TABLE OF CONTENTS
Page
Copyright Page …………………………………………………………..………. ii
Declaration ……………………………………………………………………… iii
Acknowledgement ………..……………………………………………… - …… iv
Dedication …………………………………………………………………..…… v
Table of Contents ……………………………………………………….………. vi
List of Tables ……………………………………………………………….…… xi
List of Figures ……………………………………………………… - ……….. xii
Abstract …………………………………………………………………..…… xiii
CHAPTER 1 INTRODUCTION …………….……………………………… 1
1.1 Overview ………………………… - ………………………… 1
1.2 Background to Research ….………………..…… - .…….…… 2
1.3 Problem Statement …….……………………..….……………. 3
1.4 Significant of the Study ….… - …………………… - ……….. 4
1.4.1 Individual level ………………… - ..……… - ……….. 4
1.4.2 Body of knowledge ……….……… - ………………….. 5
1.4.3 Organisational level …………………………………….. 5
1.5 Research Question …………………………….……………… 6
1.6 Objectives of the Study …………….…………………………. 6
1.7 Scope of the Study ……………………………………………. 7
1.8 Organisation of the Report …………………………………… 7
1.9 Summary ……………………….…………………… - ……… 8
CHAPTER 2 LITERATURE REVIEW …………………….…………..…. 10
2.1 Overview ………… - ………………..……… - ……………. 10
2.2 Internet ………………………………………………………. 11
2.2.1 Internet usage in Malaysia ………… - ..…………… 12
2.3 Phishing …………………………………………………… - 14
2.4 Information Security Governance … - ……………………… 17
2.4.1 COBIT …… - ……..……………………………… 18
2.4.2 ITIL ……… - ..……………………………………. 21
2.4.3 ISO 17799 ……….……………………… - ……… 23
2.4.4 Personal Data Protection Act 2010 ………………. 25
2.5 Information Security Governance Compliance …………… - 28
2.6 Education and Training …………………… - ……………… 29
2.7 Trust ………………………………………………………… 30
2.8 Employee Awareness ……………………………………….. 31
2.9 Ethical Conduct ……………………………………… - …… 31
2.10 Privacy …………………………………….………………… 32
2.11 Theoretical Framework …………………….……………….. 33
2.