Norshima Humaidi - Academia.edu (original) (raw)

Papers by Norshima Humaidi

Research paper thumbnail of Mobile commerce applications service quality in enhancing customer loyalty intention: mediating role of customer satisfaction

Journal of Financial Services Marketing, Nov 4, 2022

Research paper thumbnail of The Effect of Innovation Success Factors Towards Organizational Performance in Automotive Industry

International Journal of Business and Administrative Studies, 2018

Organizational performance is essential and necessary for every organization to properly create a... more Organizational performance is essential and necessary for every organization to properly create and sustain a healthy and effective results-oriented culture. In an economy increasingly driven by technological change, businesses need to stay abreast of the latest innovations to keep their competitive edge and access new market opportunities. Therefore, to excel in business, organizations must pay attention, especially to their technology implementation process. This study aims to analyze the effect of technology innovation that contributes to organizational performance. The innovation success model was adapted, focusing on three factors (technology selection, technology capability and technology management capability), and this study also added a successful technology implementation into the new framework. 131 questionnaires were distributed to 8 automotive companies in Shah Alam, Selangor. Based on the data analysis, the result showed that all the innovation success factors and successful technology implementation positively influence organizational performance. Technology capability is shown to be the strongest effect on organizational performance, among others. This study will hope to provide a guideline to the management of the automotive industry on how to improve their organizational performance through innovation.

Research paper thumbnail of Procedural Information Security Countermeasure Awareness and Cybersecurity Protection Motivation in Enhancing Employee’s Cybersecurity Protective Behaviour

2022 10th International Symposium on Digital Forensics and Security (ISDFS)

Research paper thumbnail of Development of Human Resource Information System: The Managerial Implications

International Journal of Academic Research in Business and Social Sciences, 2021

Human Resource Information System (FBM-HRIS) was developed to manage information of human resourc... more Human Resource Information System (FBM-HRIS) was developed to manage information of human resource training, conferences, workshops and any activities through Internet. FBM-HRIS aims to provide paperless up to 90% and to provide low cost and reliable automation of the existing systems. FBM-HRIS also provides excellent security data at every level of user-system interaction and also provides robust and reliable storage and backup facilities. Using action research technique, several categories of user participated in this study to get their feedbacks regarding service quality of submitting and managing human resource activity application before and after FBM-HRIS development. The e-survey was constructed and distributed to all selected participants. The results found that FBM-HRIS has several modules which provide many benefits to the faculty such as the ability to support tracking day-today human resource activities (staff training information, conferences activities etc.), improving faculty strategic planning in an organized and systematic way, and among others.

Research paper thumbnail of Investigation on Project Management Performance Using Knowledge Project Management Performance Assessment Model : A Pilot Study

Project Management is an important tool use in a project development. Therefore, as a project man... more Project Management is an important tool use in a project development. Therefore, as a project manager, he/she should practice project management adequately. This study was conducted to construct a research model namely Knowledge Project Management Performance Assessment (KPMPA) model. In finding the gap of the study, several literatures on project management issues have been reviewed. Based on the literature review, the study posited four constructs (Project Leadership, Project Teamwork, Project Life Cycle, and Project Knowledge) which are believed can influence project management performance. The Key Performance Indicators (KPIs) is use to evaluate the Information Communication and Technology (ICT) project management performance. Pilot study was conducted with 42 respondents. A result of reliability analysis shown the alpha value for each construct is more than 0.7, which means all constructs are acceptable. The proposed model will be used to investigate the performance of project ...

Research paper thumbnail of The Moderating Effect of Working Experience on Health Information System Security Policies Compliance Behaviour

Malaysian Journal of Computer Science, 2015

This study was conducted to investigate the moderating effect of health professional’s working ex... more This study was conducted to investigate the moderating effect of health professional’s working experience on the relationship between factors of Health Information System Security Policies Compliance Behaviour (HISSPC) model. A survey (i.e., n = 454) was conducted to test the differences between high experience and low experiencehealth professionals who were Health Information System (HIS) users. The HISSPC model was tested using partial least squares (PLS) approachwith results indicating the coefficient of determination (i.e., R 2 ) for high experience group (i.e., 63 percent)to be slightly higher than the low experience group(i.e., 60 percent). Statistical differences were noted for the relationship between management support and user’s compliance behaviour in both groups,with stronger relationship forlow experienceHIS users compared to high experience HIS users. In contrast, perceived susceptibility was found to significantly influence highly experienced users to comply with HIS ...

