International Journal of Academic Research in Business and Social Sciences

search-icon

Establishing Information as Tangible Asset

Open access

Dayang Ku Hidayah Awg Mohamad, Nor Hanani Husain, Saiful Farik Mat Yatin, Saidatul Akmar Ismail, Hasnah Shuhaimi, Shaharom Sulaiman, Julieyana Jaris

Pages 539-547 Received: 15 Apr, 2019 Revised: 17 May, 2019 Published Online: 28 Jun, 2019

http://dx.doi.org/10.46886/IJARBSS/v9-i6/5970
It is an idea that data, information and knowledge are different from intellectual capital. Data or information in a collection is more than knowledge. There is also no formality that intellectual capital is valuable organizational assets. However, intellectual capital is not only a set of information it does include expertise based on some degree of reflection. It is identified, managed and protected. In market view, the revolution of big data seems not giving impact to the development country such as Malaysia. Even there’s highly usage of internet in communication through social media been adopted as Malaysian lifestyle. Study shows, Malaysia has busy traffic transaction of personal and business data and, the sensitive data stored in public cloud services exposed all the information to variety of risks in cyberspace. The revolution of information technology is never degreasing. As organizations are finding value in data, they realized the risk in handling information and the need of protection. In establishing information as tangible asset, this paper begins with cases of attack and security issues by applying analogy in framework. As the result, this paper suggests to ensure all the data, which can be, defined as tangible asset, with proven justification and acknowledge as a capital, will be protected by insurance policies with solid and concrete laws act.
Erickson, S., & Rothberg, H. (2014). Big Data and Knowledge Management: Establishing a Conceptual Foundation. The Electronic Journal of Knowledge Management, 108-116.
Bernama. (2017). Malaysians are world's largest WhatsApp users. Retrieved from New Straits Times Malaysia: https://www.nst.com.my/lifestyle/bots/2017/09/278936/malaysians-are-worlds-largest-whatsapp-users
Global Legal Group. (2017). The International Comparative Legal Guide to Cyber Security 2018.
HP. (2012). Information Optimization Harness The Power of Big Data. HP Business White Paper.
ISACA. (2014, April). ISACA's 2014 APT Study. ISACA.
IT Best Practise. (2018). UNIVERSITY OF NEBRASKA–LINCOLN. Retrieved from https://its.unl.edu/bestpractices/server-administration
Jabatan Perlindungan Data Peribadi. (2018). Department Of Personal Data Protection. Retrieved from http://www.pdp.gov.my/index.php/en/
Laws Of Malaysia. (2009). Central Bank of Malaysia Act 2009. In Laws of Malaysia Act 701.
Laws Of Malaysia. (2010). Personal Data Protection Act 2010. In Laws Of Malaysia Act 709.
McAfee. (2018, April 16). 1-in-4 orgs using public cloud has had data stolen. Retrieved from https://www.helpnetsecurity.com/2018/04/16/public-cloud-stolen-data/
McAfee. (2018). McAfee study: 1-in-4 organisations using Public Cloud has had data stolen. Retrieved from https://www.digitalnewsasia.com/business/mcafee-study-1-4-organisations-using-public-cloud-has-had-data-stolen
McKinsey. (2014). Increased cyber security can save global economy trillions. World Economic Forum.
MCMC. (2017). MCMC Internet Users Survey .
MCMC. (2018). Malaysian Communications and Multimedia Commision . Retrieved from https://www.mcmc.gov.my/
MyCyberSecurity. (2018 ). Data Recovery Services . Retrieved from My Cyber Security Clinic: 11. http://cybersecurityclinic.my/index.php/joomla-pages-iii/blog-layout/26-data-recovery-services.html
PIDM. (2018). Perbadanan Insurans Deposit Malaysia. Retrieved from http://www.pidm.gov.my/en
Pillai, D. (2017). The International Comparative Legal Guide to Cyber Security 2018. Retrieved from https://www.christopherleeong.com/media/2883/cyb18_chapter-17_malaysia.pdf
President of the Italian data protection authority. (2006, July 7). Speech by the President of the italian data protection authority presenting the 2005 annual report to Parliament. Garante Privacy. Retrieved from https://www.garanteprivacy.it/web/guest/home/docweb/-/docweb-display/docweb/1332401
Yong, P. (2007). Software Liability . Malayan Law Journal Articles.
In-Text Citation: (Mohamad et al., 2019)
To Cite this Article: Mohamad, D. K. H. A., Husain, N. H., Ismail, S. A., Shuhaimi, H., Sulaiman, S., & Jaris, J. (2019). Establishing information as tangible asset. International Journal of Academic Research in Business and Social Sciences, 9(6), 539–547.