Browsing by Author "Alwi N.H.M."
Now showing 1 - 10 of 10
Results Per Page
Sort Options
- Some of the metrics are blocked by yourconsent settings
Publication Correlated topology control algorithm for survival network in MANETS(Springer Verlag, 2016) ;Azni A.H. ;Ahmad R. ;Seman K. ;Alwi N.H.M. ;Noh Z.A.M. ;Universiti Sains Islam Malaysia (USIM)University Technical Malaysia Melaka (UTeM)This paper proposed a new correlated topology control (CTC) algorithm to achieve optimal survival networks topology under correlated node behavior. CTC algorithm enable every node to selects its own neighbors with highly correlated cooperative node dynamically. To select neighbors, measurement scheme of correlated node cooperativity is proposed to determine misbehave node and critical node. The scheme will check on correlated degree of neighboring nodes for any misbehave node and at the same time will check if the removal of node cause network to partition. In the case if nodes removal will partition the network, a new reconstruction scheme LNL is proposed to reconnect the broken link. The simulation results show that CTC algorithm can prolong node lifetime and maintain generated survival network topology. Besides that, the algorithm successfully prevented correlated event from misbehave node and network partitioning from isolated node. Further, it is also shown that as energy consumption decreased, network performance especially packet forwarding can be significantly improved and network survivability is optimally achieved. � Springer International Publishing Switzerland 2016. - Some of the metrics are blocked by yourconsent settings
Publication Cultural views inclusive in e-learning risk analysis(2012) ;Alwi N.H.M. ;Fan I.-S. ;Faculty of Science and Technology ;Universiti Sains Islam Malaysia (USIM)Cranfield UniversityThis paper presents an attempt to explore the relevance of stakeholder cultural views towards e-learning information security. An anthropological framework based on the Grid and Group Cultural Theory (CT) of Mary Douglas was used to classify the cultural view of each stakeholder groups in e-learning organisations. The CT framework identifies four cultural views-hierarchism, egalitarianism, individualism and fatalism. An approach based on Failure Mode and Effect Analysis (FMEA) was used to conduct a threat and risk analysis taking into account the four possible cultural views of each stakeholder role. This study focused on unintentional threats by human errors as these are easy to commit and difficult to control. For each stakeholder group, a critical threats list was generated highlighting the cultural views most exposed to threats. The findings indicate that cultural views have a significant influence on the susceptibility of the stakeholders to unintentional threats. This study suggests that cultural view of stakeholders should be considered in preparing the e-learning information security strategy. � 2012 IEEE. - Some of the metrics are blocked by yourconsent settings
Publication Embedding organizational culture values towards successful business continuity management (BCM) implementation(Institute of Electrical and Electronics Engineers Inc., 2015) ;Mansol N.H. ;Alwi N.H.M. ;Ismail W. ;Faculty of Science and TechnologyUniversiti Sains Islam Malaysia (USIM)Today's increased reliance on Information and Communications Technology (ICT) has raised the expectations for service quality, reliability and availability. Such expectations have introduced BCM as a crucial requirement for organizations. BCM is a management process that helps in improving the organization's resilience to interruptions caused by information security threats. The implementation of BCM not only involves the information technology (IT) department, but also business areas that use IT services. BCM however, only receives attention with the support and direction from top management whenever it is required for regulatory compliance. Therefore this paper aims to explore and identify the effects of organizational culture on the successful implementation of BCM in Malaysian organizations. Quantitative surveys have been distributed to 300 participants with varying roles within the organizational hierarchy. 22 Malaysian IT organizations and departments have been selected to participate in the survey. The survey explores the organization employee's view on the importance and effect of organizational culture on BCM implementation. The results indicate that cultural factors greatly impact and play an important role to the organization in terms of BCM readiness and implementation. The results are useful as a guidance for organizations in Malaysia specifically to monitor security incidents or threats which may arise not only from technicalities but also human complexity. The results may also aid in the preparation of organizational guidelines regarding readiness towards BCM implementation. � 2014 IEEE. - Some of the metrics are blocked by yourconsent settings