Research paper thumbnail of Students ’ Performance on the Implementation of Online Learning System

The use of Information technology (IT) and the Internet are the new paradigm in the 21 st Century... more The use of Information technology (IT) and the Internet are the new paradigm in the 21 st Century has introduced new concept of learning known as e-Learning or online learning. However, there are some issues regarding the implementation of online learning, for instance number of students using the system is not encouraging and this will give an impact to student’s performances. Therefore, this study is conducted to examine the relationship of readiness and attitude factor on students’ performance towards the implementation of online learning and identify the differences between genders in student readiness for online learning. Data was gathered from 331 part-time students in eight e-PJJ program at UiTM Shah Alam, Malaysia. The result of analysis has shown that, attitude and readiness have positively influenced the students’ performances on the implementation of online learning system. However, both factors have moderate correlation. Furthermore, the analysis has shown that there is ...

Research paper thumbnail of The role of project knowledge in IT project management performance

Information-an International Interdisciplinary Journal, 2016

Research paper thumbnail of Investigating the Relationship of Users' Behavior and Internal Security Threat towards the Implementation of Total Health Information System (THIS) in Malaysian Medical Institutions

Australian journal of basic and applied sciences, 2011

This paper have been carried out with the purpose to develop research model that can be used to i... more This paper have been carried out with the purpose to develop research model that can be used to investigate the relationship of users' behavior and internal security threat towards the implementation of Total Health Information System (THIS). In doing so, several study related with health information system and information security effectiveness have been reviewed to construct research model. The study only focuses on medical institution which fully implements THIS. The outcome of the study will help the researcher to conducts study regarding information security management which significant to the medical institution in improving health record management. Security aspect is an important in medical institution which implements THIS. However, without good management practice this cannot be implemented effectively and efficiently. The study is perhaps one of the first to develop THIS performance model to investigate the relationship of users' behavior and internal security thr...

Research paper thumbnail of Continuous usage intention of Location-based Services (LBS) technology among smartphone users in Malaysia

Pertanika journal of social science and humanities, 2017

Mobile phone utilisation is changing from basic communication features and locationbased services... more Mobile phone utilisation is changing from basic communication features and locationbased services (LBS) has become an important feature. In developing countries such as Malaysia, the development and implementation of LBS can be important for the public since an LBS does not only boost individual decision making, but also supports the business functionality depending on its operation policy. We conducted a research to investigate users’ expectation and intention to use the LBS. Developing the work based on Unified Theory of Acceptance and Use of Technology (UTAUT). The findings show the roles of effort expectancy and social influence in predicting the intention to use of LBS.

Research paper thumbnail of Stemming relates to deciding which documents in a collection should be retrieved to satisfy a user's need for information. Stemming is used to remove derivational suffixes as well as inflections (i.e. adding

This paper presents an integrated language model to improve document relevancy for text-queries. ... more This paper presents an integrated language model to improve document relevancy for text-queries. To be precise, an integrated stemming-lemmatization (S-L) model was developed and its retrieval performance was compared at three document levels, that is, at top 5, 10 and 15. A prototype search engine was developed and fifteen queries were executed. The mean average precisions revealed the S-L model to outperform the baseline (i.e. no language processing), stemming and also the lemmatization models at all three levels of the documents. These results were also supported by the histogram precisions which illustrated the integrated model to improve the document relevancy. However, it is to note that the precision differences between the various models were insignificant. Overall the study found that when language processing techniques, that is, stemming and lemmatization are combined, more relevant documents are retrieved.

Research paper thumbnail of The Influences of Occupational Safety and Health Administrative (OSHA) Dimension Towards OSHA Awareness Among Employees

An increasing number of occupational accidents in various industries have motivated this study to... more An increasing number of occupational accidents in various industries have motivated this study to be conducted particularly on investigating OSHA awareness among employees. The present study is concerned with the two main issues, 1) to determine the level of OSHA awareness among employees and 2) to ascertain the relationship between OSHA dimensions and OSHA awareness. Data was collected from 260 employees from a reputable Government Link Company (GLC) via questionnaire survey. Simple random sampling was utilized in selecting the sample. The overall findings of the study illustrates that the level of OSHA awareness among employees is at the sufficient level. The employees in this company are well aware as well as practicing safety procedures and practices. The study also indicates that there is a positive and significant relationship between the dimensions with OSHA awareness.

