Browsing by Author "Najwa Hayaati Mohd Alwi"
Now showing 1 - 12 of 12
Results Per Page
Sort Options
- Some of the metrics are blocked by yourconsent settings
Publication Ancaman Pencerobohan Sistem Berkomputer Dilemmas In Corporate Communication Division Pertindihan Perintah Mahkamah Syariah Panggilan Pulau Besar Pencegahan SARS(Universiti Sains Islam Malaysia, 2005) ;Najwa Hayaati Mohd Alwi ;Norhayati Rafida Abdul Rahim ;Adibah Sulaiman @mohamad ;Mohd Radhi Ibrahim ;Irwan Mohd Subri ;Abdul Manan Ismail ;Arif Fahmi Md Yusof ;Syed Ahmad Tarmizi Syed OmarMohd Fauzi Mohd AminThis technical report contains cases, namely "Ancaman Pencerobohan Sistem Berkomputer"; "Dilemmas In Corporate Communication Division"; "Pertindihan Perintah Mahkamah Syariah"; "Panggilan Pulau Besar"; "Pencegahan SARS" and "Justice Delayed: Aida Melly Case". The case "Ancaman Pencerobohan Sistem Berkomputer" presented an issue relating to the ethics in computerise operation environment. "Dilemmas In Corporate Communication Division" looked at the factors in handling public complaints. While "Pertindihan Perintah Mahkamah Syariah" looked at the workings of syariah legal system. The case "Panggilan Pulau Besar" discussed about deviant teachings while the case "Pencegahan SARS" presented crisis management fkom Islamic perspective. The cases have valuable learning points and together with teaching guides, they could be usefbl for teaching-learning purposes. However, it must be noted that the cases are written as case research exercises and they are not meant to evaluate good or bad management practices. Any use of the cases and reference to them must be accompanied with written permission of the author(s) concerned. - Some of the metrics are blocked by yourconsent settings
Publication Enhancing Cyber-attacks Awareness Via Mobile Gamification Techniques(Asian Scholars Network, 2022) ;Sakinah Ali Pitchay ;Anis Syahira Suhaimi ;Najwa Hayaati Mohd Alwi ;Farida RidzuanAzni Haslizan Ab HalimNowadays, the changes in online behavior make data privacy extremely relevant which requires a suitable approach for raising cyber-attacks awareness. Every generation is constantly relying on the cyber world to run their life and they often are lacking in knowledge on security, which exposes them to attackers. Gamification techniques is chosen to be implemented in this research as the use of gamification are increasingly used in education to improve learner’s motivation and engagement. This research introduces a cyber-attacks awareness via mobile gamification techniques known as CYBERPOLY. This quiz-based game combined with the board game concept assists in increasing cyber-attacks awareness and reduces the incidents report and victim risk of any cyber traps. CYBERPOLY promotes Naqli (Revealed knowledge) and Aqli (Rational knowledge) (iNAQ) via board game where users can learn a few Arabic terms that are related to Muslim life such as Tawakkal (hibah, infaq, waqaf, qard, sedeqah), Ta’alim, Iktikaf, Muhasabah. CYBERPOLY offers password complexity indicator feature while offering portability, accessibility, off-line service (anytime, anywhere) and fun learning. It provides four levels of interactive quiz which are beginner, moderate, advanced, and professional that implement the Bloom’s Taxonomy keyword for more effective learning process. The user will be rewarded with score by earning their own money via security awareness quiz that will be used later as their initial salary to begin the board game. The game will end when the player’s money balance reached negative. Thus, this game is mainly developed to educate netizen about cyber-attacks in fun and interactive. Based on the end user feedbacks of functional testing and security authentication, the results show that CYBERPOLY has huge potential as an education tool on cultivating cyber-attacks awareness for digital society. For future planning, the additional scope can be expanded by creating more quiz questions according to specific cyberattack topics, add multiplayer game mode, made available for the iOS platform and save the game result for monitoring the learning performance of each user. - Some of the metrics are blocked by yourconsent settings
Publication Evaluation Of Existing ICT Infrastructure In KUIM(Universiti Sains Islam Malaysia, 2007) ;Nurdiana Azizan ;Kamaruzzaman Seman ;Najwa Hayaati Mohd AlwiShaharudin IsmailInformation and Communication Technology (ICT) has been created to fasten and easier the human tasks. Nowadays, the ICT is becoming more widely used by academic institutions to support the academic activities particularly in teaching and research. Kolej Universiti Islam Malaysia (KUIM) is being established to uphold and enhance Islamic Studies in education with the usage of information and communication technology (ICT) in its academic activities. KUIM provides the ICT infrastructure to the staffs to effectively integrate the facilities in performing their job tasks. The evaluation of the existing ICT infrastructure at KUIM is in need to identify the strength and availability of the facilities. Therefore this research highlights the ICT infrastructures available at KUIM in terms of hardware, software, services and maintenance. The other aspect this research will look will be the users' satisfaction towards the availability and performance of the infrastructure. At the end of this study, we identified the existing computer hardware, software used in KUIM. This is including the whereabouts and specifications details of those items. Secondly, this research understood the process of administration of the ICT infrastructure. This includes the performance, services, network and security management. Finally, this study recognized the satisfaction and IT literacy among the staffs. The evaluation of current ICT infrastructure is in need so that it can benefit the user and organization as a whole. The user can take full advantage of the available facilities in order to provide the best performance and the organization can plan for future ICT uses for the development purposes. The outcome of this research is expected to provide the information needed for the growth of the university. - Some of the metrics are blocked by yourconsent settings
