Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Muliati Sedek is active.

Publication


Featured researches published by Muliati Sedek.


workshop on information security applications | 2017

Integrating information quality dimensions into information security risk management (ISRM)

Palaniappan Shamala; Rabiah Ahmad; Ali Hussein Zolait; Muliati Sedek

Abstract Information security is becoming an important entity to most organizations due to current trends in information transfer through a borderless and vulnerable world. This gives more concerns and aware organization to apply information security risk management (ISRM) to develop effective and economically-viable control strategies. Even though there are numerous ISRM methods that are readily available, most of the ISRM methods prescribe a similar process that leads to establish a scope of the assessment, collecting information, producing intermediary information, and finally using the collected information to identify their security risks and provide a measured, analyzed security profile of critical information assets. Based on the “garbage in-garbage out” phenomenon, the success of ISRM planning tremendously depends on the quality of input information. However, with the amount, diversity and variety of information available, practitioners can easily deflects with grown information and becoming unmanageable. Therefore this paper contribute as a stepping stone to determine which IQ dimensions constitute the quality of the information throughout the process of gathering information during ISRM. Seems to accurately define the attributes of IQ dimensions, IQ needs to be assessed within the context of its generation. Thus, papers on IQ web were assessed and comparative analysis was conducted to identify the possible dimensions for ISRM. Then, online survey using likert structured questionnaire were distributed among a group of information security practitioners in Malaysia (N = 150). Partial least square (PLS) analysis revealed that dimension accuracy, amount of data, objective, completeness, reliability and verifiability are significantly influence the quality of information gathering for ISRM. These IQ dimensions can guide practitioners in the process of gathering quality and complete information in order to make a plan that leads to a clear direction, and ultimately help to make decisions that lead to success.


International Conference on Knowledge Management in Organizations | 2018

Inclination of Insider Threats’ Mitigation and Implementation: Concurrence View from Malaysian Employees

Mohd Nazer Apau; Muliati Sedek; Rabiah Ahmad

The aim of this paper is to discuss on the insider threat risks and challenges which have been the biggest problem to most organisations. The survey has gauged the employees’ agreements level of recommended practices derived from the “Common Sense Guide to Mitigating Insider Threats” produced by the Software Engineering Institute, Carnegie Mellon University (SEI-CMU). The available research works by Computer Emergency Response Team at Carnegie-Mellon University (CERT) offered an effective and possible approach towards identifying the insider threats risk and challenges by identifying feasible activity for implementation as part of a review process within organisation. The respondents indicate that majority of the companies in Malaysia who participated in the survey are basically agreeable to it and currently implementing the recommended practices. The results suggested that most companies are aware of the threats and ready for effective countermeasures. Three factors i.e. motive, method and opportunity must be recognised, identified and suppressed within the organization boundary. As a conclusion, this research could assist organization to understand the general acceptance of the respondents towards suggested practices and it could be some important facts that finding effective way to implement best practices are the demand for further research.


Procedia - Social and Behavioral Sciences | 2012

Types and Levels of Ubiquitous Technology use among ICT Undergraduates

Muliati Sedek; Rosnaini Mahmud; Habibah Ab. Jalil; Shafee Mohd Daud


World Journal on Educational Technology | 2014

Pattern of Smartphones Utilisation among Engineering Undergraduates

Muliati Sedek


MATEC Web of Conferences | 2018

Motivational Factors in Privacy Protection Behaviour Model for Social Networking

Muliati Sedek; Rabiah Ahmad; Nur Fadzilah Othman


Archive | 2017

Developing integrated profiling framework utilizing complex personality traits domains

Ahmad Rozelan Yunus; Muliati Sedek; Ismail Ibrahim; Mohd Shamsuri Saad


International Conference on Humanities and Technology | 2016

Exploring Academician Perceptions on Technology Competency : Preliminary Insights from Technical University

Hidayah Rahmalan; Syed Najmuddin Syed Hassan; Muliati Sedek; Mohd Fauzi Kamarudin; Anidah Robani; Ahmad Rozelan Yunus


Sains Humanika | 2015

A Model on the Use of Ubiquitous Technology (U-Tech) as a Learning Tool

Muliati Sedek; Rosnaini Mahmud; Habibah Ab. Jalil; Shaffee Mohd Daud


World Journal on Educational Technology | 2014

A new model on the use of ubiquitous technology (U-Tech) as a learning tool

Muliati Sedek; Rosnaini Mahmud; Habibah Ab. Jalil; Shaffee Mohd Daud


Archive | 2014

The Development And Validation Of A Framework For Teaching Competencies In Pedagogy Content Knowledge And Instructional Quality

Muliati Sedek; Syed Najmuddin Syed Hassan; Anidah Robani; Mohd Fauzi Kamaruddin

Collaboration


Dive into the Muliati Sedek's collaboration.

Top Co-Authors

Avatar

Rosnaini Mahmud

Universiti Putra Malaysia

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Rabiah Ahmad

Universiti Teknikal Malaysia Melaka

View shared research outputs
Top Co-Authors

Avatar

Ahmad Rozelan Yunus

Universiti Teknikal Malaysia Melaka

View shared research outputs
Top Co-Authors

Avatar

Anidah Robani

Universiti Teknikal Malaysia Melaka

View shared research outputs
Top Co-Authors

Avatar

Syed Najmuddin Syed Hassan

Universiti Teknikal Malaysia Melaka

View shared research outputs
Top Co-Authors

Avatar

Hidayah Rahmalan

Universiti Teknikal Malaysia Melaka

View shared research outputs
Top Co-Authors

Avatar

Mohd Fauzi Kamarudin

Universiti Teknikal Malaysia Melaka

View shared research outputs
Top Co-Authors

Avatar

Mohd Nazer Apau

Universiti Teknikal Malaysia Melaka

View shared research outputs
Researchain Logo
Decentralizing Knowledge