Nik Khidzir - Academia.edu (original) (raw)

Papers by Nik Khidzir

Research paper thumbnail of Conceptual Framework of Social Engineering (SoE)Attacking Risks and Prevention Technique

Social Science Research Network, 2020

Research paper thumbnail of Towards The Impact of Social Engineering (SoE) Attacking Risk Factors in Higher Learning Institute

Social Science Research Network, Jan 30, 2018

In the Information security domain the theory of social engineering attacking risk factors is in ... more In the Information security domain the theory of social engineering attacking risk factors is in Social Engineering (SoE)attacks that has an impact which would be disturbed the personal productivity of higher learning institute. The dependent variable which are threat, vulnerability, digital evidence awareness factors and one independent variable that is personal disturbance factors is used in this paper. Moreover, using as an indicator in determining disturbance of personal productivity in higher learning institute. Since multiple regression by Partial least square (PLS-SEM) is use to examined the collection of data by a questionnaire which is relevant with Social Engineering (SoE) attacking risks. And the resulting point out three dependent variables significantly influences on the independent variable of personal productivity in higher learning institute. As a matter of fact, this study concludes that the foremost influence factor on disturbance of personal productivity in higher learning institute towards the Social Engineering (SoE) attacking risk factors such as threat, vulnerability, digital evidence awareness factors. This study contributes to introductory study but vibrant understanding in stimulating the higher learning institute to become a worldwide institution.

Research paper thumbnail of Probabilistic Risk Assessment in A.I Enabled SoE Attacks

In the domain of Information security risk assessment really a complex decision-making process. W... more In the domain of Information security risk assessment really a complex decision-making process. Whereas there are a lot of unclear model of software domain and the lack of associated uncertainty are two main reasons that directly affect individual decisions making regarding risk assessment for A.I enabled SoE attacks. Whence artificial enabled social engineering attacks are effectively may happening in every levels of domain. On the other hand, the risk assessment conducted on the safety requirements on artificial enabled social engineering attacks. So, the simple meaning of social engineering is to refers to the psychologically and mentality use people to give secret information in the context of information security. A strategy of self-confidence for information collection, fraud, or access to the system, is different from a traditional "con" that it is often one of the more complex fraudulent schemes. That is why in this paper we proposed theoretical framework, which can not only demonstrate its potential for the risk assessment, but it can be sensitive and effective in analyzing a critical and uncertain operational environment that can address the extreme effects of information security.

Research paper thumbnail of Information security risk factors and management framework for ICT outsourcing / Nik Zulkarnaen Khidzir

Research paper thumbnail of The Importance of IDS and IPS in Cloud Computing Environment: Intensive Review and Future Directions

Research paper thumbnail of Accelerating Creative Techno-preneuriship Through Innovative Design and Technology Integration

KnE Social Sciences

Creative techno-preneurship investigates a new frontier in the integration of creative technology... more Creative techno-preneurship investigates a new frontier in the integration of creative technology to design more innovative entrepreneurship models to suit their business model and the goals of their organization. Entrepreneurs use this technology and approach creatively to identify opportunities from advanced creative technology research and development that can be used for entrepreneurship activities. To remain competitive, businesses must innovate. Simultaneously, technology is constantly advancing, and work-related tools are constantly changing. This forces organizations to stay current with technology and puts pressure on employees to use the technologies at their disposal to create innovative solutions that further the organization’s goals. It is hoped that this integration model will be a milestone in the trend to support future developments of digital content in particular to uplift the digital comic development in Malaysia. Keywords: creative innovation, digital technology,...

Research paper thumbnail of Employability skills: What do employers need?

