Browsing by Author "Mohd Zalisham Jali"
Now showing 1 - 10 of 10
Results Per Page
Sort Options
- Some of the metrics are blocked by yourconsent settings
Publication Bibliometric Analysis of Literature on Digital Banking and Financial Inclusion Between 2014-2020(University of Nebraska-Lincoln, 2021) ;Muhammad Ridhwan Ab. Aziz ;Mohd Zalisham Jali ;Mohd Nazri Mohd Noor ;Syahnaz Sulaiman ;Mohd Shukor HarunMuhammad Zakirol Izat MustafarThe fastest growing in technology in the recent many of years has changed the way of people live and the conduct of business. The existing of the internet and mobile has led to profound transformation to a various industry from manual-based to automatic-based activity and from offline to online transaction include in banking and financial industry. The objective of this study is to analyze the related literatures on Digital Banking and Financial Inclusion between 2014 until 2020. The methodology that has been applied in this study is descriptive research based on document analysis on previous studies and literatures on digital banking and financial inclusion either from free-of-charge or free-of-registration online journals. The journals and articles are acquired from various sources of channel such as google scholar, science direct and researchgate.com. There are 126 articles related in this field were collected and examined. This study perceived at several variables which include authorship patterns, number of articles published, research approach, geographical affiliation, subject and gender of the author. The general finding of this study illustrates that most of the previous study discussed on economic and social development that positively influenced by digital banking and financial inclusion. - Some of the metrics are blocked by yourconsent settings
Publication A Comparative Study On The Information Security Culture Related To Workplace And Home Practices(Institute of Research Engineers and Doctors, 2015) ;Hamida Omer Issa AskerMohd Zalisham JaliSecurity awareness can be practiced from various angle like within school, government-sponsored initiatives and security providers. The aim of present paper is however confined to investigating the behavior, practices and interactions at the organization level and within home environments. Therefore, the survey was conducted to assess the information security culture among workers in terms of their workplace and home practices; and to determine if a relationship exists between information security culture practices at the workplace and at home. The result demonstrated that the awareness at home and within the workplace appears to be of the same level, with negative practices are still practices insecure behavior. - Some of the metrics are blocked by yourconsent settings
Publication Graphical Authentication Using Enhanced Hybrid Graphical Authentication System(Medwell Journals, 2015) ;M.D. Fatehah ;Mohd Zalisham Jali ;M.K. WafaNor Badrul AnuarThe username/password combination is still the most widely used method albeit various user authentication techniques have been introduced. Numerous studies have been conducted to investigate the scheme and it could be summarized that despite it weaknesses, it is the most favorable scheme. Thus, to reduce the weakness, authenticating users with image or pictures (i.e., graphical password) is prop osed as one possible alternative as it was claimed that pictures were easy to remember, easy to use and has considerable security. This study presents a study carried out to investigate user's performance and feedback towards the use of hybrid graphical methods (i.e., combining two graphical methods) as a method of authentication. Initially, a survey was conducted to identify participants' drawing patterns as their secret using the paper-based method and then the graphical software prototype was developed and tested randomly by 30 participants and lastly a survey was conducted in order to identify the level of guessability (i.e., security perspective). Overall, test on the prototype showed positive results as participants enjoyed using it and able to register within tolerable time. - Some of the metrics are blocked by yourconsent settings
