15 research outputs found

    A survey on knowledge management at Mufti’s departments in Malaysia

    Get PDF
    Managing fatwa is considered a very challenging task since it is one of the valid and trust able guidance for Muslim not only in Malaysia specifically but also to others Muslims throughout the world.This paper will discuss the survey that was carried out in the Mufti’s Department in Malaysia. The main reason of this research is to look at the usage of ICT in fatwa management in each Mufti’s department in Malaysia.From the questionnaires, the data collected were analyzed and the analyses done includes respondent’s profiles, identifying ICT usage in fatwa management, the usage of ICT in fatwa management according to the four main activities, problems that limits the ICT usage , and identify whether ICT had helped in the fatwa management.One of the finding does shows the ICT helps in managing fatwa

    Infusing social media in Teaching and Learning (TnL) at tertiary institutions: A case of effective communication in Universiti Sains Islam Malaysia (USIM)

    Get PDF
    In Teaching and Learning (TnL) process, the success of disseminating fast information to the students seem to be hampered by the infrequent use of its e-learning system.Students are more likely to engage and communicate through social media. This paper aims to investigate the frequency of social media use among undergraduates in USIM and analyze their perception on the effect of social media towards effective communication in TnL. Data were collected using survey.From the students’ perspectives, this paper intends to highlight the findings on benefits of infusing the social media in ensuring effective communication among lecturers-students-lecturers and students-peers

    Factors contributing knowledge sharing in higher learning institution

    Get PDF
    This paper is to discuss the factors that might be the contributors to the knowledge sharing in a Higher Learning Institution of Malaysia.Currently a study is conducted at a higher learning institution to identify the factors that can enhance the practice of knowledge sharing among the staffs regardless academic staffs or non - academic staffs. The study will be carried out by using two major approaches that are questionnaire survey and case studies.Therefore, the final product of this study is to compose the factors that have been determined within the study and it will be conferred in this paper

    Computer security factors effects towards online usage of internet banking system

    Get PDF
    Given an apparent lack of coherence and a paucity of computer system field of studies, research imitates and demonstrates non consensus in how computer security fits into the satisfaction, success, usage, efficiency, and effectiveness of computer system field. This study is a part of research aims to extend the Technology to Performance Chain model by including and examining the Computer Security Self-Efficacy construct, as recommend by several computer system field researchers. This paper used the statistical technique structural equation modeling and the partial least squares regression for estimating causal relations between computer security self-efficacy and internet banking usage. Outcomes confirm that confidentiality and availability effects computer security self-efficacy while in turn computer security self-efficacy impacts on usage. Computer security self-efficacy also partially mediates the impact of confidentiality, integrity, and availability on usage

    Systematic Literature Review: Correlated Fuzzy Logic Rules for Node Behavior Detection in Wireless Sensor Network

    Get PDF
    In distributed wireless sensor network, the possibility for one or several nodes to become faulty is directly proportional upon the number of nodes within the network. Unnecessary control of the network triggers the anomaly, faulty and misbehavior in nodes which anyhow yield to degradation of network performance. Therefore, the identification of node behavior in distributed sensory system is crucially important to improve the network performance throughout the monitoring period. Though the detection schemes are several, Fuzzy logic for node behavior detection in WSN however present a more accurate incentive as it considered the uncertainties inherited in the WSN environment during the fault diagnosis period. This paper analyzes several fuzzy logic approaches for correlated node behavior detection. With six primary articles, this paper provides systematic literature review (SLR) and presents an overview of current design of research trend in this area