PROCEEDINGS OF 8TH INTERNATIONAL CONFERENCE ON ADVANCED MATERIALS ENGINEERING & TECHNOLOGY (ICAMET 2020), 2021

This paper will be discussed critically according on the need of employers on graduates employabi... more This paper will be discussed critically according on the need of employers on graduates employability skills. The emerging of new digital technologies tremendously leads a new way

Research paper thumbnail of The Implication of Information System (Is) Success Model on Cloud-Based M-Retail Adoption Intention Among Textile Cyberpreneurs

Journal of Information System and Technology Management, Jun 15, 2021

Research paper thumbnail of Cloud-Based Mobile-Retail Application for Textile Cyberpreneurs

Proceedings of the International Conference on High Performance Compilation, Computing and Communications, 2017

Cloud computing and mobile computing paradigms have enhanced the usage of current technology amon... more Cloud computing and mobile computing paradigms have enhanced the usage of current technology among people from various sectors to perform certain required tasks. The combination of these two paradigms have also created the existence of cloud-based mobile applications that are designed to be useful in business environments, such as to be used by textile cyberpreneurs for m-retail transaction. As cloud adoption was previously low among Malaysian entrepreneurs, the usage intention factors of related cloud technology and services should be determined for better clarification and future technology enhancements. Besides, studies on m-retail or m-shopping adoption in Malaysia were merely focused on customer's perspectives rather than retailer's perspectives. In measuring the suitability of Cloud-based M-Retail (CBMR) application with the task requirements of textile cyberpreneurs, Task-Technology Fit (TTF) model is used as the basis of this research. Results from a pilot study, through a survey of selected group of textile cyberpreneurs shows instrument's reliability and positive feedbacks to support the intention to use the technology. The future direction of the study in which to apply the instruments to a larger group of respondents is also discussed along with its potential contribution.

Research paper thumbnail of Information security risk factors and management framework for ICT outsourcing / Nik Zulkarnaen Khidzir

Information Communication Technology (ICT) services have become increasingly important in today’s... more Information Communication Technology (ICT) services have become increasingly important in today’s business environment with most private and government agencies without sufficient resources and expertise outsourcing their ICT projects to vendors. However, this strategy could invite potentially damaging information security risks (ISRs). Subsequently, a dedicated framework for information security risk management for ICT outsourcing activities needs to be in place to address and manage its related risk factors. The research focuses on managing Information Security Risks (ISRs) in ICT outsourcing projects in a Malaysian environment. The mixed research method, combining the quantitative and qualitative was employed to achieve the research objectives. 110 respondents participated in a survey while focus groups from eight organizations were interviewed. From the quantitative study, the critical information security risks in ICT outsourcing project were identified and ranked. Furthermore,...

Research paper thumbnail of The development of engineering graphic for furniture studio

Project-oriented learning is a main approach which implement in workshop furniture, Faculty of Cr... more Project-oriented learning is a main approach which implement in workshop furniture, Faculty of Creative Technology and Heritage, University Malaysia Kelantan (UMK). However, the implementation of project-oriented approach is undirected and just expect to lecturer and student initiatives without appropriate guidelines, particularly in the application of engineering processes. Workflow-based engineering is important in learning furniture making. Workflow can be driven right through the systematic and methodical process. Therefore, engineering graphics module has been designed and developed to provide guidance to students in performing the work properly and indirectly the self-directed learning through project-oriented learning approach can be implemented more better and effectively.

Research paper thumbnail of A Critical Review: Digital Media Evolution, Opportunities and Challenges

International Journal of Creative Future and Heritage (TENIAT), 2014

AbstrakMedia digital telah dikenal pasti sebagai salah satu media yang paling penting di abad ke-... more AbstrakMedia digital telah dikenal pasti sebagai salah satu media yang paling penting di abad ke-21. Media baruini dianggap cara yang paling berkesan untuk mengurus kadar penghasilan data digital yang meningkatsetiap hari terutama di dunia siber. Artikel ini menjejaki evolusi pembangunan teknologi media digital,peluang dan cabaran terhadap pengamal industri. Kajian literatur berkaitan dan analisis kandunganmedia digital berdasarkan bentuk dan keupayaannya (Penerokaan, Eksperimen, Komunikasi, Komposit,dan Pintar) dan mengetengahkan perbincangan isu-isu berkaitan peluang dan cabaran dalam industri.Pembangunan media digital mencipta beberapa peluang baru untuk penghasilan kandungan digital darisegi kreativiti, kebebasan dan fleksibel untuk berinteraksi dengan media digital. Walau bagaimanapun,terdapat beberapa cabaran yang perlu diatasi seperti pemilikan maklumat, hak cipta dan harta intelek bagimemastikan masyarakat digital memperoleh manfaat sebenar pembangunan media digital. Hasil k...

