IIUM Repository

Unintentional information security behavior from the Qur’an and hadith’s perspective

Barzak, Omar Mokhles and Abdul Molok , Nurul Nuha and Talib, Shuhaili and Mahmud, Murni (2015) Unintentional information security behavior from the Qur’an and hadith’s perspective. In: International Conference on Islamic Applications in Computer Science and Technology, 1 ‐ 3 October 2015, Konya, Turkey. (Unpublished)

[img] PDF (Unintentional Information Security Behavior from the Qur’an and Hadith’s Perspective) - Accepted Version
Restricted to Repository staff only

Download (274kB) | Request a copy
[img] PDF (Unintentional Information Security Behavior from the Qur’an and Hadith’s Perspective) - Supplemental Material
Restricted to Repository staff only

Download (481kB) | Request a copy

Abstract

As the world becomes more interconnected now than decades ago, information security incidents are more prevalent in organizations. The incidents are more likely caused by insiders and they can happen with or without intentions. Although some security studies state that unintentional security incidents could cause more damages to organizational information systems (IS) than intentional security incidents, The research in this area is still limited. This paper focuses on unintentional employees’ behaviors that have impacts on organizational information security, rather than unintentional behaviors in general IT practices. It explores unintentional information security behavior based on the perspective of the Qur’an and Hadith. Moreover, it provides some recommendations based on academic studies and Sharia teachings to overcome unintentional information security behavior. This paper starts with the discussion on information security behavior, human intentions based on the Sharia, and unintentional behavior under Islamic perspective. Finally, the significant of the study relies on the recommendation to reduce unintentional security threats based on information security studies and Sharia teachings by proposing a model to understand unintentional information security behavior and the factors that affect them.

Item Type: Conference or Workshop Item (Full Paper)
Additional Information: 5341/47341
Uncontrolled Keywords: information security behavior, unintentional security behavior, insider threat, Qur’an and Hadith perspective.
Subjects: B Philosophy. Psychology. Religion > BP Islam. Bahaism. Theosophy, etc > BP1 Islam > BP173.77 Islam and work
T Technology > T Technology (General) > T55.4 Industrial engineering.Management engineering. > T58.6 Management information systems
Kulliyyahs/Centres/Divisions/Institutes (Can select more than one option. Press CONTROL button): Kulliyyah of Information and Communication Technology > Department of Information System
Kulliyyah of Information and Communication Technology > Department of Information System
Depositing User: Dr. Nurul Nuha Abdul Molok
Date Deposited: 21 Jan 2016 11:38
Last Modified: 21 Jan 2016 11:38
URI: http://irep.iium.edu.my/id/eprint/47341

Actions (login required)

View Item View Item

Downloads

Downloads per month over past year