Browsing by Author "Kamaruddin N."
Now showing 1 - 2 of 2
Results Per Page
Sort Options
- Some of the metrics are blocked by yourconsent settings
Publication Impact of time spent in parents-children communication on children misconduct(2012) ;Kamaruddin N. ;Omar S.Z. ;Hassan S. ;Hassan M.A. ;Mee A.A.C. ;D'Silva J.L. ;Universiti Putra Malaysia (UPM)Universiti Sains Islam Malaysia (USIM)Communication is a must and family communication enhances family ties. This study is design to discover whether quantity of time spent between parents and children have a direct impact on children misconduct activities. This is a quantitative study using a survey questionnaire. Data were gathered from 1163 respondents which comprised of 641 secondary school children and 522 parents and were analyzed using SPSS software. The data collection process took three months to be completed. The outcome showed that the children perceive the amount of time spent with their parents does have an impact towards their misconduct activities. However, it was not the same for the parents. It seems that parents did not perceive that the amount spent for communicating with their children will affect their children's misconduct activities. Parents should pay more attention to the time that they spent with their children as their children value the time that they spent with their parents'. It is crucial for parents to allocate some time in their hectic schedule to communicate with the children so that the children would not feel neglected and left out by their own parents thus making them prone to unhealthy activities. � 2012 Science Publication. - Some of the metrics are blocked by yourconsent settings
Publication Systematic Literature Review of Information Security Compliance Behaviour Theories(Institute of Physics Publishing, 2020) ;Kuppusamy P. ;Samy G.N. ;Maarop N. ;Magalingam P. ;Kamaruddin N. ;Shanmugam B.Perumal S.The paper aims to identify behavioural theories that influence information security policies compliance behaviour. A systematic review of empirical studies from eleven online databases (ACM digital library, Emerald Insight, IEEE Xplore digital library, Springer link, Science direct, Scopus, Web of Science, Oxford academic journals, SAGE journals, Taylor & Francis and Wiley online library) are conducted. This review identified 29 studies met its criterion for inclusion. The investigated theories were extracted and analysed. Total of 19 theories have been identified and studied concerning to security policy compliance behaviour. The result indicated that the most established theories in information security compliance behaviour studies are the Theory of Planned Behavior and Protection Motivation theory. Meanwhile, General Deterrence Theory, Neutralization theory, Social Bond Theory / Social Control Theory are used moderately in this research area. Less explored theories are namely Self Determination Theory, Knowledge, Attitude, and Behavior, Social Cognitive Theory, Involvement Theory, Health belief model, Theory of Interpersonal Behavior, Extended Parallel Processing Model, Organisational Control Theory, Psychological Reactance Theory, Norm Activation Theory, Organizational Behaviour Theory, Cognitive Evaluation Theory and Extended Job Demands-Resources. The results from this review may guide the development and evaluation of theories promoting information security compliance behaviours. This will further contribute in the development of an integrated theory of information security compliance behaviour. � Published under licence by IOP Publishing Ltd.