Research paper thumbnail of A hybrid Particle swarm optimization -Extreme Learning Machine approach for Intrusion Detection System

2018 IEEE Student Conference on Research and Development (SCOReD), 2018

There are several limitations that facing intrusion-detection system in current days, such as hig... more There are several limitations that facing intrusion-detection system in current days, such as high rates of false positive alerts, low detection rates of rare but dangerous attacks. Daily, there are reports of incidents such as major ex-filtration of data for the purposes of stealing identities. Hybrid model's approaches have been widely used to increase the effectiveness of intrusiondetection platforms. This work proposes the extreme learning machine (ELM) is one of the poplar machine learning algorithms which, easy to implement with excellent learning performance characteristics. However, the internal power parameters (weight and basis) of ELM are initialized at random, causing the algorithm to be unstable. The Particle swarm optimization (PSO) is a well-known meta-heuristic which is used in this research to optimize the ELM. Our propose model has been apple based as intrusion detection and validated based on NSL-KDD data set. Our developed model has been compared against a basic ELM. PSO-ELM has outperformed a basic model in the testing accuracy.

Research paper thumbnail of An Investigation of AI enabled SoE Attacking Impact in Higher Learning Institute: Structural Equation Modeling (SEM) Approach

Journal of Applied & Computational Mathematics, 2018

Theory of artificial enabled social engineering attacking risk factors are employed in this study... more Theory of artificial enabled social engineering attacking risk factors are employed in this study to determine the impact that disturbed the personal productivity of higher learning institute of the user towards the AI enable SoE attacking. Five independent variable which are threat, vulnerability, valuation, countermeasure and personal disturbance factors using in this paper. Moreover using as an indicator in determining disturbance of personal productivity in an higher learning institute. Since multiple regression by using Structural Equation Modelling-Partial Least Square (SEM-PLS) is used to examine the collection of data by a questionnaire which is relevant with AI enable SE attacking risk. And the resulting point out three independent variable significantly influences the personal productivity in higher learning institute. As a matter of fact this study concludes that the foremost influence factor on disturbance of personal productivity in higher learning institute towards the AI enables SoE attacking risk factors such as threat, vulnerability, valuation and countermeasure. This study contributes to introductory study but vibrant understanding in stimulating the higher learning institute to become a worldwide institution.

Research paper thumbnail of A Detailed Analysis on Intrusion Identification Mechanism in Cloud Computing and Datasets

Research paper thumbnail of Mudahnya belajar Adobe Illustrator CS6

Research paper thumbnail of Building Innovative Ecosphere in Malaysia Higher Education

Solid State Technology, 2020

To creating an ecosystem of innovation in higher education institutions needs to strategic planni... more To creating an ecosystem of innovation in higher education institutions needs to strategic planning and implementation. Studies of adoption and existing practices for innovation is important in formulating strategies towards the implementation of a holistic innovation in higher education institutions at Malaysia. The study it was conducted at one of the higher education institutions in Malaysia. The study was conducted to determine the acceptability of existing practices and innovation in the educational institutions. The acceptance factors and practice of innovation was identifying based on six main areas such as; (i) Knowledge of innovation model, (ii) Acceptance of the application ecosystem of innovation in higher education institutions, (iii) Implementation challenges of innovation in higher education institutions, (iv) The characteristics of innovative human capital, (v) Teaching and learning approaches to embed innovation and, (vi) The general view of the education system. The...

