IIUM Repository

Dr. Nurul Nuha Abdul Molok

Head, Department of Information Systems

Department of Information Systems

KULLIYYAH OF INFORMATION AND COMMUNICATION TECHNOLOGY

Information Security Management, Cybersecurity Management, Information Security Governance, Information Security Risk Management, Social Media Security, Information Leakeg

Nurul Nuha Abdul Molok is an Assistant Professor at the Department of Information Systems, Faculty of Information & Communication Technology, International Islamic University Malaysia. She obtained her BSc in Computer Science (Artificial Intelligence) and MSc in Computer Science (Information Systems) from Universiti Malaya, Malaysia, and Ph.D in IS Security from the University of Melbourne, Australia. She is a certified ISO 27001 Information Security Management Systems (ISMS) Lead Auditor and Cyber Defender Associate (CCDA). She is also a working group member of the Information Security Technical Committee, Department of Standards Malaysia. To date, she has more than 30 publications in indexed and non-indexed, international and local, journals and proceedings.

DOCTOR OF PHILOSOPHY (INFORMATION SYSTEMS SECURITY) - University of Melbourne, Australia Master of Computer Science - Universiti Malaya (UM) Bachelor of Computer Science - Universiti Malaya (UM) International Baccalaureate Bilingual Diploma in Computer Science - Kolej MARA Banting, Selangor

Profile Picture

Latest Additions

  1. Zainudin, Zeti Suhana and Abdul Molok, Nurul Nuha (2017) A case study of advanced persistent threats on financial institutions in Malaysia. IIUM Press, Kuala Lumpur. ISBN 9789674187903
  2. Taher, Taslim and Suhaimi, Mohd Adam and Abdul Molok, Nurul Nuha (2020) Underlying Structure of Online Risks and Harm among Bangladeshi Teenagers. Applied Information Systems and Management, 3 (1). pp. 7-14. ISSN 2621-2536 E-ISSN 2621-2544
  3. Abdul Molok, Nurul Nuha and Zulkifli, Zahidah (2021) Parents’ roles in mitigating cyber threats to children in the new norm. In: Persidangan Kependudukan Kebangsaan (PERKKS 21), 16-17 November 2021, Kuala Lumpur. (Unpublished)
  4. Barzak, Omar Mokhles and Abdul Molok, Nurul Nuha and Mahmud, Murni and Talib, Shuhaili (2019) Incorporating Islamic principles in information security behaviour: a conceptual framework. Journal of Information Systems and Digital Technologies, 1 (2). pp. 24-39. E-ISSN 2682-8790
  5. Hamdi, Zaidatulnajla and Norman, Azah Anir and Abdul Molok, Nurul Nuha and Hassandoust, Farkhondeh (2019) A comparative review of ISMS implementation based on ISO 27000 series in organizations of different business sectors. In: 1st International Conference Computer Science and Engineering (IC2SE 2019), 26 Apr.-27-Apr.2019, Padang, Indonesia.
  6. Maseri, Aimi Nadrah and Norman, Azah Anir and Eke, Christopher Ifeanyi and Ahmad, Atif and Abdul Molok, Nurul Nuha (2020) Socio-technical mitigation effort to combat cyber propaganda: a systematic literature mapping. IEEE Access, 8. pp. 92929-92944. ISSN 2169-3536 E-ISSN 21693536
  7. Hamdi, Zaidatulnajla and Norman, Azah Anir and Abdul Molok, Nurul Nuha and Hassandoust, Farkhondeh (2019) A comparative review of ISMS implementation based on ISO 27000 Series in organizations of different business sectors. In: International Conference Computer Science and Engineering (IC2SE), 26th–27th April 2019, Padang, Indonesia.
  8. Barzak, Omar Mokhles and Abdul Molok, Nurul Nuha and Talib, Shuhaili and Mahmud, Murni (2016) Unintentional information security behavior from the Qur’an and Hadith’s perspective. International Journal on Islamic Applications in Computer Science And Technology, 4 (3). pp. 1-10. (Unpublished)
  9. Zainudin, Zeti Suhana and Abdul Molok, Nurul Nuha (2019) Advanced persistent threats awareness and readiness: a case study in Malaysian financial institutions. In: 2018 Cyber Resilience Conference (CRC 2018), 13th-15th Nov. 2018, Putrajaya.
  10. Abdul Molok, Nurul Nuha and Ahmad, Atif and Chang, Shanton (2018) A case analysis of securing organisations against information leakage through online social networking. International Journal of Information Management, 43. pp. 351-356. ISSN 0268-4012
  11. Barzak, Omar Mokhles and Abdul Molok , Nurul Nuha and Talib, Shuhaili and Mahmud, Murni (2015) Unintentional information security behavior from the Qur’an and hadith’s perspective. In: International Conference on Islamic Applications in Computer Science and Technology, 1 ‐ 3 October 2015, Konya, Turkey. (Unpublished)
  12. Dioubate, Balla Mousa and Abdul Molok, Nurul Nuha and Talib, Shuhaili and Md. Tap, Abu Osman (2015) Risk assessment model for organizational information security. ARPN Journal of Engineering and Applied Sciences, 10 (23). pp. 17607-17613. ISSN 1819-6608
  13. Abdul Molok, Nurul Nuha and Md Ali, Asma and Talib, Shuhaili and Mahmud, Murni (2015) Information security awareness through the use of social media. In: 5th International Conference on Information & Communication Technology for The Muslim World (ICT4M 2014), 17th - 19th November 2014, Kuching, Sarawak.
  14. Abdul Molok, Nurul Nuha (2014) Inadvertent Leakage of Organisational Information through Online Social Networking. In: International Research Invention & Innovation Exhibition 2014, CAC, IIUM. (Unpublished)
  15. Abdul Molok , Nurul Nuha (2010) The information systems integration plan: for satellite remote sensing subsystems. VDM Verlag Dr. Muller, Saarbrücken, Germany. ISBN 3639219635
  16. Abdul Molok , Nurul Nuha and Chang, Shanton and Ahmad, Atif (2013) Disclosure of organizational information on social media: Perspectives from security managers. In: Pacific Asia Conference on Information Systems, 18 - 22 June 2013, Jeju Island, Korea.
  17. Abdul Molok , Nurul Nuha and Ahmad, Atif and Chang, Shanton (2011) Disclosure of organizational information by employees on Facebook: Looking at the potential for information security risks. In: 22nd Australasian Conference on Information Systems (ACIS), 30th Nov - 2nd Dec 2011, Sydney, Australia.
  18. Abdul Molok , Nurul Nuha and Ahmad, Atif and Chang, Shanton (2011) Information Leakage through online social networking: opening the doorway for advanced persistence threats. The Journal of the Australian Institute of Professional Intelligence Officers (AIPIO), 19 (2). pp. 38-55. ISSN 1039-1525
  19. Abdul Molok , Nurul Nuha and Ahmad, Atif and Chang, Shanton (2012) Online social networking: a source of intelligence for advanced persistent threats. International Journal of Cyber Warfare and Terrorism, 2 (1). pp. 1-13. ISSN 1947-3435
  20. Abdul Molok , Nurul Nuha and Chang, Shanton and Ahmad, Atif (2010) Information leakage through online social networking: Opening the doorway for advanced persistence threats. In: Australian Information Security Management Conference, 30 Nov - 2 Dec 2010, Perth, Western Australia.

