IIUM Repository

Dr. Nurul Nuha Abdul Molok

Head, Department of Information Systems

Department of Information Systems

KULLIYYAH OF INFORMATION AND COMMUNICATION TECHNOLOGY

Information Security Management, Cybersecurity Management, Information Security Governance, Information Security Risk Management, Social Media Security, Information Leakeg

Nurul Nuha Abdul Molok is an Assistant Professor at the Department of Information Systems, Faculty of Information & Communication Technology, International Islamic University Malaysia. She obtained her BSc in Computer Science (Artificial Intelligence) and MSc in Computer Science (Information Systems) from Universiti Malaya, Malaysia, and Ph.D in IS Security from the University of Melbourne, Australia. She is a certified ISO 27001 Information Security Management Systems (ISMS) Lead Auditor and Cyber Defender Associate (CCDA). She is also a working group member of the Information Security Technical Committee, Department of Standards Malaysia. To date, she has more than 30 publications in indexed and non-indexed, international and local, journals and proceedings.

DOCTOR OF PHILOSOPHY (INFORMATION SYSTEMS SECURITY) - University of Melbourne, Australia Master of Computer Science - Universiti Malaya (UM) Bachelor of Computer Science - Universiti Malaya (UM) International Baccalaureate Bilingual Diploma in Computer Science - Kolej MARA Banting, Selangor

Profile Picture

Latest Additions

  1. Abdul Molok, Nurul Nuha and Zulkifli, Zahidah and Wahiddin, Mohamed Ridza (2022) Pendekar Siber: empowering young people to combat cyber threats. In: International Conference on Cyber Resilience (ICCR) 2022, 6-7 Oct 2022, The Meydan Hotel, Meydan Racecourse Al Meydan Road, Nad Al Sheba, Dubai, UAE. (In Press)
  2. Zainudin, Zeti Suhana and Abdul Molok, Nurul Nuha (2017) A case study of advanced persistent threats on financial institutions in Malaysia. IIUM Press, Kuala Lumpur. ISBN 9789674187903
  3. Taher, Taslim and Suhaimi, Mohd Adam and Abdul Molok, Nurul Nuha (2020) Underlying Structure of Online Risks and Harm among Bangladeshi Teenagers. Applied Information Systems and Management, 3 (1). pp. 7-14. ISSN 2621-2536 E-ISSN 2621-2544
  4. Abdul Molok, Nurul Nuha and Zulkifli, Zahidah (2021) Parents’ roles in mitigating cyber threats to children in the new norm. In: Persidangan Kependudukan Kebangsaan (PERKKS 21), 16-17 November 2021, Kuala Lumpur. (Unpublished)
  5. Barzak, Omar Mokhles and Abdul Molok, Nurul Nuha and Mahmud, Murni and Talib, Shuhaili (2019) Incorporating Islamic principles in information security behaviour: a conceptual framework. Journal of Information Systems and Digital Technologies, 1 (2). pp. 24-39. E-ISSN 2682-8790
  6. Hamdi, Zaidatulnajla and Norman, Azah Anir and Abdul Molok, Nurul Nuha and Hassandoust, Farkhondeh (2019) A comparative review of ISMS implementation based on ISO 27000 series in organizations of different business sectors. In: 1st International Conference Computer Science and Engineering (IC2SE 2019), 26 Apr.-27-Apr.2019, Padang, Indonesia.
  7. Maseri, Aimi Nadrah and Norman, Azah Anir and Eke, Christopher Ifeanyi and Ahmad, Atif and Abdul Molok, Nurul Nuha (2020) Socio-technical mitigation effort to combat cyber propaganda: a systematic literature mapping. IEEE Access, 8. pp. 92929-92944. ISSN 2169-3536 E-ISSN 21693536
  8. Hamdi, Zaidatulnajla and Norman, Azah Anir and Abdul Molok, Nurul Nuha and Hassandoust, Farkhondeh (2019) A comparative review of ISMS implementation based on ISO 27000 Series in organizations of different business sectors. In: International Conference Computer Science and Engineering (IC2SE), 26th–27th April 2019, Padang, Indonesia.
  9. Barzak, Omar Mokhles and Abdul Molok, Nurul Nuha and Talib, Shuhaili and Mahmud, Murni (2016) Unintentional information security behavior from the Qur’an and Hadith’s perspective. International Journal on Islamic Applications in Computer Science And Technology, 4 (3). pp. 1-10. (Unpublished)
  10. Zainudin, Zeti Suhana and Abdul Molok, Nurul Nuha (2019) Advanced persistent threats awareness and readiness: a case study in Malaysian financial institutions. In: 2018 Cyber Resilience Conference (CRC 2018), 13th-15th Nov. 2018, Putrajaya.
  11. Abdul Molok, Nurul Nuha and Ahmad, Atif and Chang, Shanton (2018) A case analysis of securing organisations against information leakage through online social networking. International Journal of Information Management, 43. pp. 351-356. ISSN 0268-4012
  12. Barzak, Omar Mokhles and Abdul Molok , Nurul Nuha and Talib, Shuhaili and Mahmud, Murni (2015) Unintentional information security behavior from the Qur’an and hadith’s perspective. In: International Conference on Islamic Applications in Computer Science and Technology, 1 ‐ 3 October 2015, Konya, Turkey. (Unpublished)
  13. Dioubate, Balla Mousa and Abdul Molok, Nurul Nuha and Talib, Shuhaili and Md. Tap, Abu Osman (2015) Risk assessment model for organizational information security. ARPN Journal of Engineering and Applied Sciences, 10 (23). pp. 17607-17613. ISSN 1819-6608
  14. Abdul Molok, Nurul Nuha and Md Ali, Asma and Talib, Shuhaili and Mahmud, Murni (2015) Information security awareness through the use of social media. In: 5th International Conference on Information & Communication Technology for The Muslim World (ICT4M 2014), 17th - 19th November 2014, Kuching, Sarawak.
  15. Abdul Molok, Nurul Nuha (2014) Inadvertent Leakage of Organisational Information through Online Social Networking. In: International Research Invention & Innovation Exhibition 2014, CAC, IIUM. (Unpublished)
  16. Abdul Molok , Nurul Nuha (2010) The information systems integration plan: for satellite remote sensing subsystems. VDM Verlag Dr. Muller, Saarbrücken, Germany. ISBN 3639219635
  17. Abdul Molok , Nurul Nuha and Chang, Shanton and Ahmad, Atif (2013) Disclosure of organizational information on social media: Perspectives from security managers. In: Pacific Asia Conference on Information Systems, 18 - 22 June 2013, Jeju Island, Korea.
  18. Abdul Molok , Nurul Nuha and Ahmad, Atif and Chang, Shanton (2011) Disclosure of organizational information by employees on Facebook: Looking at the potential for information security risks. In: 22nd Australasian Conference on Information Systems (ACIS), 30th Nov - 2nd Dec 2011, Sydney, Australia.
  19. Abdul Molok , Nurul Nuha and Ahmad, Atif and Chang, Shanton (2011) Information Leakage through online social networking: opening the doorway for advanced persistence threats. The Journal of the Australian Institute of Professional Intelligence Officers (AIPIO), 19 (2). pp. 38-55. ISSN 1039-1525
  20. Abdul Molok , Nurul Nuha and Ahmad, Atif and Chang, Shanton (2012) Online social networking: a source of intelligence for advanced persistent threats. International Journal of Cyber Warfare and Terrorism, 2 (1). pp. 1-13. ISSN 1947-3435