Research paper thumbnail of The Internet Addiction among Youth in Tertiary Education

International Journal of Academic Research in Business and Social Sciences, 2021

Research paper thumbnail of Entertainment Gratification, Informative Gratification, Web Irritation and Self-Efficacy as Motivational Factors to Online Shopping Intention

Management and Accounting Review (MAR), 2018

The Internet technology and pervasive computing has provided consumers with privileges to shop on... more The Internet technology and pervasive computing has provided consumers with privileges to shop online. In addition, the Industry 4.0 agenda has placed the business web and the social web as the ecosystem domains, which explains why online shopping is a norm today. While many studies have been conducted to investigate the determinants of consumers’ intention to use online shopping, mixed results are always found, especially when the business take unique approaches for their digital presence. Besides, even though self-efficacy has been studied extensively in information system research, technological complexity has always given a challenge to consumers’ computing ability. Building on the Use and Gratification Theory (GTA) and the Social Cognitive Theory (SCT), this study aims to examine the relationships between entertainment gratification, informative gratification, web irritation and self-efficacy towards individual’s intention to use online shopping. Using the quantitative survey a...

Research paper thumbnail of The Role of Social Media as a Persuasive Ubiquitous Learning Tool for Social Engagement Towards Social Sustainability

ADVANCES IN BUSINESS RESEARCH INTERNATIONAL JOURNAL, 2020

Social media has infiltrated the 21st-century generations of Internet users, making it a very pro... more Social media has infiltrated the 21st-century generations of Internet users, making it a very prominent means of communications dissemination, particularly among students at a higher level of education. As technology will continue to evolve the role humans play in the near future, everyone will be required to adapt their skills throughout their daily and working lives. Therefore, individuals especially younger generations will need to act and engage in lifelong learning, so they are adaptable when the changes happen. Nowadays, the learning process is not only confined to the walls of the classrooms, instead, students are also able to access knowledge at any time and place that they are comfortable with to clear their doubts. Social media has also brought forth the concept of ubiquitous learning, which means that students can explore and request a related topic of interest from experts from all around the world. While this social engagement brings many benefits to the students partic...

Research paper thumbnail of Industry revolution 4.0: the readiness of graduates of higher education institutions for fulfilling job demands

Revista Română de Informatică și Automatică, 2020

Research paper thumbnail of The Role of Self-Efficacy in Employee’s Compliance Behaviour Towards Information Security Policies: Multi-Group Analysis

Advanced Science Letters, 2018

Reaserch on chaos-based communication, or simply chaotic communication, has been ongoing since th... more Reaserch on chaos-based communication, or simply chaotic communication, has been ongoing since the early nineties. It was argued that chaotic communication has the potential of addressing the security issue that is omnipresent in standard communication systems, yet this technology has not taken over traditional methods of communication. In this paper, we give a brief survey on the existing methods for designing chaosbased communication schemes. We also provide a discussion as to why there is still some reluctance in applying this technology in practice. Finally, we propose some solutions to address this issue. In more detail, we propose a framework for the development of the fifth generation of chaotic cryptosystems based on bridging chaotic and traditional modulation methods. Then, we discuss the shape that this generation of chaotic cryptosystems could take and explain the challenges in designing and implementing them.

Research paper thumbnail of SAIS Service Quality and Student’s Satisfaction Towards the Implementation of Student Activity Information System (SAIS): The Moderating Role of SAIS Service Convenience

Foundations of Management, 2019

Student Activity Information System (SAIS) was developed with the aims to efficiently record the ... more Student Activity Information System (SAIS) was developed with the aims to efficiently record the applications of student’s activity at the Faculty of Business and Management (FBM), Universiti Teknologi MARA (UiTM) Selangor, Malaysia and to assist the administrator to manage the students’ activities effectively. By using different e-service quality dimensions, this study proposed a higher order factor of SAIS Service Quality with an attempt to determine a moderating effect of SAIS Service Convenience between the relationship of SAIS Service Quality and Student’s Satisfaction. Quantitative data was gathered from 94 SAIS users and the data were analyzed by using SmartPLS 3.0. The analysis result showed that SAIS Service Quality and SAIS Service Convenience were positively influenced the student’s satisfaction. Moreover, the result also revealed that the higher order factor of SAIS Service Convenience was not to moderate the relationship between the SAIS Service Quality and Student’s Sa...