Publication Graphical Password Schemes Design: Enhancing Memorability Features Using Autobiographical Memories.(Asian Research Publishing Network (ARPN), 2013) ;Obasan Adebola ;Norafida Ithnin ;Mohd Zalisham JaliNicholas AkosuMemorability and security of passwords are two distinct extremes that are difficult to achieve at the same time. These two important features are a major problem in conventional textual password systems. Text-based is a system where memorability is inversely proportional to security of passwords as such users choose weak texts as passwords to make it easy for themselves to remember at the expense of security. A weak password is easy to remember but provide little or no security because weak password is easy to break. To correct this flaw , graphical passwords are developed as an alternative to text-based passwords. However, a number of existing graphical schemes still have some drawbacks. The present study introduces a framework of a graphical password scheme using autobiographical memories to improve the memorabily of passwords. With this feature, user can write or draw two characters in each round of the grid cells for three rounds during the password creation and later use the corresponding cells in three rounds for authentication, without touching the grid system in order to prevent the password from being seen by any nearby observer and ultimately to resist against shoulder surfing - Some of the metrics are blocked by yourconsent settings
Publication An Initial Study of Cyber Security for Web Services in Malaysian Organizations(Ismail Saritas, 2023) ;Firkhan Ali bin Hamid Ali ;M. Khairul Amin M. Sukri ;M. Azahari M. Yusof ;Mohd Zalisham Jali ;Moh Norazmi NordinMiswan SuripIn the recent and next years, Malaysian enterprises have seen an increase in the development of information technology (IT). This is a result of the Malaysian government actively promoting IT usage throughout all companies in Malaysia, whether they are in the public or private sectors. Utilizing IT including web services will increase an organization's production and quality. Therefore, they require a well-planned implementation of the IT infrastructure and tools. Using web services will ensure that its operations are successful in supporting long-term business ambitions. Besides that, the cyber security play important role to ensure that the web services and IT infrastructures execute well along the organization’s business successful. So, is these digital environments in Malaysian organizations safe it is not a Malaysian IT culture and didn’t have enough and tough knowledge of cyber security. However, how to promote cyber security to Malaysian organizations for web services? So, promotion can be done by using the web services itself by putting more knowledge and study on the secure usage of IT facilities in Malaysian organizations. - Some of the metrics are blocked by yourconsent settings
Publication Islamic Digital Banking Based on Maqasid Al-Shariah for Financial Inclusion: A Proposed Framework(Faculty of Economics and Muamalat, Universiti Sains Islam Malaysia (USIM), 2023) ;Muhammad Ridhwan Ab. Aziz ;Mohd Zalisham Jali ;Mohd Nazri Mohd Noor ;Syahnaz Sulaiman ;Mohd Shukor HarunMuhammad Zakirol Izat MustafarThe expansion of information and communication technology (ICT) has confronted the banking and financial industry towards the era of digitalization. This digitalization has brought advantages to the people nowadays to make the banking transaction easier in term of time-saving and easy to access compared to over-the-counter transaction (at the branch), in which the people need to waste their time for waiting their turn to make a simple transaction like withdraw and deposit money and reaching the people who are unbanked in order to them enjoy the banking and financial products and services. In this context, as most of the community in Malaysia are Muslim, the regulator (Bank Negara Malaysia) needs to concern with the value of Shariah and the element of financial inclusion that should be adopted in the development of digital banking. So, this will lead to the development of Islamic digital banking based on Maqasid al-Shariah for financial inclusion that able to cater the current market needs. However, the model of Shariah compliant digital banking is important to be introduced in order to achieve the true spirit of Maqasid al-Shariah for financial inclusion. This article is aimed to develop a framework of Islamic digital banking based on Maqasid al-Shariah for financial inclusion. This research employs a qualitative approach as this research is conducted through interview with experts for the development and verification of the proposed framework. The proposed framework has been found to be feasible for the implementation in accordance with the ongoing advancements in the digital age. - Some of the metrics are blocked by yourconsent settings