Research paper thumbnail of Social engineering (SoE) attacks towards network security in higher learning institute: The partial least squares path modeling approach

PROCEEDINGS OF 8TH INTERNATIONAL CONFERENCE ON ADVANCED MATERIALS ENGINEERING & TECHNOLOGY (ICAMET 2020), 2021

The basic network security issues have changed very little over the past decade. Protecting the c... more The basic network security issues have changed very little over the past decade. Protecting the confidential institutional information, preventing unauthorized access defending the network against SoE attacks remain primary concerns of network security professional toady. Widespread remote access by the high number of increasing sophisticated SoE attacks is making network security significantly more challenging in the institute. Confidential information can reside in two states on a network. It can reside on institutional physical storage media, such as a hard drive or memory, or it can reside in transit across the physical network wire in the form of packets. These two information states present multiple opportunities for SoE attacks from users in higher leaning institute internal network, as well as those users on the internet. Given the dramatic rise in external security threats, couples with the rising cost of network intrusions. Institution are more pressured than ever to defin...

Research paper thumbnail of Instrumen Kesediaan Pembelajaran Terarah Kendiri

International Journal of Creative Future and Heritage (TENIAT), 2015

AbstrakInstrumen kesediaan pembelajaran terarah kendiri (KPTK) adalah merupakan instrumen yangdib... more AbstrakInstrumen kesediaan pembelajaran terarah kendiri (KPTK) adalah merupakan instrumen yangdibangunkan bagi mengukur tahap kesediaan pelajar untuk belajar secara terarah kendiri. InstrumenKPTK dibangunkan hasil daripada adaptasi intrumen ”self-directed learning readiness scale” (SDLRS)yang dibangunkan oleh Guglielmino (1977). Instrumen SDLRS ini diadaptasikan supaya penggunaaninstrumen yang akan dibangunkan dapat disesuaikan dengan iklim setempat dari pelbagai aspek yangsaling mempengaruhi dalam sistem pengajaran dan pembelajaran di Malaysia. Antara aspek yang salingmempengaruhi sistem pengajaran dan pembelajaran di Malaysia adalah seperti aspek pengurusan,pelaksanaan, sistem pembelajaran, kemudahan infrastruktur, motivasi pelajar, pencapaian dan tahapsosioekonomi pelajar. Pembangunan instrumen KPTK ini melalui lima fasa utama iaitu ; penterjemahan,pengesahan dari pakar bahasa, kajian rintis, analisis kebolehpercayaan dan akhirnya pembangunanformat instrumen. Melalui analisis yan...

Research paper thumbnail of Digital Media Literacy Awareness on Mobile Device Security Issues

SSRN Electronic Journal, 2018

Digital literacy is the set of competencies required for full participation in a knowledge societ... more Digital literacy is the set of competencies required for full participation in a knowledge society. It includes knowledge, skills, and behaviors involving the effective use of digital devices such as smartphones, tablets, laptops for purposes of communication, expression, collaboration and advocacy. Along with this expansion came a number of security issues to affect mobile devices. A chance to have a tiny and powerful device that is Internet linked and allows communication from anywhere at any time is alluring as well as a problem for companies. Many individuals who have attached their personal smartphones to corporate networks have found out the hard way the cost of doing so. Specifically, there have been a handful of cases where individuals who attached their own personal devices to a company network had their personal phone wiped and all their data and other information lost that was stored on it. Why did this happen? Simply put, a system administrator sent out a remote wipe command to the device and instructed it to wipe itself of all apps and data to keep it from falling in the wrong hands. Or an administrator may have found the device and did not recognize it, so they wiped it in response. If we have an Android device or have read about the operating system, you may have heard the term “rooting the device.” In a nutshell, this refers to undertaking a process of gaining root access to a device. Typically, this involves running an application or script that grants root access to the user. Once access is granted, the user can do pretty much whatever they want on the system without restriction. However, one of the downsides of this process is that the device is now exposed to greater danger from external threats as well. Moreover, this article focus on how digital devices such as smartphones communication and store information for "media education" that is used to define the process of teaching and learning about media. It is about developing people's critical and creative abilities when it comes to mass media, popular culture and digital media. Since digital media is using smartphone for store information and article also referring how to maintain security of these smartphone data. Keywords: encryption, remoteness, digital affixing signature, trojan horse attacks, malware, social engineering attacks, digital literacy, digital media