Publication Managing Organizational Culture Requirement for Business Continuity Management (BCM) Implementation Using Goal-Question-Metric (GQM) Approach(Penerbit UTM Press, 2016) ;Mansol N.H. ;Alwi N.H.M. ;Ismail W. ;Faculty of Science and TechnologyUniversiti Sains Islam Malaysia (USIM)Today's Information and Communication Technology (ICT) growth is increasing and has raised the needs for service quality, reliability and availability. Together, with the current global economics Business Continuity Management (BCM) become a crucial requirement to an organization. Apart from the technological aspect in BCM, Malaysian IT Organization must enforce the information security management and awareness of BCM by considering organization culture values. Preparing the organization to BCM is a vital part to the management to be considered. Accessing and understanding the organizational culture values during the BCM setup stage may help to improve the effectiveness of BCM implementation in the organization. Therefore, this paper presents the organizational culture metrics model using Goal-Question-Metric (GQM) approach to measure the readiness of the organization to implement BCM and also towards the BCM compliance. - Some of the metrics are blocked by yourconsent settings
Publication Measuring sensor to cloud energy consumption(Association for Computing Machinery, 2018) ;Rahman A.F.A. ;Halim A.A. ;Alwi N.H.M. ;Alwi K.S. ;Mohamad M.Z. ;Mohamad F.A. ;Taufiq M.N. ;Abidin K.A.Z. ;Faculty of Science and Technology ;Universiti Sains Islam Malaysia (USIM) ;CyberSecurity MalaysiaCyberSecurity MalaysiaIoT devices must provide seamless connectivity while obeying stringent power and size constraints. Power consumption plays important factor to determine the status and connectivity of Sensor Node. This paper describes a series of simple experiments which measure the energy consumption of two IoT Sensor Nodes transmitting data to the cloud. The experiments will be used to compare the best solution between wire and wireless for IoT Sensor Nodes implementation. The experimental result shows that wireless connection consume more power compared to wire connection. Apart from comparison of two methods, the goal of this paper is also to develop a solid experimental basis, thus setting a better foundation for future research on IoT Sensor Nodes. � 2018 Association for Computing Machinery. - Some of the metrics are blocked by yourconsent settings
Publication Measuring sensor to cloud energy consumption(Association for Computing Machinery, 2017) ;Azni A.H. ;Rahman A.F.A. ;Alwi N.H.M. ;Seman K. ;Faculty of Science and TechnologyUniversiti Sains Islam Malaysia (USIM)IoT devices must provide seamless connectivity while obeying stringent power and size constraints. Power consumption plays important factor to determine the status and connectivity of Sensor Node. This paper describes a series of simple experiments which measure the energy consumption of two IoT Sensor Nodes transmitting data to the cloud. The experiments will be used to compare the best solution between wire and wireless for IoT Sensor Nodes implementation. The experimental result shows that wireless connection consume more power compared to wire connection. Apart from comparison of two methods, the goal of this paper is also to develop a solid experimental basis, thus setting a better foundation for future research on IoT Sensor Nodes. � 2017 ACM. - Some of the metrics are blocked by yourconsent settings
Publication Readiness of Information Security Management Systems (ISMS) policy on hospital staff using e-patuh system(Universiti Teknikal Malaysia Melaka, 2018) ;Ismail W. ;Alwi N.H.M. ;Ismail R. ;Bahari M. ;Zakaria O. ;Faculty of Science and Technology ;Universiti Sains Islam Malaysia (USIM) ;Universiti Teknologi Malaysia (UTM)Universiti Pertahanan Nasional Malaysia (UPNM)ISO 27001:2013 is the best-known standard providing requirements for information security management systems (ISMS). An ISMS is a systematic approach to manage sensitive information through people, processes and IT systems. In a hospital, a patient's individual medical record is highly private and sensitive. This study performed qualitative questionnaire based on the ISO27001:2013 policy. Seven hospitals in Malaysia were involved in this study. This study focus on the Data Center as it contains a high risk server. This study reveals the non-compliance issues among the sampled hospitals in Malaysia. The participation of the hospitals in trainings related to information security awareness and education were still not adequate due to lack of support from the top management. The Malaysian Administrative Modernisation and Management Planning Unit (MAMPU), the Ministry of Health Malaysia and the top management in hospitals in Malaysia play vital roles to educate and ensure the compliance of ISO 27001:2013. 