Transformative cyber security model for Malaysian government agencies

5Citations
Citations of this article
59Readers
Mendeley users who have this article in their library.

Abstract

The growth of cyberspace world has uprising government agencies in a new way to serve citizen in a proactive, efficient and productive manner. To have an open, stable and vibrant cyberspace, governments should be more resilient to cyber-attacks and able to protect all government agency's interest in cyberspace. Therefore, the government needs a transformative cyber governance security model to protect valuable government agencies' information. The model should be able to detect, defend and deter the vulnerabilities, threats and risks that will emerge in the day to day government administration operation. This paper has introduced a study for some existing cyber governance security models. Thus, it helps in determining the main features of the required model.

References Powered by Scopus

The role of extra-role behaviors and social controls in information security policy effectiveness

196Citations
N/AReaders
Get full text

What do we know about cyber risk and cyber risk insurance?

128Citations
N/AReaders
Get full text

Interpreting information security culture: An organizational transformation case study

56Citations
N/AReaders
Get full text

Cited by Powered by Scopus

The cybersecurity governance in changing the security psychology and security posture: Insights into e-procurement

14Citations
N/AReaders
Get full text

Best practice framework for information technology security governance in Indonesian government

2Citations
N/AReaders
Get full text

Governing Cyber Espionage Threats via the Integration of the Risk Society-Cyber Securitisation Theory

2Citations
N/AReaders
Get full text

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Cite

CITATION STYLE

APA

Perumal, S., Pitchay, S. A., Samy, G. N., Shanmugam, B., Magalingam, P., & Albakri, S. H. (2018). Transformative cyber security model for Malaysian government agencies. International Journal of Engineering and Technology(UAE), 7(4), 87–92. https://doi.org/10.14419/ijet.v7i4.15.21377

Readers' Seniority

Tooltip

PhD / Post grad / Masters / Doc 19

68%

Lecturer / Post doc 7

25%

Professor / Associate Prof. 1

4%

Researcher 1

4%

Readers' Discipline

Tooltip

Computer Science 18

60%

Social Sciences 5

17%

Business, Management and Accounting 5

17%

Chemistry 2

7%

Save time finding and organizing research with Mendeley

Sign up for free