Research paper thumbnail of Conceptual Framework of Social Engineering (SoE)Attacking Risks and Prevention Technique

Social Science Research Network, 2020

Research paper thumbnail of Towards The Impact of Social Engineering (SoE) Attacking Risk Factors in Higher Learning Institute

Social Science Research Network, Jan 30, 2018

In the Information security domain the theory of social engineering attacking risk factors is in ... more In the Information security domain the theory of social engineering attacking risk factors is in Social Engineering (SoE)attacks that has an impact which would be disturbed the personal productivity of higher learning institute. The dependent variable which are threat, vulnerability, digital evidence awareness factors and one independent variable that is personal disturbance factors is used in this paper. Moreover, using as an indicator in determining disturbance of personal productivity in higher learning institute. Since multiple regression by Partial least square (PLS-SEM) is use to examined the collection of data by a questionnaire which is relevant with Social Engineering (SoE) attacking risks. And the resulting point out three dependent variables significantly influences on the independent variable of personal productivity in higher learning institute. As a matter of fact, this study concludes that the foremost influence factor on disturbance of personal productivity in higher learning institute towards the Social Engineering (SoE) attacking risk factors such as threat, vulnerability, digital evidence awareness factors. This study contributes to introductory study but vibrant understanding in stimulating the higher learning institute to become a worldwide institution.

Research paper thumbnail of Probabilistic Risk Assessment in A.I Enabled SoE Attacks

In the domain of Information security risk assessment really a complex decision-making process. W... more In the domain of Information security risk assessment really a complex decision-making process. Whereas there are a lot of unclear model of software domain and the lack of associated uncertainty are two main reasons that directly affect individual decisions making regarding risk assessment for A.I enabled SoE attacks. Whence artificial enabled social engineering attacks are effectively may happening in every levels of domain. On the other hand, the risk assessment conducted on the safety requirements on artificial enabled social engineering attacks. So, the simple meaning of social engineering is to refers to the psychologically and mentality use people to give secret information in the context of information security. A strategy of self-confidence for information collection, fraud, or access to the system, is different from a traditional "con" that it is often one of the more complex fraudulent schemes. That is why in this paper we proposed theoretical framework, which can not only demonstrate its potential for the risk assessment, but it can be sensitive and effective in analyzing a critical and uncertain operational environment that can address the extreme effects of information security.

Research paper thumbnail of Information security risk factors and management framework for ICT outsourcing / Nik Zulkarnaen Khidzir

Research paper thumbnail of The Importance of IDS and IPS in Cloud Computing Environment: Intensive Review and Future Directions

Research paper thumbnail of Accelerating Creative Techno-preneuriship Through Innovative Design and Technology Integration

KnE Social Sciences

Creative techno-preneurship investigates a new frontier in the integration of creative technology... more Creative techno-preneurship investigates a new frontier in the integration of creative technology to design more innovative entrepreneurship models to suit their business model and the goals of their organization. Entrepreneurs use this technology and approach creatively to identify opportunities from advanced creative technology research and development that can be used for entrepreneurship activities. To remain competitive, businesses must innovate. Simultaneously, technology is constantly advancing, and work-related tools are constantly changing. This forces organizations to stay current with technology and puts pressure on employees to use the technologies at their disposal to create innovative solutions that further the organization’s goals. It is hoped that this integration model will be a milestone in the trend to support future developments of digital content in particular to uplift the digital comic development in Malaysia. Keywords: creative innovation, digital technology,...

Research paper thumbnail of Employability skills: What do employers need?

