Browsing by Author "Alwi, NHM"
Now showing 1 - 9 of 9
Results Per Page
Sort Options
- Some of the metrics are blocked by yourconsent settings
Publication Cultural Views Inclusive in E-learning Risk Analysis(IEEE, 2012) ;Alwi, NHMFan, ISThis paper presents an attempt to explore the relevance of stakeholder cultural views towards e-learning information security. An anthropological framework based on the Grid and Group Cultural Theory (CT) of Mary Douglas was used to classify the cultural view of each stakeholder groups in e-learning organisations. The CT framework identifies four cultural views - hierarchism, egalitarianism, individualism and fatalism. An approach based on Failure Mode and Effect Analysis (FMEA) was used to conduct a threat and risk analysis taking into account the four possible cultural views of each stakeholder role. This study focused on unintentional threats by human errors as these are easy to commit and difficult to control. For each stakeholder group, a critical threats list was generated highlighting the cultural views most exposed to threats. The findings indicate that cultural views have a significant influence on the susceptibility of the stakeholders to unintentional threats. This study suggests that cultural view of stakeholders should be considered in preparing the e-learning information security strategy. - Some of the metrics are blocked by yourconsent settings
Publication Cyber Terrorist Detection by using Integration of Krill Herd and Simulated Annealing Algorithms(Science & Information Sai Organization Ltd, 2019) ;Al-Sukhni, HAH ;Bin Ahmad, A ;Saudi, MMAlwi, NHMThis paper presents a technique to detect cyber terrorists suspected activities over the net by integrating the Krill Herd and Simulated Annealing algorithms. Three new level of categorizations, including low, high, and interleave have been introduced in this paper to optimize the accuracy rate. Two thousand datasets had been used for training and testing with 10-fold cross validation for this research and the simulations were performed using Matlab (R). Based on the conducted experiment, this technique produced 73.01% accuracy rate for the interleave level; thus, outperforming the benchmark work. The findings can be used as a guidance and baseline work for other researchers with the same interest in this area. - Some of the metrics are blocked by yourconsent settings
Publication Electronic medical record systems: decision support examination framework for individual, security and privacy concerns using multi-perspective analysis(Springer Heidelberg, 2020) ;Enaizan, O ;Zaidan, AA ;Alwi, NHM ;Zaidan, BB ;Alsalem, MA ;Albahri, OSAlbahri, ASElectronic medical record (EMR) is currently a popular topic in e-health. EMR includes the health-related information of patients and forms the main factor of e-health applications. Moreover, EMR contains the legal records that are created in the medical centre and ambulatory environments. These records serve as the data source for electronic health record. Although hospitals utilise the EMR system, healthcare professionals experience difficultly in trusting this system. Studies devoted to EMR acceptance in hospitals are lacking, particularly those on the EMR system in the contexts of privacy and security concerns based on multi-criteria perspective. Thus, the current study proposes a decision support examination framework on how individual, security and privacy determinants influence the acceptance and use of EMR. The proposed framework is based on a multi-criteria perspective derived from healthcare professionals in Malaysia as frame of reference. The framework comprises four phases. The sub-factors of individual, security and privacy determinants were investigated in the two initial phases. Thereafter, the sub-factors were identified with uniform multi-criteria perspective to establish a decision matrix. The decision matrix used individual uniform as basis to cluster the sub-factors and user perspectives. Subsequently, a new 'multi-criteria decision-making (MCDM) approach' was adopted. Integrated technique for order of preference by similarity (TOPSIS) and analytic hierarchy process (AHP) were used as bases in employing the MCDM approach to rank each group of factors. K-means clustering was also applied to identify the critical factors in each group. Healthcare professionals in Malaysia were selected as respondents and 100 questionnaires were distributed to those employed in 5 Malaysian public hospitals. A conceptual model adapted from Unified theory of acceptance and use of technology 2 (UTAUT2) was employed to clarify the connection between individual, privacy and security determinants and EMR system acceptance and use in the selected context. After collecting the data sets (363), structural equation modelling was used to analyse data related to EMR acceptance and use. Results are as follows. (1) Five determinants (i.e. data integrity, confidentiality, non-repudiation, facilitating conditions and effort expectancy) exerted an explicit and important positive effect on EMR acceptance and use. (2) Three determinants (i.e. unauthorised, error and secondary use) exerted a direct and significant negative effect on EMR acceptance and use. (3) Three other determinants (i.e. authentication, performance expectancy and habit) insignificantly affected the behavioural intention of healthcare experts in Malaysia to use EMR. - Some of the metrics are blocked by yourconsent settings
