Faculties

Faculties

A B C D E F G H I J K L M N O P Q R S T U V W X Y Z


Nurul Nuha Binti Abdul Molok
Assistant Professor

Print CV Email Me

Staff Detail


Dr. Nurul Nuha Abdul Molok is an Assistant Professor at the Department of Information Systems, Kulliyyah of Information and Communication Technology (KICT). She obtained her BSc in Computer Science (Artificial Intelligence) and MSc in Computer Science (Information Systems) from Universiti Malaya. She studied PhD at the University of Melbourne, Australia. Her PhD research focused on the use of social media amongst employees, looking at the potential for leakage of organisational information and its impact to organisations. Previously, she had a short stint (1 year) in the IT industry before joi ... show more

  • DOCTOR OF PHILOSOPHY (INFORMATION SYSTEM SECURITY) - Doctor of Philosophy, University of Melbourne
  • Master of Computer Science - Masters Degree, Universiti Malaya (UM)
  • Bachelor of Computer Science - Bachelor Degree, Universiti Malaya (UM)
  • International Baccalaureate Bilingual Diploma - Diploma, Kolej MARA Banting, Selangor
  • ICT ~ Information, Computer And Communications Technology (ICT) ~ Security System ~ Other Security System n.e.c. - Organizational Information Security
  • ICT ~ Information, Computer And Communications Technology (ICT) ~ Other Information, Computer and Communication Technology (ICT) n.e.c. - Social media use among employees and its impacts to organizational information security
  • Economics, Business And Management ~ Economics, Business And Management ~ Management ~ Management Information System -
  • Economics, Business And Management ~ Economics, Business And Management ~ Technology Management ~ Ethics, Security and Safety - Risk Management
  • 2020 - 2023 Audit and Risk Committee Member, Board of Governors,
  • 2019 - 2020 ,
  • 2019 - 2019 ,
  • 2019 - 2019 Facilitator for the Workshop on Preparation of Mobile Computing Guidelines in the Management of the Public Sector's Official Secrets, Chief Government Security Office, Prime Minister's Department, Malaysia
  • 2018 - 2018 ,
BUSINESS CONTINUITY AND DISASTER RECOVERY 2018/2019
CONTROL AND AUDIT OF INFORMATION SYSTEMS 2017/2018
DISSERTATION 2014/2015
FINAL YEAR PROJECT 1 2019/2020
FINAL YEAR PROJECT I 2007/2008 2008/2009 2013/2014 2014/2015 2016/2017 2017/2018 2020/2021
FINAL YEAR PROJECT II 2007/2008 2008/2009 2015/2016 2016/2017 2019/2020
INDUSTRIAL ATTACHMENT 2013/2014 2014/2015 2015/2016 2016/2017 2017/2018
INFORMATIION SECURITY GOVERNANCE 2019/2020 2020/2021
INFORMATION SECURITY 2015/2016
INFORMATION SECURITY GOVERNANCE 2015/2016 2016/2017 2017/2018 2018/2019
IT SECURITY I 2007/2008 2008/2009 2015/2016
MANAGEMENT INFORMATION SYSTEM 2006/2007 2007/2008 2008/2009 2013/2014 2014/2015 2015/2016 2018/2019
MANAGEMENT OF INFORMATION SECURITY 2019/2020
PRACTICAL TRAINING 2006/2007 2007/2008 2008/2009
PRINCIPLES OF IT SECURITY 2016/2017
RISK MANAGEMENT 2013/2014 2014/2015 2018/2019 2019/2020 2020/2021
In Progress
2020 - Present Kajian Hukum Mengenai Kesan Permainan Digital Terhadap Masyarakat
2019 - Present The Development of Cybersecurity Awareness Model using CTC ? Chaos Theory of Careers for Secondary Schools.
2008 - Present Intelligent Cyberspace Security
Completed
2014 - 2017 A Model for Information Security Risk Management and Auditing Processes in Malaysian Universities
2011 - 2013 Exploring the use of Online Social Networking among Employees in Malaysian Organizations: Looking Potential Threats to Information Security
2007 - 2020 Managing IT Outsourcing Partnership in Malaysia Organizations: Exploring the Perspectives of the Service Receivers Using the Multiple Case Studies Approach
24 November 2015 Best Paper Award. International Islamic University Malaysia - National level.
Article
2020 A systematic literature review of cyber security education models’ implementations. Malaysian Journal of Youth Studies , Edisi Khas 1 (1) pp.1-20
2020 Socio-technical mitigation effort to combat cyber propaganda: a systematic literature mapping. IEEE Access , 8 pp.92929-92944
2019 Persuasive technology in the Islamic perspective: the principles and strategies. International Journal on Perceptive andCognitive Computing (IJPCC) , 5 (2) pp.107-115
2018 A case analysis of securing organisations against information leakage through online social networking. International Journal of Information Management , 43 pp.351-356
2015 Risk assessment model for organizational information security. ARPN Journal of Engineering and Applied Sciences , 10 (23) pp.17607-17613
2012 Online social networking: a source of intelligence for advanced persistent threats. International Journal of Cyber Warfare and Terrorism , 2 (1) pp.1-13
2011 Information Leakage through online social networking: opening the doorway for advanced persistence threats. The Journal of the Australian Institute of Professional Intelligence Officers (AIPIO) , 19 (2) pp.38-55