Most Viewed Items

Item titleViews
1Socio-technical mitigation effort to combat cyber propaganda: a systematic literature mapping450
2Information security awareness through the use of social media433
3Understanding the factors of information leakage through online social networking to safeguard organizational information432
4Risk assessment model for organizational information security416
5Disclosure of organizational information by employees on Facebook: Looking at the potential for information security risks411
6Unintentional information security behavior from the Qur’an and hadith’s perspective399
7Disclosure of organizational information on social media: Perspectives from security managers395
8A case analysis of securing organisations against information leakage through online social networking392
9A comparative review of ISMS implementation based on ISO 27000 series in organizations of different business sectors375
10Online social networking: a source of intelligence for advanced persistent threats371
11Information leakage through online social networking: Opening the doorway for advanced persistence threats361
12Information Leakage through online social networking: opening the doorway for advanced persistence threats357
13Unintentional information security behavior from the Qur’an and Hadith’s perspective355
14Incorporating Islamic principles in information security behaviour: a conceptual framework349
15Exploring the use of online social networking by employees: Looking at the potential for information leakage342
16Advanced persistent threats awareness and readiness: a case study in Malaysian financial institutions339
17A comparative review of ISMS implementation based on ISO 27000 Series in organizations of different business sectors331
18The information systems integration plan: for satellite remote sensing subsystems309
19Inadvertent Leakage of Organisational Information through Online Social Networking189
20Underlying Structure of Online Risks and Harm among Bangladeshi Teenagers168
21Parents’ roles in mitigating cyber threats to children in the new norm139
22A case study of advanced persistent threats on financial institutions in Malaysia130
23Pendekar Siber: empowering young people to combat cyber threats4