ahmad; Mariana Yusoff
Information security has become a vital entity to most organizations today due to current trends in information transfer through a borderless and vulnerable world. The concern and interest in information security is mainly due to the fact that information security risk assessment (ISRA) is a vital method to not only to identify and prioritize information assets but also to identify and monitor the specific threats that an organization induces; especially the chances of these threats occurring and their impact on the respective businesses. However, organizations wanting to conduct risk assessment may face problems in selecting suitable methods that would augur well in meeting their needs. This is due to the existence of numerous methodologies that are readily available. However, there is a lack in agreed reference benchmarking as well as in the comparative framework for evaluating these ISRA methods to access the information security risk. Generally, organizations will choose the most appropriate ISRA method by carrying out a comparative study between the available methodologies in detail before a suitable method is selected to conduct the risk assessment. This paper suggests a conceptual framework of info-structure for ISRA that was developed by comparing and analysing six methodologies which are currently available. The info-structure for ISRA aims to assist organizations in getting a general view of ISRA flow, gathering information on the requirements to be met before risk assessment can be conducted successfully. This info-structure can be conveniently used by organizations to complete all the required planning as well as the selection of suitable methods to complete the ISRA.
Journal of Information Security | 2012
Rabiah Ahmad; Zahri Yunos; Shahrin Sahib; Mariana Yusoff
Focus group discussion is an exploratory research technique used to collect data through group interaction. This technique provides the opportunity to observe interaction among participants on a topic under this study. This paper contributes to an understanding on the cyber terrorism conceptual framework through the analysis of focus group discussion. The proposed cyber terrorism conceptual framework which was obtained during the qualitative study by the authors has been used as a basis for discussion in the focus group discussion. Thirty (30) participants took part in the focus group discussion. The overall results suggest that the proposed cyber terrorism framework is acceptable by the participants. The present study supports our initial research that the cyber terrorism conceptual framework constitutes the following components: target, motivation, tools of attack, domain, methods of attack and impact.
science and information conference | 2014
Zahri Yunos; Rabiah Ahmad; Mariana Yusoff
The current framework of cyber terrorism consists of non-tested components which are related to physical terrorism as well as cyber security threats. However, there is no universally accepted definition of cyber terrorism, which seems to be a fundamental issue and challenge in countering threats from cyber terrorism. Grounded theory research begins by focusing on area of study and gathers data from various sources, including literatures, interviews and field observations. A grounded theory study can result in empirically grounded hypothesis that can be further tested and verified with new data using qualitative methodology. In this research, semi-structured interview with purposive sampling procedures is the primary data collection. Twenty-two (22) participants took part in the interview session. The analysis indicated that the framework describing cyber terrorism can be considered from six components: motivation, target, method of attack, domain, action by perpetrator and impact. Continued research in this area can be further conducted, which may lead to the development of strategic and technological framework to counter cyber terrorism.
Archive | 2013
Lokman Abdullah; Zamberi Jamaludin; Qumrul Ahsan; Jailani Jamaludin; Nur Aidawaty Rafan; Chiew Tsung Heng; Kamaruzaman Jusoff; Mariana Yusoff; Hang Tuah Jaya
international conference on digital information management | 2011
Faaizah Shahbodin; Mariana Yusoff; Che Ku Nuraini Che Ku Mohd
Journal of Human Capital Development | 2010
Mariana Yusoff
Archive | 2013
Mohd Azlishah Othman; Siti Rohmah Mohamed Kamaruddin; Kamaruzaman Jusoff; Mohamad Zoinol Abidin Abdul Aziz; Mohd Muzafar Ismail; Hamzah Asyrani Sulaiman; Mohamad Harris Misran; Ridza Azri Ramli; Maizatul Alice Meor Said; Badrul Hisham Ahmad; Zahriladha Zakaria; Mohan Sinnappa; Mariana Yusoff; Shadia Suhaimi
Archive | 2013
Zaheera Zainal Abidin; Mazani Manaf; Abdul Samad Shibghatullah; Kamaruzaman Jusoff; Rabiah Ahmad; Zakiah Ayop; Syarulnaziah Anawar; Azizah Shaaban; Mariana Yusoff
Archive | 2013
S. Thiru; Kamaruzaman Jusoff; Mariana Yusoff; T. Qumrul Ahsan; Azizah Shaaban; Mohd Razali Muhamad; Mohd Fahmi Mohamad Amran; Wan Hasrulnizzam; Mohd Shahir; Mohd Amri; Mohd Warikh; Mohd Rizal; D. Sivakumar; Azman Abdullah; Hang Tuah Jaya
Archive | 2013
Zanariah Jano; Razilah Abdul Rahim; Noridah Abdullah; Khoo Mei Sui Linda; Mei Sui; Yeo Mun Yee; Rabiah Ahmad; Mariana Yusoff; Kamaruzaman Jusoff; Noorli Khamis; Hang Tuah Jaya; Menara Razak