Research paper thumbnail of A Captology Study on Behavior Model for Persuasive Ubiquitous Technology

International Journal of Machine Learning and Computing, 2017

This is a conceptual paper to study the role of privacy in the behavior model for persuasive ubiq... more This is a conceptual paper to study the role of privacy in the behavior model for persuasive ubiquitous technology. The study reviews the literature on the factors of persuasive technology, particularly in ubiquitous and pervasive computing. These factors are motivation, ability and trigger. The paper goes on to analyze privacy factor that also plays important role in ubiquitous technology. In theory, although there are some models that explain persuasive technology, including Fogg Behavioral Model that is highly referenced, the inclusion of the privacy, especially in the area of location-based services (LBS) is almost none. Therefore, building on the importance of upholding user privacy, the research is proposed to extend Fogg's model. Several methods will be deployed. First, a quantitative survey to assess the current users' awareness of the persuasive and manipulative part of the technology. Second, a qualitative technique to gather more inclusive understanding of the issue from the viewpoints of users, developer and government agencies. Third, based on the findings, a model will be developed and tested via a quasi experiment that deploys an intervention module. The research is significant and important for the society and national development in several aspects; 1) promoting a comprehensive data protection policy development of cyber security, 2) providing rules to persuasive technology developer on the dos' and don'ts, and 3) educating the society about cyber ethics and privacy.

Research paper thumbnail of Exploring User’s Experience using E-Notification Management System

International Journal of Academic Research in Business and Social Sciences, 2018

Technology is believed to give an impact on user's behaviour. Thus, e-notification management sys... more Technology is believed to give an impact on user's behaviour. Thus, e-notification management system prototype was developed to improve user's compliance behaviour towards Information Security Policies (ISPs). The purpose of this study was to evaluate how this prototype can be used to improve the security compliance behaviour among users through their experience of using the propose system. Eighteen (18) users from selected local hospitals in Malaysia were interviewed and the qualitative analysis found that Management Support, Information Security Awareness, Self-Efficacy, Security Barrier and Trust contributed to ISPs compliance behaviour. Furthermore, most of the participants were satisfied with the prototype system. The prototype is hoped to give benefits to organizations in implementing and distributing ISPs systematically, especially in healthcare sector.

Research paper thumbnail of Mobile commerce applications service quality in enhancing customer loyalty intention: mediating role of customer satisfaction

Journal of Financial Services Marketing, Nov 4, 2022

Research paper thumbnail of The Effect of Innovation Success Factors Towards Organizational Performance in Automotive Industry

International Journal of Business and Administrative Studies, 2018

Organizational performance is essential and necessary for every organization to properly create a... more Organizational performance is essential and necessary for every organization to properly create and sustain a healthy and effective results-oriented culture. In an economy increasingly driven by technological change, businesses need to stay abreast of the latest innovations to keep their competitive edge and access new market opportunities. Therefore, to excel in business, organizations must pay attention, especially to their technology implementation process. This study aims to analyze the effect of technology innovation that contributes to organizational performance. The innovation success model was adapted, focusing on three factors (technology selection, technology capability and technology management capability), and this study also added a successful technology implementation into the new framework. 131 questionnaires were distributed to 8 automotive companies in Shah Alam, Selangor. Based on the data analysis, the result showed that all the innovation success factors and successful technology implementation positively influence organizational performance. Technology capability is shown to be the strongest effect on organizational performance, among others. This study will hope to provide a guideline to the management of the automotive industry on how to improve their organizational performance through innovation.

Research paper thumbnail of Procedural Information Security Countermeasure Awareness and Cybersecurity Protection Motivation in Enhancing Employee’s Cybersecurity Protective Behaviour

2022 10th International Symposium on Digital Forensics and Security (ISDFS)

Research paper thumbnail of Development of Human Resource Information System: The Managerial Implications

International Journal of Academic Research in Business and Social Sciences, 2021

Human Resource Information System (FBM-HRIS) was developed to manage information of human resourc... more Human Resource Information System (FBM-HRIS) was developed to manage information of human resource training, conferences, workshops and any activities through Internet. FBM-HRIS aims to provide paperless up to 90% and to provide low cost and reliable automation of the existing systems. FBM-HRIS also provides excellent security data at every level of user-system interaction and also provides robust and reliable storage and backup facilities. Using action research technique, several categories of user participated in this study to get their feedbacks regarding service quality of submitting and managing human resource activity application before and after FBM-HRIS development. The e-survey was constructed and distributed to all selected participants. The results found that FBM-HRIS has several modules which provide many benefits to the faculty such as the ability to support tracking day-today human resource activities (staff training information, conferences activities etc.), improving faculty strategic planning in an organized and systematic way, and among others.