Publication Information security management systems (ISMS) and computer security self-efficacy (CSSE) model comparison(American Scientific Publishers, 2017) ;Al-Shawabkeh M. ;Saudi M.M. ;Najwa Hayaati Mohd Alwi ;Azman N. ;Islamic Science Institute ;Faculty of Science and Technology ;Universiti Sains Islam Malaysia (USIM)International Islamic University Malaysia (IIUM)Information security models designed based on a different set of assumptions which are based on the characteristics of information system, motivations of organization to protect information, goals of the attacker and data validation of the model. The threats to information security are real and growing. Financial organizations need to take protective measures by implementing security policies though effective resource allocation is very difficult. This situation is due to uncertainty about the nature and severity of the threats and vulnerabilities and the effectiveness of the mitigation measures. Varieties of security policy models have been proposed to the financial organizations. Therefore to overcome the stated issues, this paper presents an analysis of two commonly used models: the Information Security Management System ISO/IEC 27001:2015 and Computer Security Self-Efficacy (CSSE). Findings confirm the suitability of both models for e-Banking computer security policies. � 2017 American Scientific Publishers All rights reserved. - Some of the metrics are blocked by yourconsent settings
Publication Infusing Social Media in Teaching and Learning (TnL) at Tertiary Institutions: A Case of Effective Communication in Universiti Sains Islam Malaysia (USIM)(Elsevier Science Bv, 2014) ;Najwa Hayaati Mohd Alwi ;Normazla Ahmad MahirShaharudin IsmailIn Teaching and Learning (TnL) process, the success of disseminating fast information to the students seem to be hampered by the infrequent use of its e-learning system. Students are more likely to engage and communicate through social media. This paper aims to investigate the frequency of social media use among undergraduates in USIM and analyze their perception on the effect of social media towards effective communication in TnL. Data were collected using survey. From the students' perspectives, this paper intends to highlight the findings on benefits of infusing the social media in ensuring effective communication among lecturers-students-lecturers and students-peers. (C) 2014 The Authors. Published by Elsevier Ltd. - Some of the metrics are blocked by yourconsent settings
Publication Islamic Knowledge: Factors Effective Islamic Knowledge Transfer For Visually Impaired Users Via Malaysia E-Learning Websites(Universiti Sains Islam Malaysia, 2016) ;Nurdiana Azizan ;Alahoul, Mohammed Raheel ;Najwa Hayaati Mohd AlwiMohd Zarif, Muhammad MustaqimIt is necessary for visually impaired users (VIUs) to be able to make use of information communication technologies (ICTs), especially e-Learning websites to acquire knowledge through them. This paper explores the factors that influence effective Islamic knowledge transfer (EiKT) via e-Learning websites for VIUs in Malaysia according to the knowledge providers (KPs), service providers (SPs) and VIUs. The paper is exploratory and applies thematic analysis to analyze the qualitative data that were collected through the use of 41 interviews with the three groups of participants. Four factors were identified which influence Islamic knowledge transfer (KT) through the use of this websites. The paper has identified the factors and suggests the considerations of these factors in making decisions on the transfer of Islamic knowledge to VIUs through the use of them. - Some of the metrics are blocked by yourconsent settings
Publication Privacy Factors Of Social Network That Effect Users Trust And Confidentiality(Council for Innovative Research, 2014) ;Nader Yahya Mohamed Alkeinay ;Norita Md Norwawi ;Fauziah Abdul Wahid ;Roesnita IsmailNajwa Hayaati Mohd AlwiSocial network is term used to refer to the social structure that is made up of a set of social actors. The social actors in this case include organizations or individuals. Social networks allow people to interact and socialize as they get to learn and know each other. Through social networking sites, people from different parts of a country or the world also get to meet and interact. However, there have been issues with regards to social network privacy for those who use the internet to use social network sites. This paper will look at some of the factors that affect trust of the users as well as the privacy issues related to social networks (Fernandez, 2009). Keywords:Social network;Privacy model;factors effecting trust - Some of the metrics are blocked by yourconsent settings
