Page 2 - bookofabstract_vj5_final(1)
P. 2

Table of Content






               Contents
               The Efficiency of Wiping Tools in Media Sanitization ................................................................................... 1
                  Monaliza Sahri, Siti Norul Huda Sheikh Abdulah, Mohd. Firham Efendy Md. Senan & Nooreen Ashilla
                  Yusof

               Towards Compliance Management Automation thru Ontology mapping of Requirements to Activities
               and Controls .................................................................................................................................................. 2
                  Danny C. Cheng, Jod B. Villamarin, Gregory Cu & Nathalie Rose Lim-Cheng

               Information Security Risk Assessment for the Malaysian Aeronautical Information Management System 3
                  Alfian Alwi & Khairul Akram Zainol Ariffin

               Robotic Movement Encryption Using Guaranteed Cellular Automata......................................................... 4
                  Manal Abd Al-Jabbar Ahmad Mizher & Riza Sulaiman

               A Proposed Plan in Legalising Software for Measuring Instruments in Malaysia ........................................ 5
                  Muhammad Azwan Ibrahim, Nazri Marzuki, Zarina Shukur & Nasharuddin Zainal

               Assessment of Self-Identity Among Teens Towards Self-Crime Prevention Program .................................. 6
                  Siti Norul Huda Sheikh Abdullah, Wan Fariza Fauzi, Muhammad Nuruddin Sudin, Nurul Nadhirah
                  Zahari, Zaizul Bin Ab Rahman, A`Dawiyah Ismail, Nur Riza Mohd. Suradi & Azmin Sham Rambely
               Cyber Security Situational Awareness among Parents ................................................................................. 7

                  Nazilah Ahmad, Umi Asma’ Mokhtar, Zulaiha Ali Othman & Siti Norul Huda Sheikh Abdullah

               Security Assessment of Libyan Government Websites................................................................................. 8
                  Abdullah Ahmed Ali & Mohd Zamri Murah
               Level of Readiness in IT Disaster Recovery Plan ......................................................................................... 10

                  Shuhaiza Aszrin binti Mohd Kasim & Ibrahim bin Mohamed

               Optimized Data Hiding in Complemented or Non- Complemented Form in Video Steganography .......... 11
                  Samar Kamil, Masri Ayob, Siti Norul Huda Sheikh Abdullah & Zulkifli Ahmad
               Advanced Persistent Threats Awareness and Readiness: A Case Study in Malaysian Financial Institutions
                .................................................................................................................................................................... 12

                  Zeti Suhana Zainudin & Nurul Nuha Abdul Molok
               Victimization Analysis Based On Routine Activitiy Theory for Cyber-Love Scam in Malaysia .................... 13

                  Mohd Ezri Saad & Siti Norul Huda Sheikh Abdullah

                                                                                                             i
   1   2   3   4   5   6   7