39 research outputs found

    Pendekatan konstruktif dalam inovasi pengajaran dan pembelajaran Bahasa Melayu di Kolej Vokasional

    Get PDF
    Pendekatan konstruktif adalah pendekatan pengajaran dan pembelajaran yang berpusatkan pelajar manakala inovasi pengajaran pula dikaitkan dengan kaedah pengajaran yang terbaru demi mengukuhkan pemahaman pelajar. Pembelajaran berasaskan pendekatan konstruktif merupakan elemen yang penting dan perlu difahami oleh guru-guru bagi memantapkan proses pengajaran dan pembelajaran sesuai dengan peredaran masa dan menjayakan proses tranformasi pendidikan negara. Objektif kajian ini dijalankan untuk mengenal pasti pemahaman guru-guru bahasa Melayu berkaitan inovasi, mengenal pasti perbezaan yang wujud antara guru lelaki dan guru perempuan dalam mengamalkan inovasi, pengkaji juga melihat adakah wujud perbezaan antara guru baru dan guru yang sudah berpengalaman dalam aspek mengaplikasikan inovasi serta mengenal pasti kekangan-kekangan yang dialami oleh para guru untuk mengaplikasikan inovasi di sekolah. Seramai 63 orang guru bahasa Melayu dari lapan buah kolej vokasional telah dipilih sebagai responden dalam kajian ini. Data dianalisis menggunakan perisian Winsteps 3.69.1.11 dengan pendekatan Model Pengukuran Rasch. Hasil analisis menunjukkan bahawa guru�guru bahasa Melayu memahami kepentingan inovasi dalam pengajaran dan pembelajaran. Hasil kajian juga menunjukkan guru-guru perempuan lebih banyak menerapkan unsur inovasi dalam pengajaran berbanding guru lelaki. Walaupun begitu, aspek pengalaman tidak menunjukkan perbezaan dari segi pengamalan inovasi sama ada guru baru ataupun guru yang sudah berpengalaman. Pengkaji juga mengenal pasti beberapa kekangan yang dialami oleh guru-guru untuk mengamalkan inovasi ini. Sebagai langkah untuk menangani masalah berkenaan, beberapa cadangan telah dikemukakan oleh pengkaji bagi memastikan guru-guru dapat merealisasikan proses pengajaran berkesan dengan penerapan inovasi mengikut model pendekatan konstruktif. Pengkaji berharap, kajian ini dapat dijadikan sebagai satu panduan kepada pelaksana kurikulum bagi memastikan budaya inovasi sentiasa menjadi amalan dalam kalangan guru demi mengangkat profesionalisme guru di Malaysia

    A security payment model for financial payment using mykad

    Get PDF
    The Malaysian Government has created smart national identity card named MyKad for every citizen aged 12 and above since September, 2001. In the following year, the National Registration Department of Malaysia (JPN) has embedded the latest application of MyKad, which is known as Public Key Infrastructure (PKI). It allows secure electronic transactions over the Internet. The electronic transactions include online submission of tax returns, secure email and e-commerce. In parallel with the emergence of e-commerce payment system, a new MyKad Payment Model (MPM) is proposed in order to introduce to the public another function of MyKad that is not only for identification purposes, but also in e-commerce transactions. However, to make this payment model accepted by the public, the focus should be made on two issues; trust/security issue and performance issue. A system with security technique named Arbitrary Random Security Algorithm (ARSA) and a one-to-one multithreading model need to be developed in order to accelerate the authentication response time of MPM. ARSA will automatically change its security algorithm based on times and attacks. If there is no attack or intrusion detected, MPM will wait for the scheduled switching within 30 minutes. However, if attack or intrusion is detected in less than 30 minutes, ARSA will automatically change the security algorithm to a new one. The evaluation of the MPM performance is measured with HP LoadRunner testing tools from which it is found that the response time of MPM with multithreading is better compared to the single thread model and credit card authorisation system. Moreover, the development of ARSA makes this model more secure and safer for the customers