PROCEEDINGS OF 8TH INTERNATIONAL CONFERENCE ON ADVANCED MATERIALS ENGINEERING & TECHNOLOGY (ICAMET 2020), 2021

This paper will be discussed critically according on the need of employers on graduates employabi... more This paper will be discussed critically according on the need of employers on graduates employability skills. The emerging of new digital technologies tremendously leads a new way

Research paper thumbnail of The Implication of Information System (Is) Success Model on Cloud-Based M-Retail Adoption Intention Among Textile Cyberpreneurs

Journal of Information System and Technology Management, Jun 15, 2021

Research paper thumbnail of Cloud-Based Mobile-Retail Application for Textile Cyberpreneurs

Proceedings of the International Conference on High Performance Compilation, Computing and Communications, 2017

Cloud computing and mobile computing paradigms have enhanced the usage of current technology amon... more Cloud computing and mobile computing paradigms have enhanced the usage of current technology among people from various sectors to perform certain required tasks. The combination of these two paradigms have also created the existence of cloud-based mobile applications that are designed to be useful in business environments, such as to be used by textile cyberpreneurs for m-retail transaction. As cloud adoption was previously low among Malaysian entrepreneurs, the usage intention factors of related cloud technology and services should be determined for better clarification and future technology enhancements. Besides, studies on m-retail or m-shopping adoption in Malaysia were merely focused on customer's perspectives rather than retailer's perspectives. In measuring the suitability of Cloud-based M-Retail (CBMR) application with the task requirements of textile cyberpreneurs, Task-Technology Fit (TTF) model is used as the basis of this research. Results from a pilot study, through a survey of selected group of textile cyberpreneurs shows instrument's reliability and positive feedbacks to support the intention to use the technology. The future direction of the study in which to apply the instruments to a larger group of respondents is also discussed along with its potential contribution.

Research paper thumbnail of Information security risk factors and management framework for ICT outsourcing / Nik Zulkarnaen Khidzir

Information Communication Technology (ICT) services have become increasingly important in today’s... more Information Communication Technology (ICT) services have become increasingly important in today’s business environment with most private and government agencies without sufficient resources and expertise outsourcing their ICT projects to vendors. However, this strategy could invite potentially damaging information security risks (ISRs). Subsequently, a dedicated framework for information security risk management for ICT outsourcing activities needs to be in place to address and manage its related risk factors. The research focuses on managing Information Security Risks (ISRs) in ICT outsourcing projects in a Malaysian environment. The mixed research method, combining the quantitative and qualitative was employed to achieve the research objectives. 110 respondents participated in a survey while focus groups from eight organizations were interviewed. From the quantitative study, the critical information security risks in ICT outsourcing project were identified and ranked. Furthermore,...

Research paper thumbnail of The development of engineering graphic for furniture studio

Project-oriented learning is a main approach which implement in workshop furniture, Faculty of Cr... more Project-oriented learning is a main approach which implement in workshop furniture, Faculty of Creative Technology and Heritage, University Malaysia Kelantan (UMK). However, the implementation of project-oriented approach is undirected and just expect to lecturer and student initiatives without appropriate guidelines, particularly in the application of engineering processes. Workflow-based engineering is important in learning furniture making. Workflow can be driven right through the systematic and methodical process. Therefore, engineering graphics module has been designed and developed to provide guidance to students in performing the work properly and indirectly the self-directed learning through project-oriented learning approach can be implemented more better and effectively.

Research paper thumbnail of A Critical Review: Digital Media Evolution, Opportunities and Challenges

International Journal of Creative Future and Heritage (TENIAT), 2014

AbstrakMedia digital telah dikenal pasti sebagai salah satu media yang paling penting di abad ke-... more AbstrakMedia digital telah dikenal pasti sebagai salah satu media yang paling penting di abad ke-21. Media baruini dianggap cara yang paling berkesan untuk mengurus kadar penghasilan data digital yang meningkatsetiap hari terutama di dunia siber. Artikel ini menjejaki evolusi pembangunan teknologi media digital,peluang dan cabaran terhadap pengamal industri. Kajian literatur berkaitan dan analisis kandunganmedia digital berdasarkan bentuk dan keupayaannya (Penerokaan, Eksperimen, Komunikasi, Komposit,dan Pintar) dan mengetengahkan perbincangan isu-isu berkaitan peluang dan cabaran dalam industri.Pembangunan media digital mencipta beberapa peluang baru untuk penghasilan kandungan digital darisegi kreativiti, kebebasan dan fleksibel untuk berinteraksi dengan media digital. Walau bagaimanapun,terdapat beberapa cabaran yang perlu diatasi seperti pemilikan maklumat, hak cipta dan harta intelek bagimemastikan masyarakat digital memperoleh manfaat sebenar pembangunan media digital. Hasil k...