2018 Universiti Teknikal Malaysia Melaka. All rights reserved. - Some of the metrics are blocked by yourconsent settings
Publication Six critical processes to refute social-media-rumor(American Scientific Publishers, 2017) ;Shuhud M.I.M. ;Alwi N.H.M. ;Halim A.H.A. ;Faculty of Science and TechnologyUniversiti Sains Islam Malaysia (USIM)During the current mobile technology era, social media rumors (SMRs) propagate significantly faster, hence, are difficult to control. According to psychological research, SMR propagation can be better controlled with refutation. However, refutation must be timely, and supported with credible information. This is in line with the guideline provided in the Holy Quran, especially verse four of Surat An-Nisa, which urges people to refer to the leader or the authority to ascertain the veracity of new information concerning public security. This paper aims to review prominent prior psychology literature on rumor quelling strategies (RQS), and then maps them with solutions proposed by computer science research. We discovered that computer science studies in the related literature proposed noble solutions aligned with the ultimate goals in psychological research, including refutation. However, we suggest that these solutions be merged, and human intervention cannot be ignored, especially the verification process. Consequently, we identified six processes to be consolidated in a framework to further improve the refutation of SMRs. The six processes are: (1) filteration, (2) topic classification, (3) verifier identification, (4) notification to verifier, (5) verification, and (6) refutation. The identified steps act as the basis for subsequent research progress. � 2017 American Scientific Publishers All rights reserved. - Some of the metrics are blocked by yourconsent settings
Publication Successful factors on e-government security social-technical aspect(Asian Research Publishing Network, 2015) ;Ihmouda R. ;Alwi N.H.M. ;Abdullah I. ;Faculty of Science and TechnologyUniversiti Sains Islam Malaysia (USIM)This study explored and identified success social-technical factors related to the information security effectiveness in organizations. It explored these factors based on literature view, and documents, the study based on the Socio-Technical approach (STA) and the Security by Consensus (SBC) model. Quantitative analysis of the organizations' employees' experiences were analyzed and discussed to validate the questionnaire. The aim of this paper is to propose conceptual framework for understanding, clarification and investigation of the socio-technical factors involved in improving e-government security effectiveness in developing countries. 2006-2015 Asian Research Publishing Network (ARPN). - Some of the metrics are blocked by yourconsent settings
Publication Users' perspective on ICT infrastructure in a higher learning institution(International Business Information Management Association, IBIMA, 2008) ;Alwi N.H.M. ;Azizan N. ;Ismail S. ;Seman K.Universiti Sains Islam Malaysia (USIM)Information and Communication Technology (ICT) has been created to simplify human tasks. Nowadays, ICT is becoming more widely used by higher learning institutions to support their academic activities particularly in teaching and research. Users play an important role in any situation; therefore a study to evaluate the ICT infrastructure was conducted in a public university in Malaysia known as the Islamic Science University of Malaysia (USIM). The study was conducted to gather information from the users of the ICT facilities. This paper will discuss findings of the study in terms of the computer functions, system services, training and the ICT maintenance from the users' perspective. An evaluation of current ICT infrastructure was needed in order to understand how users and the organization could best benefit from services provided. The results indicate that ICT needs to be improved to ensure that more benefits can be gained.