Publication Promoting Islamic Ethics On Privacy In Digital Social Network For User Data Protection And Trust(Universiti Sains Islam Malaysia, 2014) ;Norita Md Norwawi ;Najwa Hayaati Mohd Alwi ;Roesnita Ismail ;Fauziah WahidNader M. AlkaenaySocial and political behaviour relies much on communication. However in Islamic teaching, these human to human behaviours need to comply with the al-Quran and Sunnah that will be realized as adab and akhlaq or in other words ethics. This human to human relationship is founded by human to Allah relationship that will give rise to ibadah and taqwa. In Islam , privacy of another person is held in high respect. One should not pry in another person personal life or space because it is considered unethical thus not a good sign of taqwa. In the digital world, with the advancement of Internet that gave birth to social network, ethics, privacy and security is important concern. This study looks at privacy and security from the Islamic perspectives. A survey was conducted with 200 social network users using snowball sampling to find put their awareness of privacy and security related issues on social network. The study showed that majority of users are not aware even some do not even bother on the privacy and security issues. Thus, a user oriented privacy model was proposed that will protect users information by default unless the user set it otherwise. It will give more control to users on what to share on the social media with the public. - Some of the metrics are blocked by yourconsent settings
Publication Successful Factors For Teaching And Learning Using Mobile Applications(Primrose Hall Publishing Group, 2019) ;Najwa Hayaati Mohd Alwi ;Zalisham Mohd Jali ;Nurkhamimi ZainuddinRozhan M. IdrusResearch education evolves day by day and has offers many new techniques to impart information and knowledge. One of the important discussions nowadays is ubiquitous engagement activities for students; learning in innovative ways. Hence the introduction of mobile applications as innovative ubiquitous engaging teaching and learning method. This review examined articles on mobile apps for teaching and learning at schools and up to higher institutions. A content analysis was used to analyse successful factors for teaching and learning via mobile applications. This review found that mobile apps improve knowledge accessibility, engagement of students, varieties of options, borderless education and yet allow collaborative between students and teachers. Furthermore, this paper gives insights on some items to be considered when developing mobile apps for T&L. Key words: Ubiquitous, Engagement, Easy of Access, Collaboration, Mobile Apps Development, Teaching and Learning. - Some of the metrics are blocked by yourconsent settings
Publication A Survey on Knowledge Management at Mufti's Departments in Malaysia(Universiti Utara Malaysia, 2006) ;Nurdiana AzizanNajwa Hayaati Mohd AlwiManaging fatwa is considered a very challenging task since it is one of the valid and trustable guidance for Muslim nor only in Malaysia specifically but also to others Muslims throughout the world This paper will discuss the survey that was carried out in the Mufti's Department in Malaysia. The main reason of this research is to look at the usage of ICT in fatwa management in each Mufti's department in Malaysia. From the questionnaires, the data collected were analyzed and the analyses done includes respondent's profiles, identzjjing ICT usage in fatwa management, the usage of ICT in fatwa management according to the four main activities, problems that limits the ICT usage, and identrjj whether ICT had helped in the fatwa management. One of the finding does shows the ICT helps in managing fatwa. - Some of the metrics are blocked by yourconsent settings
Publication Systematic literature review: Correlated fuzzy logic rules for node behavior detection in wireless sensor network(Universiti Teknikal Malaysia Melaka, 2017) ;Noor Shahidah ;A. H Azni ;Najwa Hayaati Mohd Alwi ;Kamatuzzaman Seman ;Noor Hasrina Bakar ;Faculty of Science and Technology ;Universiti Sains Islam Malaysia (USIM)Universiti Kebangsaan Malaysia (UKM)In distributed wireless sensor network, the possibility for one or several nodes to become faulty is directly proportional upon the number of nodes within the network. Unnecessary control of the network triggers the anomaly, faulty and misbehavior in nodes which anyhow yield to degradation of network performance. Therefore, the identification of node behavior in distributed sensory system is crucially important to improve the network performance throughout the monitoring period. Though the detection schemes are several, Fuzzy logic for node behavior detection in WSN however present a more accurate incentive as it considered the uncertainties inherited in the WSN environment during the fault diagnosis period. This paper analyzes several fuzzy logic approaches for correlated node behavior detection. With six primary articles, this paper provides systematic literature review (SLR) and presents an overview of current design of research trend in this area. - Some of the metrics are blocked by yourconsent settings
Publication A Systematic Review On E-government Security Aspects(ER publications, 2014) ;Rabia Ihmouda ;Najwa Hayaati Mohd AlwiIsmail AbdullahIn recent years,most governments invested in the development of electronic government to improve government’s efficiency and provide better services to businesses and citizens. While rapid growth of information and communication technology in government can facilitate improved government service it may be accompanied with many security threats. E-government security is considered as one of the most important issues for achieving an advanced stage of e-government. A higher level of e-government security is required while the number of e-government services introduced to the user increases. Computer security is not just about technology and systems. It is also about the people that use those systems and how their vulnerable behaviors can lead to exploitation. In this paper, systematic review method is applied to identifying, extracting and analyzing the security weaknesses in e-government. It is aims to show the need of the security (technical and socio-technical) requirements to be concern into the e-government implementation. Keywords:E-government –information Security –Security issues.