Research paper thumbnail of A hybrid Particle swarm optimization -Extreme Learning Machine approach for Intrusion Detection System

2018 IEEE Student Conference on Research and Development (SCOReD), 2018

There are several limitations that facing intrusion-detection system in current days, such as hig... more There are several limitations that facing intrusion-detection system in current days, such as high rates of false positive alerts, low detection rates of rare but dangerous attacks. Daily, there are reports of incidents such as major ex-filtration of data for the purposes of stealing identities. Hybrid model's approaches have been widely used to increase the effectiveness of intrusiondetection platforms. This work proposes the extreme learning machine (ELM) is one of the poplar machine learning algorithms which, easy to implement with excellent learning performance characteristics. However, the internal power parameters (weight and basis) of ELM are initialized at random, causing the algorithm to be unstable. The Particle swarm optimization (PSO) is a well-known meta-heuristic which is used in this research to optimize the ELM. Our propose model has been apple based as intrusion detection and validated based on NSL-KDD data set. Our developed model has been compared against a basic ELM. PSO-ELM has outperformed a basic model in the testing accuracy.

Research paper thumbnail of An Investigation of AI enabled SoE Attacking Impact in Higher Learning Institute: Structural Equation Modeling (SEM) Approach

Journal of Applied & Computational Mathematics, 2018

Theory of artificial enabled social engineering attacking risk factors are employed in this study... more Theory of artificial enabled social engineering attacking risk factors are employed in this study to determine the impact that disturbed the personal productivity of higher learning institute of the user towards the AI enable SoE attacking. Five independent variable which are threat, vulnerability, valuation, countermeasure and personal disturbance factors using in this paper. Moreover using as an indicator in determining disturbance of personal productivity in an higher learning institute. Since multiple regression by using Structural Equation Modelling-Partial Least Square (SEM-PLS) is used to examine the collection of data by a questionnaire which is relevant with AI enable SE attacking risk. And the resulting point out three independent variable significantly influences the personal productivity in higher learning institute. As a matter of fact this study concludes that the foremost influence factor on disturbance of personal productivity in higher learning institute towards the AI enables SoE attacking risk factors such as threat, vulnerability, valuation and countermeasure. This study contributes to introductory study but vibrant understanding in stimulating the higher learning institute to become a worldwide institution.

Research paper thumbnail of A Detailed Analysis on Intrusion Identification Mechanism in Cloud Computing and Datasets

Research paper thumbnail of Mudahnya belajar Adobe Illustrator CS6

Research paper thumbnail of Building Innovative Ecosphere in Malaysia Higher Education

Solid State Technology, 2020

To creating an ecosystem of innovation in higher education institutions needs to strategic planni... more To creating an ecosystem of innovation in higher education institutions needs to strategic planning and implementation. Studies of adoption and existing practices for innovation is important in formulating strategies towards the implementation of a holistic innovation in higher education institutions at Malaysia. The study it was conducted at one of the higher education institutions in Malaysia. The study was conducted to determine the acceptability of existing practices and innovation in the educational institutions. The acceptance factors and practice of innovation was identifying based on six main areas such as; (i) Knowledge of innovation model, (ii) Acceptance of the application ecosystem of innovation in higher education institutions, (iii) Implementation challenges of innovation in higher education institutions, (iv) The characteristics of innovative human capital, (v) Teaching and learning approaches to embed innovation and, (vi) The general view of the education system. The...