Research paper thumbnail of Investigation on Project Management Performance Using Knowledge Project Management Performance Assessment Model : A Pilot Study

Project Management is an important tool use in a project development. Therefore, as a project man... more Project Management is an important tool use in a project development. Therefore, as a project manager, he/she should practice project management adequately. This study was conducted to construct a research model namely Knowledge Project Management Performance Assessment (KPMPA) model. In finding the gap of the study, several literatures on project management issues have been reviewed. Based on the literature review, the study posited four constructs (Project Leadership, Project Teamwork, Project Life Cycle, and Project Knowledge) which are believed can influence project management performance. The Key Performance Indicators (KPIs) is use to evaluate the Information Communication and Technology (ICT) project management performance. Pilot study was conducted with 42 respondents. A result of reliability analysis shown the alpha value for each construct is more than 0.7, which means all constructs are acceptable. The proposed model will be used to investigate the performance of project ...

Research paper thumbnail of The Moderating Effect of Working Experience on Health Information System Security Policies Compliance Behaviour

Malaysian Journal of Computer Science, 2015

This study was conducted to investigate the moderating effect of health professional’s working ex... more This study was conducted to investigate the moderating effect of health professional’s working experience on the relationship between factors of Health Information System Security Policies Compliance Behaviour (HISSPC) model. A survey (i.e., n = 454) was conducted to test the differences between high experience and low experiencehealth professionals who were Health Information System (HIS) users. The HISSPC model was tested using partial least squares (PLS) approachwith results indicating the coefficient of determination (i.e., R 2 ) for high experience group (i.e., 63 percent)to be slightly higher than the low experience group(i.e., 60 percent). Statistical differences were noted for the relationship between management support and user’s compliance behaviour in both groups,with stronger relationship forlow experienceHIS users compared to high experience HIS users. In contrast, perceived susceptibility was found to significantly influence highly experienced users to comply with HIS ...

Research paper thumbnail of Students ’ Performance on the Implementation of Online Learning System

The use of Information technology (IT) and the Internet are the new paradigm in the 21 st Century... more The use of Information technology (IT) and the Internet are the new paradigm in the 21 st Century has introduced new concept of learning known as e-Learning or online learning. However, there are some issues regarding the implementation of online learning, for instance number of students using the system is not encouraging and this will give an impact to student’s performances. Therefore, this study is conducted to examine the relationship of readiness and attitude factor on students’ performance towards the implementation of online learning and identify the differences between genders in student readiness for online learning. Data was gathered from 331 part-time students in eight e-PJJ program at UiTM Shah Alam, Malaysia. The result of analysis has shown that, attitude and readiness have positively influenced the students’ performances on the implementation of online learning system. However, both factors have moderate correlation. Furthermore, the analysis has shown that there is ...

Research paper thumbnail of The role of project knowledge in IT project management performance

Information-an International Interdisciplinary Journal, 2016

Research paper thumbnail of Investigating the Relationship of Users' Behavior and Internal Security Threat towards the Implementation of Total Health Information System (THIS) in Malaysian Medical Institutions

Australian journal of basic and applied sciences, 2011

This paper have been carried out with the purpose to develop research model that can be used to i... more This paper have been carried out with the purpose to develop research model that can be used to investigate the relationship of users' behavior and internal security threat towards the implementation of Total Health Information System (THIS). In doing so, several study related with health information system and information security effectiveness have been reviewed to construct research model. The study only focuses on medical institution which fully implements THIS. The outcome of the study will help the researcher to conducts study regarding information security management which significant to the medical institution in improving health record management. Security aspect is an important in medical institution which implements THIS. However, without good management practice this cannot be implemented effectively and efficiently. The study is perhaps one of the first to develop THIS performance model to investigate the relationship of users' behavior and internal security thr...