Most Viewed Items

Item titleViews
1Disclosure of organizational information on social media: Perspectives from security managers1751
2Disclosure of organizational information by employees on Facebook: Looking at the potential for information security risks1448
3Online social networking: a source of intelligence for advanced persistent threats1416
4Information Leakage through online social networking: opening the doorway for advanced persistence threats1399
5Information security awareness through the use of social media1363
6Exploring the use of online social networking by employees: Looking at the potential for information leakage1344
7Understanding the factors of information leakage through online social networking to safeguard organizational information1342
8Risk assessment model for organizational information security1293
9Information leakage through online social networking: Opening the doorway for advanced persistence threats1293
10Unintentional information security behavior from the Qur’an and hadith’s perspective1256
11The information systems integration plan: for satellite remote sensing subsystems1168
12A case analysis of securing organisations against information leakage through online social networking666
13Advanced persistent threats awareness and readiness: a case study in Malaysian financial institutions495
14A comparative review of ISMS implementation based on ISO 27000 Series in organizations of different business sectors373
15Socio-technical mitigation effort to combat cyber propaganda: a systematic literature mapping351
16A comparative review of ISMS implementation based on ISO 27000 series in organizations of different business sectors271
17Unintentional information security behavior from the Qur’an and Hadith’s perspective259
18Incorporating Islamic principles in information security behaviour: a conceptual framework255
19Inadvertent Leakage of Organisational Information through Online Social Networking95
20Underlying Structure of Online Risks and Harm among Bangladeshi Teenagers70
21A case study of advanced persistent threats on financial institutions in Malaysia42
22Parents’ roles in mitigating cyber threats to children in the new norm3