Research paper thumbnail of Social engineering (SoE) attacks towards network security in higher learning institute: The partial least squares path modeling approach

PROCEEDINGS OF 8TH INTERNATIONAL CONFERENCE ON ADVANCED MATERIALS ENGINEERING & TECHNOLOGY (ICAMET 2020), 2021

The basic network security issues have changed very little over the past decade. Protecting the c... more The basic network security issues have changed very little over the past decade. Protecting the confidential institutional information, preventing unauthorized access defending the network against SoE attacks remain primary concerns of network security professional toady. Widespread remote access by the high number of increasing sophisticated SoE attacks is making network security significantly more challenging in the institute. Confidential information can reside in two states on a network. It can reside on institutional physical storage media, such as a hard drive or memory, or it can reside in transit across the physical network wire in the form of packets. These two information states present multiple opportunities for SoE attacks from users in higher leaning institute internal network, as well as those users on the internet. Given the dramatic rise in external security threats, couples with the rising cost of network intrusions. Institution are more pressured than ever to defin...

Research paper thumbnail of Instrumen Kesediaan Pembelajaran Terarah Kendiri

International Journal of Creative Future and Heritage (TENIAT), 2015

AbstrakInstrumen kesediaan pembelajaran terarah kendiri (KPTK) adalah merupakan instrumen yangdib... more AbstrakInstrumen kesediaan pembelajaran terarah kendiri (KPTK) adalah merupakan instrumen yangdibangunkan bagi mengukur tahap kesediaan pelajar untuk belajar secara terarah kendiri. InstrumenKPTK dibangunkan hasil daripada adaptasi intrumen ”self-directed learning readiness scale” (SDLRS)yang dibangunkan oleh Guglielmino (1977). Instrumen SDLRS ini diadaptasikan supaya penggunaaninstrumen yang akan dibangunkan dapat disesuaikan dengan iklim setempat dari pelbagai aspek yangsaling mempengaruhi dalam sistem pengajaran dan pembelajaran di Malaysia. Antara aspek yang salingmempengaruhi sistem pengajaran dan pembelajaran di Malaysia adalah seperti aspek pengurusan,pelaksanaan, sistem pembelajaran, kemudahan infrastruktur, motivasi pelajar, pencapaian dan tahapsosioekonomi pelajar. Pembangunan instrumen KPTK ini melalui lima fasa utama iaitu ; penterjemahan,pengesahan dari pakar bahasa, kajian rintis, analisis kebolehpercayaan dan akhirnya pembangunanformat instrumen. Melalui analisis yan...

Research paper thumbnail of Digital Media Literacy Awareness on Mobile Device Security Issues

SSRN Electronic Journal, 2018

Digital literacy is the set of competencies required for full participation in a knowledge societ... more Digital literacy is the set of competencies required for full participation in a knowledge society. It includes knowledge, skills, and behaviors involving the effective use of digital devices such as smartphones, tablets, laptops for purposes of communication, expression, collaboration and advocacy. Along with this expansion came a number of security issues to affect mobile devices. A chance to have a tiny and powerful device that is Internet linked and allows communication from anywhere at any time is alluring as well as a problem for companies. Many individuals who have attached their personal smartphones to corporate networks have found out the hard way the cost of doing so. Specifically, there have been a handful of cases where individuals who attached their own personal devices to a company network had their personal phone wiped and all their data and other information lost that was stored on it. Why did this happen? Simply put, a system administrator sent out a remote wipe command to the device and instructed it to wipe itself of all apps and data to keep it from falling in the wrong hands. Or an administrator may have found the device and did not recognize it, so they wiped it in response. If we have an Android device or have read about the operating system, you may have heard the term “rooting the device.” In a nutshell, this refers to undertaking a process of gaining root access to a device. Typically, this involves running an application or script that grants root access to the user. Once access is granted, the user can do pretty much whatever they want on the system without restriction. However, one of the downsides of this process is that the device is now exposed to greater danger from external threats as well. Moreover, this article focus on how digital devices such as smartphones communication and store information for "media education" that is used to define the process of teaching and learning about media. It is about developing people's critical and creative abilities when it comes to mass media, popular culture and digital media. Since digital media is using smartphone for store information and article also referring how to maintain security of these smartphone data. Keywords: encryption, remoteness, digital affixing signature, trojan horse attacks, malware, social engineering attacks, digital literacy, digital media