{"id":1667,"date":"2025-02-12T03:34:55","date_gmt":"2025-02-12T03:34:55","guid":{"rendered":"https:\/\/www.ukm.my\/csam\/?p=1667"},"modified":"2025-02-12T03:57:55","modified_gmt":"2025-02-12T03:57:55","slug":"announcing-the-first-csam-book-published-with-springer-nature","status":"publish","type":"post","link":"https:\/\/www.ukm.my\/csam\/announcing-the-first-csam-book-published-with-springer-nature\/","title":{"rendered":"Announcing the First CSAM Book Published with Springer Nature"},"content":{"rendered":"<p><strong>Assalammualaikum and greetings to all CSAM members,<\/strong><\/p>\n<p>We are delighted to announce the publication of the first CSAM book with Springer Nature in Germany. Congratulations to <strong>Prof. Ts. Miss Laiha binti Mat Kiah, PM Dr. Azah Anir Norman<\/strong>, <strong>PM Dr Tutut Herawan<\/strong>, and their dedicated team from the University of Malaya for this outstanding achievement!<\/p>\n<p>The book, titled\u00a0<strong>&#8220;Bring Your Own Device Security Policy Compliance Framework&#8221;<\/strong>, explores the factors that determine employees&#8217; compliance with BYOD security policies. It provides valuable insights into the ever-changing environment of BYOD security, using a mixed methods approach to identify key compliance factors and recommend control measures to mitigate security risks.<\/p>\n<p>For more details about the book, please visit\u00a0<a class=\"fui-Link ___w5et180 f2hkw1w f3rmtva f1ewtqcl fyind8e f1k6fduh f1w7gpdv f1mo0ibp fjoy568 ff5ikls f1s184ao f1mk8lai fnbmjn9 f1o700av f13mvf36 f1cmlufx f9n3di6 f1ids18y f1tx3yz7 f1deo86v f1eh06m1 f1iescvh fhgqx19 f1olyrje f1p93eir f1nev41a\" tabindex=\"0\" href=\"https:\/\/link.springer.com\/book\/9783031868009\" target=\"_blank\" rel=\"noopener\">this link<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Assalammualaikum and greetings to all CSAM members, We are delighted to announce the publication of the first CSAM book with<\/p>\n","protected":false},"author":6,"featured_media":1669,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","_bbp_topic_count":0,"_bbp_reply_count":0,"_bbp_total_topic_count":0,"_bbp_total_reply_count":0,"_bbp_voice_count":0,"_bbp_anonymous_reply_count":0,"_bbp_topic_count_hidden":0,"_bbp_reply_count_hidden":0,"_bbp_forum_subforum_count":0,"footnotes":""},"categories":[77,25,6],"tags":[],"class_list":["post-1667","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-book","category-cyber-security","category-news"],"_links":{"self":[{"href":"https:\/\/www.ukm.my\/csam\/wp-json\/wp\/v2\/posts\/1667","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.ukm.my\/csam\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.ukm.my\/csam\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.ukm.my\/csam\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ukm.my\/csam\/wp-json\/wp\/v2\/comments?post=1667"}],"version-history":[{"count":4,"href":"https:\/\/www.ukm.my\/csam\/wp-json\/wp\/v2\/posts\/1667\/revisions"}],"predecessor-version":[{"id":1678,"href":"https:\/\/www.ukm.my\/csam\/wp-json\/wp\/v2\/posts\/1667\/revisions\/1678"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.ukm.my\/csam\/wp-json\/wp\/v2\/media\/1669"}],"wp:attachment":[{"href":"https:\/\/www.ukm.my\/csam\/wp-json\/wp\/v2\/media?parent=1667"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.ukm.my\/csam\/wp-json\/wp\/v2\/categories?post=1667"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.ukm.my\/csam\/wp-json\/wp\/v2\/tags?post=1667"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}