83 research outputs found

    Evaluation of computer ethics: confirmatory factor models using PROC CALIS

    Get PDF
    The computer is considered one of the most essential technological advances and has become an everyday tool. Many tertiary institutions have become heavily dependent on computers, Internet and informations systems for educational purpose. Computers and the Internet also represent many people, organizations, and governments. However, at the same time they raise some ethical issues such as unauthorized access and use of computer systems, software piracy and information privacy. This study proposes the employment of computer use and computer security concepts for investigating students’ ethical conduct related to computer ethics. Specifically, an ethical computer awareness (ECA) construct concerning computer use and security is developed and validated. The process of evaluating a measurement instrument for reliability and investigating the factor structure are discussed using the scale of ethical computer awareness (SECA). SAS procedures served to provide an indication of the internal consistency, that is, reliability with PROC CORR, to explore the factor structure with exploratory factor analysis using PROC FACTOR, and to verify the factor structure with confirmatory factor analysis using PROC CALIS of the measurement instrument. The ECA construct developed from the study could be useful to research a wide range of computer ethics in the future

    Computer Ethics Awareness Among Undergraduate Students in Malaysian Higher Education Institutions

    Get PDF
    This study investigates the ethical awareness of computer use among undergraduate computer science students at two public Malaysian universities. One hundred and fifty-nine students were asked to evaluate the code of ethics pertaining to computer ethics. A comparison of undergraduate computer science students between two public universities was done to determine the level of ethical awareness of computer use. Independent Samples T-test for differences was performed across four distinct groups, that is, university, gender, age, and duration of computer use. The results of the tests conducted indicate that the ethical awareness of computer use of the students differ most significantly on the basis of the university itself. There were minimal differences across gender, age and duration of computer use. This suggests that computer ethics awareness training is needed for university users. The results are discussed and the implications for studies in an education context are outlined

    Users’ perception on the information security policy of the institutions of higher learning

    Get PDF
    Securing information is essential for safeguarding the organization business operations as information is a business asset to any organization including education sector.One of the most imperative information security (InfoSec) controls identified is InfoSec policy, a direction-giving document.The purpose of this study is to investigate the user awareness, understanding and acceptance of InfoSec policy in the Malaysian’s Institutes of Higher Learning.Survey questionnaires had been distributed to graduate students and non-IT staff of Universiti Teknologi Malaysia (UTM),International Campus, Kuala Lumpur.The result of this study had perceived consistent agreeable behaviors of the InfoSec policy within UTM

    Computer ethics awareness among undergraduate students in Malaysian higher education institutions

    Get PDF
    This study investigates the ethical awareness of computer use among undergraduate computer science students at two public Malaysian universities. One hundred and fifty-nine students were asked to evaluate the code of ethics pertaining to computer ethics. A comparison of undergraduate computer science students between two public universities was done to determine the level of ethical awareness of computer use. Independent Samples T-test for differences was performed across four distinct groups, that is, university, gender, age, and duration of computer use. The results of the tests conducted indicate that the ethical awareness of computer use of the students differ most significantly on the basis of the university itself. There were minimal differences across gender, age and duration of computer use. This suggests that computer ethics awareness training is needed for university users. The results are discussed and the implications for studies in an education context are outlined

    Development of an instrument to measure smart card technology acceptance

    Get PDF
    Recently smart card is used all over the world in different applications such as financial, telecommunication, network, and physical access where the security is considered very crucial. User acceptance is very significant in successful implementation of smart card technology. Thus, in order to investigate the user adoption of the technology, the instrument to identify the user acceptance is needed.The aim of this study is to develop an instrument to measure the user acceptance of smart card technology in Iran environment. Factors which can affect on user acceptance are presented and discussed

    Information security culture: A systematic literature review

    Get PDF
    Information security culture becomes an enabler towards minimising the protection of security risk and incidents. This research will systematically identify and analyse published research exploring factors influencing information security culture. A systematic literature review is conducted throughout this process.40 papers were used in our synthesis of evidence with nine compatibility factors has been found to influence information security culture in organisation setting. One thousand two hundred and four studies were identified as 40 fulfilled the inclusion criteria. Of these, most (13%) were assessed being high quality, and three were rated very poor.Nine common factors were identified which are cultural differences, security awareness, security behaviour, top management commitment, trust, information sharing, security knowledge, security policy, and belief.The most common factors found was security behaviour that highly influences information security culture from analysis conducted.The result of this study also shows the gap that there is lack of studies conducted in healthcare informatics environments setting. Findings are useful in developing theoretical model that shows factors influencing information security culture in healthcare informatics environmen

    Hospital Information Systems (HIS) In The Examination Rooms And Wards:Doctors Perceived Positive Impact On Quality Of Care And Patient Safety

    Get PDF
    Hospital Information Systems [HIS] is developed to support healthcare organizations in providing efficient, quality,and safe healthcare services.The objective of this study is to identify and describe doctors’ perspective on the impact of HIS use in the examination rooms and wards on quality of care and patient safety. Semi-structured interviews were carried out with thirty one doctors from three Malaysian government hospitals. Thematic qualitative analysis was performed by using ATLAS.ti to deduce the relevant themes.HIS were commonly believed to improve quality of care and patient safety in terms of :[1] accessibility of patients’ record,[2] efficient patient-care,[3] well-structured report viewing,[4] less missing patients’ records,[5]legibility of patients’ records,and [6] safety features.In conclusion,the use of HIS in examination rooms and wards suggests to improve the quality of care and patient safety

    Effects of precipitation methods on the properties of protease extracted from starfruit (Averrhoa carambola L.) of different maturity index / Normah Ismail and Ezzana Zuraini Zainuddin

    Get PDF
    Proteases were extracted from starfruit at maturity Index 2 (unripe, light green) and Index 7 (very ripe, orange) and partially purified using acetone and 40% ammonium sulfate precipitations. Higher yield and proteolytic activity were observed for proteases purified using acetone than 40% ammonium sulfate. As for maturity index, yield and protein concentration of proteases from Index 2 were higher than those from Index 7. SDS-PAGE result showed intense bands for acetone proteases while a distinct band at 50 kDa was observed in all the proteases. Enzyme activity decreased during the seven days storage at 4°C with minimum relative activity of 70%o achieved for acetone proteases at day seven. This study suggested that acetone precipitation is more effective method for purifying starfruit protease based on the yield and proteolytic activity compared to using 40%) ammonium sulphate precipitation. In order to obtain higher protein concentration and proteolytic activity, starfruit at the unripe stage, Index 2 is a better raw material than Index 7 to be used for protease production

    The basic aspect of partnership accounting

    Get PDF
    This article describes the basic aspect of partnership accounting. The first part of this paper aims to explain the characteristics of a partnership, types of partners and partnership, partnership agreement, and advantages and disadvantages of operating as a partnership. The second part of this paper discusses an accounting procedures for a partnership firms. It highlights the method of accounting for partnership capital and the final accounts to be prepared by a partnership firm. In any partnership firms, there may be changes in partnership. A partnership firm is possible to admit new partners into the firm and it is also possible for any partner to leave the firm due to death or retirement. The third part of this paper explains factors contributing to changes in a partnership and the steps to be taken by a partnership business to record for changes in a partnership. At the end of this paper, the writers discuss the accounting procedures for dissolution of partnership. It is hoped that this paper will serve as a beneficial input to partnership businesses
    corecore