    Car Theft Prevention System

    Get PDF
    Car theft cases in Malaysia have been a threat to the government and the community as a whole. Increasing cases of car thefts in public areas, paid parking service, mall parking, and also in the neighborhood are the reasons why this project is initiated. The proposed system is a security system designed to collaborate with the existing security systems incar parks such as shopping mall car parks and hotel car parks. It also poses as a verification system for the car and its owner. This project is also initiated to create a low-cost but effective security system in car parks. Current systems adopt single authorization method for security purpose which is prone to security breakage and has a few flaws in its implementation. Therefore, this system is designed with two-factor verification which consists of car registration number (what you know) and MyKad (what you have). These two inputs or authentication elements are very important as they act as a "binder" between the car owner and its car thus becoming the verifier for this system. In developing this system, iterative development methodology is used and it is being modified to cater the need of this project. Iterative development methodology is suitable for this system based on its nature where analysis phase, design phase and implementation are being executed iteratively until a satisfied product is produced. It is also suitable to be used for projects with a small timeframe. Included in this report as well, is the technical configuration required during the product development which consists of system's configuration and database configuration. During the analysis part of this project, there has been a few interesting findings that supports the creation of this project. Among them is the adoption of two-factor authentication using password and token or smart card is proven to be cheaper yet effective compared to a single biometric authentication which is very expensive to be implemented. Besides that, privacy violation and identity theft becomes easierand more damaging whenbiometric system is adopted. Finally, smart card has been recognized as the future of better security due to its flexibility to collaborate with password authentication and biometric authentication which is currentl

    Policy Issues in Implementing Smart Cards in Urban Public Transit Systems

    Get PDF
    Many public transportation institutions have been discarding their magnetic strip payment cards or traditional cash-based fee collection systems in favor of automated fare collection systems with smart card technology. Smart cards look like traditional credit cards or ID cards; however, using RFID technology, they allow for contactless payment and identification. Smart cards are becoming increasingly popular among transit agencies primarily because they are convenient for customers, reduce administrative costs for transit agencies, and have the potential of improving the performance of complex transit systems overall. The increased availability and affordability of contactless cards has also contributed to this trend in adoption

    Review and Analysis of Current and Future European e-ID Schemes

    Get PDF
    The purpose of this report is to accomplish the following objectives: 1. Review and analysis of existing and future e-ID standards and technologies 2. Review and analysis of national e-ID card schemes (in Europe), including their objectives and the policy drivers (motivation). 3. A review of the applications that e-ID cards enable, both for public policy purposes and commercial usage (planned & actual). 4. Lessons learned from existing e-ID card schemes (successes and failures) and determine whether new international schemes/standards will address past short-comings or not. As a result of attempting to accomplish these objectives, it became apparent that across Europe we are still in a fairly early stage of development. More importantly, there is no coordinated effort across Europe to implement e-ID cards. Leading e-ID card schemes to be designed and implemented at a national level has lead to a heterogeneous collection of scheme types. Not only is there an inconsistency in the primary objectives of e-ID cards, the use of different standards and technologies has lead to a lack of interoperability between schemes

    The effect of attitude and its decomposed, subjective norm and it decomposed on intention to use e‐money server in Indonesia

    Get PDF
    This study investigates consumers’ intention on e-money server in Indonesia. E-money server is one of type electronic money for payment system.These are limited studies has been conducted in behavioral intention in this new context.This became a strongly gap which investigate into conceptual model of the consumers’ intention to use e-Money Server in Indonesia as micro payment transaction.Consequently, this study employs the Decomposed of Theory Planned Behavior (DTPB) by examines attitude and its decomposed (relative advantage) and subjective norm and its decomposed (family and social-cultural influence) on intention to use e-money server.The model is examined trough sampling with a total of one thousand one hundred and fifty respondents were selected using quantitative method as sources of data collection.The questionnaires were distributed using purposive sampling method in Padang, Indonesia.SmartPls 2.0 M3 is used to come out the result.Finally, this study reveal with conclusion and suggestion for future studies

    Analysis of project communication on smart card implementation in XYZ Malaysian higher education

    Get PDF
    Project communication is the exchange of project-specific information with the emphasis on creating understanding between the sender and the receiver. It reflected simultaneously to be an indispensable tool to manage project resources systematically. Communication through coordination and cooperation are common approach used for project scheduling, planning and control while collaboration establish the concrete result. Therefore, communication still remained as the main connector above all. Poor communication skill can cause anger, misunderstandings, conflict and distance that eventually influence project process significantly and lead to project failures. Analysis study was conducted to the ‘hiatus’ smart card project implementation in XYZ Malaysian higher education with emphasize the point of communication as the important point should be considered without eliminating other knowledge management area which also important in succession of project. In addition, the analysis study conducted to give limelight specifically towards the smart card implementation in higher education as the reference of other project in preventing project failure happen

    Biometrics Technologies Implementation in Internet Banking Reduce Security Issues?