Research paper thumbnail of Continuous usage intention of Location-based Services (LBS) technology among smartphone users in Malaysia

Pertanika journal of social science and humanities, 2017

Mobile phone utilisation is changing from basic communication features and locationbased services... more Mobile phone utilisation is changing from basic communication features and locationbased services (LBS) has become an important feature. In developing countries such as Malaysia, the development and implementation of LBS can be important for the public since an LBS does not only boost individual decision making, but also supports the business functionality depending on its operation policy. We conducted a research to investigate users’ expectation and intention to use the LBS. Developing the work based on Unified Theory of Acceptance and Use of Technology (UTAUT). The findings show the roles of effort expectancy and social influence in predicting the intention to use of LBS.

Research paper thumbnail of Stemming relates to deciding which documents in a collection should be retrieved to satisfy a user's need for information. Stemming is used to remove derivational suffixes as well as inflections (i.e. adding

This paper presents an integrated language model to improve document relevancy for text-queries. ... more This paper presents an integrated language model to improve document relevancy for text-queries. To be precise, an integrated stemming-lemmatization (S-L) model was developed and its retrieval performance was compared at three document levels, that is, at top 5, 10 and 15. A prototype search engine was developed and fifteen queries were executed. The mean average precisions revealed the S-L model to outperform the baseline (i.e. no language processing), stemming and also the lemmatization models at all three levels of the documents. These results were also supported by the histogram precisions which illustrated the integrated model to improve the document relevancy. However, it is to note that the precision differences between the various models were insignificant. Overall the study found that when language processing techniques, that is, stemming and lemmatization are combined, more relevant documents are retrieved.

Research paper thumbnail of The Influences of Occupational Safety and Health Administrative (OSHA) Dimension Towards OSHA Awareness Among Employees

An increasing number of occupational accidents in various industries have motivated this study to... more An increasing number of occupational accidents in various industries have motivated this study to be conducted particularly on investigating OSHA awareness among employees. The present study is concerned with the two main issues, 1) to determine the level of OSHA awareness among employees and 2) to ascertain the relationship between OSHA dimensions and OSHA awareness. Data was collected from 260 employees from a reputable Government Link Company (GLC) via questionnaire survey. Simple random sampling was utilized in selecting the sample. The overall findings of the study illustrates that the level of OSHA awareness among employees is at the sufficient level. The employees in this company are well aware as well as practicing safety procedures and practices. The study also indicates that there is a positive and significant relationship between the dimensions with OSHA awareness.

Research paper thumbnail of The Internet Addiction among Youth in Tertiary Education

International Journal of Academic Research in Business and Social Sciences, 2021

Research paper thumbnail of Entertainment Gratification, Informative Gratification, Web Irritation and Self-Efficacy as Motivational Factors to Online Shopping Intention

Management and Accounting Review (MAR), 2018

The Internet technology and pervasive computing has provided consumers with privileges to shop on... more The Internet technology and pervasive computing has provided consumers with privileges to shop online. In addition, the Industry 4.0 agenda has placed the business web and the social web as the ecosystem domains, which explains why online shopping is a norm today. While many studies have been conducted to investigate the determinants of consumers’ intention to use online shopping, mixed results are always found, especially when the business take unique approaches for their digital presence. Besides, even though self-efficacy has been studied extensively in information system research, technological complexity has always given a challenge to consumers’ computing ability. Building on the Use and Gratification Theory (GTA) and the Social Cognitive Theory (SCT), this study aims to examine the relationships between entertainment gratification, informative gratification, web irritation and self-efficacy towards individual’s intention to use online shopping. Using the quantitative survey a...

Research paper thumbnail of The Role of Social Media as a Persuasive Ubiquitous Learning Tool for Social Engagement Towards Social Sustainability

ADVANCES IN BUSINESS RESEARCH INTERNATIONAL JOURNAL, 2020

Social media has infiltrated the 21st-century generations of Internet users, making it a very pro... more Social media has infiltrated the 21st-century generations of Internet users, making it a very prominent means of communications dissemination, particularly among students at a higher level of education. As technology will continue to evolve the role humans play in the near future, everyone will be required to adapt their skills throughout their daily and working lives. Therefore, individuals especially younger generations will need to act and engage in lifelong learning, so they are adaptable when the changes happen. Nowadays, the learning process is not only confined to the walls of the classrooms, instead, students are also able to access knowledge at any time and place that they are comfortable with to clear their doubts. Social media has also brought forth the concept of ubiquitous learning, which means that students can explore and request a related topic of interest from experts from all around the world. While this social engagement brings many benefits to the students partic...