    E-learning stakeholders information security vulnerability model

    Get PDF
    The motivation to conduct this research has come from awareness that the Internet exposes the e-learning environment to information security threats and vulnerabilities. Information security management as practised as a top down approach in many organisations tend to detach of people’s responsibility in ensuring the security of e-learning. Literature has pointed out that people’s behaviour required to be addressed to control the information security threats. This research proposes an ISM human behaviour model for e-learning provider in public universities in Malaysia. With socio technical reflection, this model aims to improve the implementation and management of information security in e-learning taking consideration of the user perspective. This research consists of four phases, the Planning phase, Data Collection and Analysis Phase, Model development Phase and Discussion and Conclusion Phase. A pilot study highlighted data confidentiality difficulties and pointed to data collection by using existing public from multiple sources. Six multi-method studies were conducted to generate the dimensions for the model development. Review from expert confirmed the research findings and validated the practicality of addressing people behaviours in information security management. This research contributes to better understanding of the people complexity in information security. The research suggests that the culture view of individual is significant in preparing information security management. This model makes clear the influence of people towards security threats and vulnerabilities. This approach can guide on what can be done to improve the stakeholder’s participation and responsibilities on securing e-learning. This research is also extending the existing knowledge of information security and e-learning fields by analytically focussing on the intersection of both fields. New knowledge about the security in e-learning environment from the users’ perspective is derived

    Information Security in eLearning: A Discussion of Empirical Data on Information Security and eLearning

    Get PDF
    ELearning systems are increasingly used by educational institutions to support their academic activities. A simple use of an eLearning system is to make materials and notes available to students at anytime and anywhere; more sophisticated uses of eLearning support the interaction and assessment processes. Depending on how eLearning systems are used, information security issues such as intellectual property protection, personal data protection and continuity of service can become significant for educational institutions. However, use of the Internet also creates exposure to information security threats, which may be classified into interruption, interception, fabrication and modification. This paper presents a study of the benefits, growth, implementation and challenges of eLearning today. An online survey was conducted to review eLearning practitioners' perceptions of information security threats; respondents were invited to participate in the survey via e-mail to the 20 Joint Information Systems Committee (JISC) mailing list groups related to eLearning in the UK. Using empirical data collected from eLearning practitioners, the relationship between the eLearning entity (users, institution categories, level of information security awareness) and information security threats is discussed. This paper also discusses the perception of information security incidents occurring in eLearning and the impact of information security threats on the different types of users, as well as approaches to information security management. This paper concludes with the suggestion that information security management should be implemented in the preparation of a secured eLearning environment, and draws significant insight from the existing status of information security in eLearning that could be useful for eLearning providers and practitioners

    Penetration testing for Libyan Government website

    No full text
    The study explores the security issues in the Libyan Government websites focusing on assessing the vulnerability and security weaknesses of various websites of the Libyan Government ministries.The study is divided into three stages.In the first stage, literature review was conducted to understand the nature of the problem.Data were collected in the second and third stage of study.In the second stage, three Web application scanner tools were used for checking and evaluate the government websites for common vulnerabilities, and analyzing security level for each of these websites. In the last stage, more insight into the security related issue of the Libyan government websites is obtained through interview with the expert.Using these two methods, a deeper understanding of the status of security level in the Libyan government‘s websites is presented from the standard security point of view and the need for a research to address and overcome the problem is also asserted

    Computer security self-efficacy effect: an extension of Technology-to-Performance Chain Model

    No full text
    given a paucity of research and apparent lack of coherence in information system research, it seems that there is no consensus in the information system field as to how security fits into the information system acceptance, usage, success, utilization, and/or performance impact (effectiveness, efficiency, and satisfaction). This paper is part of an ongoing research project designed to extend the Technology-to-Performance Chain (TPC) model by including the Computer Security Self-Efficacy (CSSE) construct, a strategy of model extension suggested by several researchers. This project aims to examine the research conducted in the last decade in information system journals regarding security issues then based on social cognitive theory, to propose a construct to measure individuals’ computer security self-efficacy. Based on the Technology-to-Performance Chain (TPC) model, this study design expected to models and tests relationship among computer security self-efficacy and secures online banking system performance impact. The study will try to answer the question “to what extent has the computer security self-efficacy affected user’s perception of secure online banking system effectiveness“. After this research finished, the researcher assume that this study findings will provides an initial step towards understanding of the applicability of social cognitive theory in information system security domain and helps information security professionals design information systems considering the effect of computer security self-efficacy on secure information system
    corecore