Publication The Perception Of Malaysian Community On The Reliability Of The Adoption Of Islamic Digital Banking In Mobilizing Financial Sector(Fakulti Ekonomi dan Muamalat, Universiti Sains Islam Malaysia, 2022) ;Muhammad Ridhwan Ab. Aziz ;Mohd Nazri Mohd Noor ;Syahnaz Sulaiman ;Mohd Shukor Harun ;Muhammad Zakirol Izat MustafarMohd Zalisham JaliThe existence of Information and Communication Technology had paved a way to various sectors especially in financial sector. Banks have been pushed to develop digital banking to meet the needs of clients who are always on the go. During COVID-19 outbreak, digital banking is compulsory to the community in order to conduct day to day banking transaction. However, as the majority of community in Malaysia is Muslim, the need of the Shariah compliant digital banking is significant. Islamic financial sectors had been urged to join the digital banking revolution in order to be an alternative against conventional one. This study is aimed to investigate the perception of Malaysian community on the reliability of the adoption of Islamic digital banking. This study used a quantitative survey questionnaire with 150 valid respondents. The software SPSS version 26 was utilised in this study to analyse the data using descriptive analysis. The general finding of this study shows that the perception of Malaysian community from various occupational on the reliability of Islamic digital banking in mobilizing financial sector has demonstrated a favourable consequence. - Some of the metrics are blocked by yourconsent settings
Publication The Relationship between Age and Level of Income with Understanding of Islamic Digital Banking(UTM Press, 2024) ;Muhammad Ridhwan Ab. Aziz ;Mohd Zalisham Jali ;Mohd Nazri Mohd Noor ;Syahnaz Sulaiman ;Mohd Shukor HarunMuhammad Zakirol Izat MustafarThe rapid growth of information and communication technology development has driven the Islamic banking and finance industry to digitalize all transactions and Islamic banking products to go fully online. However, there is a hindrance in developing Islamic digital banking which is the lack of understanding about Islamic digital banking among Malaysia community from different age and level of income. This study aims to investigate the relationship between age and level of income of Malaysian community with the level of knowledge about Islamic digital banking. This study employed a quantitative survey questionnaire of 100 respondents. The Statistical Product and Service Solutions (SPSS) software version 27 has been used in this study in analysing the data through descriptive analysis. The general finding of this study showed that the young generation and people with lower income have more intention to adopt this new application compared to the older generation and people with higher income. By analyzing these relationships, the research could help Islamic banks tailor their services and products to various demographic groups, enhancing accessibility and understanding. Additionally, the findings might inform policymaking to create a more inclusive financial system, particularly in predominantly Muslim countries. Overall, the study appears to connect the fields of demographics, technology, economics, and cultural studies, potentially providing essential insights for the development and growth of Islamic digital banking. - Some of the metrics are blocked by yourconsent settings
Publication Web Accessibility Challenges(The Science and Information (SAI) Organization Limited, 2016) ;Hayfa.Y.Abuaddous ;Mohd Zalisham JaliNurlida BasirDespite the importance of web accessibility in recent years, websites remain partially or completely inaccessible to certain sectors of the population. This is due to several reasons, including web developers’ little or no experience in accessibility and the lack of accurate information about the best ways to quickly and easily identify accessibility problems using different Accessibility Evaluation Methods (AEMs). This paper surveys accessibility literature and presents a general overview of the primary challenges of accessibility barriers on websites. In this sense, we critically investigate main challenges forms related to accessibility including standards and guidelines (WCAG 2.0), during website’s design and development and during evaluation. Finally, a set of recommendations such as enforcing accessibility legislations are presented to overcome some challenges. Keywords—component; Website Accessibility; Disabilities; Accessibility challenges; WCAG 2.0; Accessibility automated tools - Some of the metrics are blocked by yourconsent settings
Publication Web-Based Reporting Vulnerabilities System for Cyber Security Maintenance(Semarak Ilmu Publishing, 2023) ;Firkhan Ali Hamid Ali ;Mohd Khairul Amin Mohd Sukri ;Mohd Zalisham Jali ;Muhammad Al-FatihMohd Azhari Mohd YusofTo maintain secure web services and IT infrastructure, this has proposed the prototype of a vulnerability reporting system. Among these reporting systems developed to deal with problems of maintenance and analysis report management system which not yet been implemented in the cyber security scanning tool, Nessus. The system, which was designed to manage and analyze cyber security maintenance by focusing on vulnerability reports, was based on web-based technology. To ensure that the prototyping system could be used quickly, the development process employed the prototyping-rapid application development technique. The administrator of this system may easily manage and keep track of the report following the activity of scanning the cyber security maintenance for vulnerabilities.