Research paper thumbnail of Industry revolution 4.0: the readiness of graduates of higher education institutions for fulfilling job demands

Revista Română de Informatică și Automatică, 2020

Research paper thumbnail of The Role of Self-Efficacy in Employee’s Compliance Behaviour Towards Information Security Policies: Multi-Group Analysis

Advanced Science Letters, 2018

Reaserch on chaos-based communication, or simply chaotic communication, has been ongoing since th... more Reaserch on chaos-based communication, or simply chaotic communication, has been ongoing since the early nineties. It was argued that chaotic communication has the potential of addressing the security issue that is omnipresent in standard communication systems, yet this technology has not taken over traditional methods of communication. In this paper, we give a brief survey on the existing methods for designing chaosbased communication schemes. We also provide a discussion as to why there is still some reluctance in applying this technology in practice. Finally, we propose some solutions to address this issue. In more detail, we propose a framework for the development of the fifth generation of chaotic cryptosystems based on bridging chaotic and traditional modulation methods. Then, we discuss the shape that this generation of chaotic cryptosystems could take and explain the challenges in designing and implementing them.

Research paper thumbnail of SAIS Service Quality and Student’s Satisfaction Towards the Implementation of Student Activity Information System (SAIS): The Moderating Role of SAIS Service Convenience

Foundations of Management, 2019

Student Activity Information System (SAIS) was developed with the aims to efficiently record the ... more Student Activity Information System (SAIS) was developed with the aims to efficiently record the applications of student’s activity at the Faculty of Business and Management (FBM), Universiti Teknologi MARA (UiTM) Selangor, Malaysia and to assist the administrator to manage the students’ activities effectively. By using different e-service quality dimensions, this study proposed a higher order factor of SAIS Service Quality with an attempt to determine a moderating effect of SAIS Service Convenience between the relationship of SAIS Service Quality and Student’s Satisfaction. Quantitative data was gathered from 94 SAIS users and the data were analyzed by using SmartPLS 3.0. The analysis result showed that SAIS Service Quality and SAIS Service Convenience were positively influenced the student’s satisfaction. Moreover, the result also revealed that the higher order factor of SAIS Service Convenience was not to moderate the relationship between the SAIS Service Quality and Student’s Sa...

Research paper thumbnail of A Captology Study on Behavior Model for Persuasive Ubiquitous Technology

International Journal of Machine Learning and Computing, 2017

This is a conceptual paper to study the role of privacy in the behavior model for persuasive ubiq... more This is a conceptual paper to study the role of privacy in the behavior model for persuasive ubiquitous technology. The study reviews the literature on the factors of persuasive technology, particularly in ubiquitous and pervasive computing. These factors are motivation, ability and trigger. The paper goes on to analyze privacy factor that also plays important role in ubiquitous technology. In theory, although there are some models that explain persuasive technology, including Fogg Behavioral Model that is highly referenced, the inclusion of the privacy, especially in the area of location-based services (LBS) is almost none. Therefore, building on the importance of upholding user privacy, the research is proposed to extend Fogg's model. Several methods will be deployed. First, a quantitative survey to assess the current users' awareness of the persuasive and manipulative part of the technology. Second, a qualitative technique to gather more inclusive understanding of the issue from the viewpoints of users, developer and government agencies. Third, based on the findings, a model will be developed and tested via a quasi experiment that deploys an intervention module. The research is significant and important for the society and national development in several aspects; 1) promoting a comprehensive data protection policy development of cyber security, 2) providing rules to persuasive technology developer on the dos' and don'ts, and 3) educating the society about cyber ethics and privacy.

Research paper thumbnail of Exploring User’s Experience using E-Notification Management System

International Journal of Academic Research in Business and Social Sciences, 2018

Technology is believed to give an impact on user's behaviour. Thus, e-notification management sys... more Technology is believed to give an impact on user's behaviour. Thus, e-notification management system prototype was developed to improve user's compliance behaviour towards Information Security Policies (ISPs). The purpose of this study was to evaluate how this prototype can be used to improve the security compliance behaviour among users through their experience of using the propose system. Eighteen (18) users from selected local hospitals in Malaysia were interviewed and the qualitative analysis found that Management Support, Information Security Awareness, Self-Efficacy, Security Barrier and Trust contributed to ISPs compliance behaviour. Furthermore, most of the participants were satisfied with the prototype system. The prototype is hoped to give benefits to organizations in implementing and distributing ISPs systematically, especially in healthcare sector.