Conference or Workshop Item

2019 A comparative review of ISMS implementation based on ISO 27000 Series in organizations of different business sectors. In: International Conference Computer Science and Engineering (IC2SE)
2019 Exploring staff perception of InfoSec policy compliance: Palestine Universities empirical study. In: 1st International Conference of Intelligent Computing and Engineering (ICOICE 2019)
2019 Information security policy perceived compliance among staff in Palestine universities: An empirical pilot study. In: 2019 IEEE Jordan International Joint Conference on Electrical Engineering and Information Technology (JEEIT)
2019 Advanced persistent threats awareness and readiness: a case study in Malaysian financial institutions. In: 2018 Cyber Resilience Conference (CRC 2018)
2018 Responsibility-value alignment in information security governance. In: 2018 International Conference on Information and Communication Technology for the Muslim World (ICT4M)
2018 Persuasive technology from Islamic perspective. In: 2018 International Conference on Information and Communication Technology for the Muslim World (ICT4M)
2017 Exploring the factors influencing top management involvement and participation in information security. In: Pacific Asia Conference on Information Systems 2017 (PACIS 2017)
2016 Persuasive technology for improving information security awareness and behavior: literature review. In: 2016 6th International Conference on Information and Communication Technology for The Muslim World (ICT4M 2016)
2016 Information security behavior among employees from the Islamic perspective. In: 2016 6th International Conference on Information and Communication Technology for The Muslim World (ICT4M 2016)
2015 Unintentional information security behavior from the Qur’an and hadith’s perspective. In: International Conference on Islamic Applications in Computer Science and Technology
2015 A conceptual framework for measuring the acceptance of pervasive learning. In: 5th International Conference on Computing and Informatics (ICOCI 2015)
2015 Information security awareness through the use of social media. In: 5th International Conference on Information & Communication Technology for The Muslim World (ICT4M 2014)
2015 Protecting youth from social media risks through information security practices and Islamic principles. In: 3rd International Conference on Islamic Applications in Computer Science And Technology
2013 Disclosure of organizational information on social media: Perspectives from security managers. In: Pacific Asia Conference on Information Systems
2011 Disclosure of organizational information by employees on Facebook: Looking at the potential for information security risks. In: 22nd Australasian Conference on Information Systems (ACIS)
2011 Exploring the use of online social networking by employees: Looking at the potential for information leakage. In: Pacific Asia Conference on Information Systems
2010 Understanding the factors of information leakage through online social networking to safeguard organizational information. In: Australasian Conference for Information Systems
2010 Information leakage through online social networking: Opening the doorway for advanced persistence threats. In: Australian Information Security Management Conference

Book

2010 The information systems integration plan: for satellite remote sensing subsystems. VDM Verlag Dr. Muller . ISBN 3639219635

Book Section