Publication Embedding Organizational Culture Values towards Successful Business Continuity Management (BCM) Implementation(IEEE, 2014) ;Mansol, NH ;Alwi, NHMIsmail, WToday's increased reliance on Information and Communications Technology (ICT) has raised the expectations for service quality, reliability and availability. Such expectations have introduced BCM as a crucial requirement for organizations. BCM is a management process that helps in improving the organization's resilience to interruptions caused by information security threats. The implementation of BCM not only involves the information technology (IT) department, but also business areas that use IT services. BCM however, only receives attention with the support and direction from top management whenever it is required for regulatory compliance. Therefore this paper aims to explore and identify the effects of organizational culture on the successful implementation of BCM in Malaysian organizations. Quantitative surveys have been distributed to 300 participants with varying roles within the organizational hierarchy. 22 Malaysian IT organizations and departments have been selected to participate in the survey. The survey explores the organization employee's view on the importance and effect of organizational culture on BCM implementation. The results indicate that cultural factors greatly impact and play an important role to the organization in terms of BCM readiness and implementation. The results are useful as a guidance for organizations in Malaysia specifically to monitor security incidents or threats which may arise not only from technicalities but also human complexity. The results may also aid in the preparation of organizational guidelines regarding readiness towards BCM implementation. - Some of the metrics are blocked by yourconsent settings
Publication Factors Contributing Knowledge Sharing In Higher Learning Institution(Univ Utari Malaysia-Uum, 2008) ;Alwi, NHM ;Abu Bakar, AHamid, HAThis paper is to discuss the factors that might be the contributors to the knowledge sharing in a Higher Learning Institution of Malaysia. Currently a study is conducted at a higher learning institution to identify the factors that can enhance the practice of knowledge sharing among the staffs regardless academic staffs or non-academic staffs. The study will be carried out by using two major approaches that are questionnaire survey and case studies. Therefore, the final product of this study is to compose the factors that have been determined within the study and it will be conferred in this paper. - Some of the metrics are blocked by yourconsent settings
Publication Information Security Management Systems (ISMS) and Computer Security Self-Efficacy (CSSE) Model Comparison(Amer Scientific Publishers, 2017) ;Al-Shawabkeh, M ;Saudi, MM ;Alwi, NHMAzman, NInformation security models designed based on a different set of assumptions which are based on the characteristics of information system, motivations of organization to protect information, goals of the attacker and data validation of the model. The threats to information security are real and growing. Financial organizations need to take protective measures by implementing security policies though effective resource allocation is very difficult. This situation is due to uncertainty about the nature and severity of the threats and vulnerabilities and the effectiveness of the mitigation measures. Varieties of security policy models have been proposed to the financial organizations. Therefore to overcome the stated issues, this paper presents an analysis of two commonly used models: the Information Security Management System ISO/IEC27001:2015 and Computer Security Self-Efficacy (CSSE). Findings confirm the suitability of both models for e-Banking computer security policies. - Some of the metrics are blocked by yourconsent settings
Publication Measuring Sensor to Cloud Energy Consumption(Assoc Computing Machinery, 2018) ;Rahman, AFA ;Ab Halim, A ;Alwi, NHM ;Alwi, KS ;Mohamad, FA ;Taufiq, MN ;Mohamad, MZAbidin, KAZIoT devices must provide seamless connectivity while obeying stringent power and size constraints. Power consumption plays important factor to determine the status and connectivity of Sensor Node. This paper describes a series of simple experiments which measure the energy consumption of two IoT Sensor Nodes transmitting data to the cloud. The experiments will be used to compare the best solution between wire and wireless for IoT Sensor Nodes implementation. The experimental result shows that wireless connection consume more power compared to wire connection. Apart from comparison of two methods, the goal of this paper is also to develop a solid experimental basis, thus setting a better foundation for future research on IoT Sensor Nodes. - Some of the metrics are blocked by yourconsent settings
Publication A Systematic Development of Instructional Design for programming languages: A Constructivist Based Instructional Design Approach(IEEE, 2015) ;Bajbouj, M ;Alwi, NHMNurul Fathihin Mohd Noor ShahOne of the problems in e-learning, as stated in the constructivism theory is to manage the diverse experience levels of students. These varying levels have to be taken into account in designing learning models due to its significant impact on the e-learning system effectiveness. This paper proposed a new instructional design model applied to a website for learning programming language. This model is based on a theoretical foundation of constructivism emphasizing on the learner rather than the instructor. Thus students learn by fitting new information together with what they already had known. The proposed constructivist-based model is composed of five generic processes; it uses a statistical approach to determine the most likely best-suited way to present learning concepts for students with different levels of experience. To overcome out-of-date statistical data, this paper also proposed an adaptive version that can handle students' feedback to adapt accordingly. - Some of the metrics are blocked by yourconsent settings
Publication Users' perspective on ICT infrastructure in a higher learning institution(Int Business Information Management Assoc-Ibima, 2008) ;Alwi, NHM ;Azizan, N ;Ismail, SSeman, KInformation and Communication Technology (ICT) has been created to simplify human tasks. Nowadays, ICT is becoming more widely used by higher learning institutions to support their academic activities particularly in teaching and research. Users play an important role in any situation; therefore a study to evaluate the ICT infrastructure was conducted in a public university in Malaysia known as the Islamic Science University of Malaysia (USIM). The study was conducted to gather information from the users of the ICT facilities. This paper will discuss findings of the study in terms of the computer functions, system set-vices, training and the ICT maintenance from the users' perspective. An evaluation of current ICT infrastructure was needed in order to understand how users and the organization could best benefit front services provided. The results indicate that ICT needs to be improved to ensure that more benefits can be gained.