    Get PDF
    AbstractInformation security is a great concern to computer users, which is not only a technical problem, but also related to human factors. One of the main issues in Malaysia related to Internet banking is the weak security in Internet banking application. Therefore this study will investigate further the solution to enhance the security issues in Internet banking implementation. In today s high speed world, millions of transactions occur every minute. For these transactions, data need to be readily available for the genuine people who want to have access, and it must be kept securely from imposters. There are three basic approaches to the verification of an individual s identity: something you have (e.g. Debit card), something you know (e.g. password, PIN) and something you are (e.g. fingerprint), which is unique about yourself and cannot be shared. Moreover, the benefits of investigating biometric authentication systems in online banking will secure the log in process to the system and removes password vulnerabilities; enhanced convenience such as employees quickly log in using their finger; reduced help desk costs by eliminating calls for password resets. Many systems utilize a combination of these methods in order to increase the level of security. Thus, a possible option is to introduce biometric authentication

    Creation of a Single National ID: Challenges & Opportunities for India

    Get PDF
    A National ID for all citizens and residents of India has long being considered a critical necessity, albeit the related projects have been in pilot mode for the past several years and no distinct road ahead seems to be coming out. The government has been focusing on inclusive growth and has launched several schemes at different levels to facilitate the same. However, monitoring the execution of these schemes and understanding clearly if the targeted citizens actually have got benefited, would demand for substantial granularity of information and doing away with information bottlenecks. Interestingly, proper execution of the National ID project by the government can prove to be useful for execution of various schemes and projects as well as in accessing multiple government and private sector services. This paper focuses on the need for a single national identity system in India and its proposed execution which may actually be linked to citizen life cycle. The other aspects covered and analyzed include current Indian scenario, challenges, existing identification systems and loopholes in the existing systems. Major challenges seem to be coming from enrolments, technology platform choice and strategic design, corresponding policy and legal frameworks. The paper also discusses about international scenario of single national id projects undertaken in 27 countries across the globe to understand current status, adoption and usage. To reinforce the need for national ID, the existing IDs were analysed based on a scoring model considering various dimensions. Primary research was conducted, based on which it was found none of the existing IDs was able to satisfy as a National ID based on the scoring model. The proposed road map has been discussed in length i.e technology platform, smart card technology, legal and administrative framework, business model based on Private-Public Partnership (PPP) considering the mammoth and diverse population. A ranking matrix may be created to come up with a composite score for all districts based on various dimensions. The execution may be planned to be executed without asking Indians to stand in queue for one more ID and accelerating towards a more secured society and more importantly ensuring better delivery of Government services to citizens.

    Car Theft Prevention System

    Get PDF
    Car theft cases in Malaysia have been a threat to the government and the community as a whole. Increasing cases of car thefts in public areas, paid parking service, mall parking, and also in the neighborhood are the reasons why this project is initiated. The proposed system is a security system designed to collaborate with the existing security systems incar parks such as shopping mall car parks and hotel car parks. It also poses as a verification system for the car and its owner. This project is also initiated to create a low-cost but effective security system in car parks. Current systems adopt single authorization method for security purpose which is prone to security breakage and has a few flaws in its implementation. Therefore, this system is designed with two-factor verification which consists of car registration number (what you know) and MyKad (what you have). These two inputs or authentication elements are very important as they act as a "binder" between the car owner and its car thus becoming the verifier for this system. In developing this system, iterative development methodology is used and it is being modified to cater the need of this project. Iterative development methodology is suitable for this system based on its nature where analysis phase, design phase and implementation are being executed iteratively until a satisfied product is produced. It is also suitable to be used for projects with a small timeframe. Included in this report as well, is the technical configuration required during the product development which consists of system's configuration and database configuration. During the analysis part of this project, there has been a few interesting findings that supports the creation of this project. Among them is the adoption of two-factor authentication using password and token or smart card is proven to be cheaper yet effective compared to a single biometric authentication which is very expensive to be implemented. Besides that, privacy violation and identity theft becomes easierand more damaging whenbiometric system is adopted. Finally, smart card has been recognized as the future of better security due to its flexibility to collaborate with password authentication and biometric authentication which is currentl
    corecore