Browsing by Author "Selamat M.H."
Now showing 1 - 5 of 5
Results Per Page
Sort Options
- Some of the metrics are blocked by yourconsent settings
Publication Determinants of financial and environmental disclosures through the internet by Malaysian companies(2009) ;Al Arussi A.S. ;Selamat M.H. ;Mohd Hanefah M. ;Faculty of Economics and Muamalat ;Central Organization for Control and Auditing ;Universiti Utara Malaysia (UUM)Universiti Sains Islam Malaysia (USIM)Purpose - The purpose of this paper is to investigatewhether the voluntary financial and environmental disclosures through the internet can be explained by the same determinants as in conventional reporting. Specifically, this paper examines the relationship between the extent of financial and environmental disclosures on the internet and six variables, namely, ethnicity of chief executive officer (CEO), leverage, level of technology, existence of dominant personalities, profitability, and firm size. Design/methodology/approach - Six hypotheses were tested using data collected from 201 Malaysian listed companies on the Bursa Malaysia's Main and Second Boards for the financial year 2005. A regression model is utilized to analyze the results of this paper and this is in tandem with the previous studies. Findings - The results indicate that level of technology, ethnicity of CEO and firm size are determinants of both internet financial and environmental disclosures. However, the existence of a dominant personality is found to negatively affect the level of financial disclosures but not environmental disclosures. The other variables did not show any significant relationship with either financial or environmental disclosures. Originality/value - This paper investigates whether internet financial and environmental disclosures can be explained by the same determinants used in other similar studies. The results indicate that only level of technology, ethnicity of CEO and firm size are found to be significant for both internet financial and environmental disclosures. � Emerald Group Publishing Limited. - Some of the metrics are blocked by yourconsent settings
Publication Improved extreme programming methodology with inbuilt security(2011) ;Musa S.B. ;Norwawi N.M. ;Selamat M.H. ;Sharif K.Y. ;Faculty of Science and Technology ;Universiti Sains Islam Malaysia (USIM)Universiti Putra Malaysia (UPM)Security in e-commerce is becoming an important issue to deal with as several cases of attacks to users' data are increasing exponentially. Therefore, there is absolute need for proper checks and balances to mitigate the lapses using the appropriate development framework. This paper provides as a candidate, Improve Extreme Programming Methodology by tightening security controls across the development stages without necessarily extending the process. � 2011 IEEE. - Some of the metrics are blocked by yourconsent settings
Publication Secure e-commerce web development framework(2011) ;Musa B. ;Norwawi N.M. ;Selamat M.H. ;Faculty of Science and Technology ;Universiti Sains Islam Malaysia (USIM)Universiti Putra Malaysia (UPM)This study presents a framework for safety critical e-commerce application development based on an Extreme Programming methodology with inbuilt security across the development lifecycle to mitigate security lapses. This approach tightens security checks and balances at every stage of development process, minimizes any vulnerability that will manifest in production environment and avoids an unnecessary extension of the life cycle. � 2011 Asian Network for Scientific Information. - Some of the metrics are blocked by yourconsent settings
Publication Systematic review of web application security development model(Kluwer Academic Publishers, 2013) ;Musa Shuaibu B. ;Md Norwawi N. ;Selamat M.H. ;Al-Alwani A. ;Yanbu University College ;Universiti Sains Islam Malaysia (USIM)Universiti Putra Malaysia (UPM)In recent years, web security has been viewed in the context of securing the web application layer from attacks by unauthorized users. The vulnerabilities existing in the web application layer have been attributed either to using an inappropriate software development model to guide the development process, or the use of a software development model that does not consider security as a key factor. Therefore, this systematic literature review is conducted to investigate the various security development models used to secure the web application layer, the security approaches or techniques used in the process, the stages in the development model in which the approaches or techniques are emphasized, and the tools and mechanism used to detect vulnerabilities. The study extracted 499 publications from respectable scientific sources, i.e. the IEEE Computer Society, ACM Digital Library, Google-Scholar, Science Direct, Scopus, Springer Link and ISI Web. After investigation, only 43 key primary studies were considered for this review based on defined inclusion and exclusion criteria. From the review, it appears that no one development model is referred to as a standard or preferred model for web application development. However, agile development models seem to have gained more attention, probably due to the multiple stakeholders that are involved in discussing security viewpoints, rather than a few members of the development team. It appears also that there is consistency in the use of the threat-modeling technique, probably due to its effectiveness in dealing with different kinds of vulnerabilities. � 2013, Springer Science+Business Media Dordrecht. - Some of the metrics are blocked by yourconsent settings
Publication Wi-Fi received signal strength-based hyperbolic location estimation for indoor positioning systems(Inderscience Enterprises Ltd., 2019) ;Narzullaev A. ;Selamat M.H. ;Sharif K.Y. ;Muminov Z. ;Faculty of Science and Technology ;Universiti Sains Islam Malaysia (USIM)Universiti Putra Malaysia (UPM)Nowadays, Wi-Fi fingerprinting-based positioning systems provide enterprises the ability to track their various resources more efficiently and effectively. The main idea behind fingerprinting is to build signal strength database of target area prior to location estimation. This process is called calibration and the positioning accuracy highly depends on calibration intensity. Unfortunately, calibration procedure requires huge amount of time and effort, and makes large scale deployments of Wi-Fi based indoor positioning systems non-trivial. In this research we present a novel location estimation algorithm for Wi-Fi based indoor positioning systems. The proposed algorithm combines signal sampling and hyperbolic location estimation techniques to estimate the location of mobile users. The algorithm achieves cost-efficiency by reducing the number of fingerprint measurements while providing reliable location accuracy. Moreover, it does not require any additional hardware upgrades to the existing network infrastructure. Experimental results show that the proposed algorithm with easy-to-build signal strength database performs more accurate than conventional signal strength-based methods. � 2019 Inderscience Enterprises Ltd.