20 research outputs found

    Information security risk factors and management framework for ICT outsourcing / Nik Zulkarnaen Khidzir

    Get PDF
    Information Communication Technology (ICT) services have become increasingly important in today’s business environment with most private and government agencies without sufficient resources and expertise outsourcing their ICT projects to vendors. However, this strategy could invite potentially damaging information security risks (ISRs). Subsequently, a dedicated framework for information security risk management for ICT outsourcing activities needs to be in place to address and manage its related risk factors. The research focuses on managing Information Security Risks (ISRs) in ICT outsourcing projects in a Malaysian environment. The mixed research method, combining the quantitative and qualitative was employed to achieve the research objectives. 110 respondents participated in a survey while focus groups from eight organizations were interviewed. From the quantitative study, the critical information security risks in ICT outsourcing project were identified and ranked. Furthermore, through an exploratory factor analysis, two additional critical Information Security Risk (ISR) factors were discovered, being information security management defects and the challenges of managing unexpected change of service providers. Results show that organizations practiced Information Security Risk- Identification; Information Security Risk-Analysis; Information Security Risk- Treatment Plan; Information Security Risk-Treatment Plan Implementation; Information Security Risk-Monitoring; and Information Security Risk-Control. However, there was divergence in the key activities practiced due to several factors. The findings were then used as a basis for the framework development. The framework proposed step-by-step processes, activities and guidelines to be taken in managing Information Security Risk (ISR). The case study results discovered organizations had excluded some of the processes and activities due to financial, resources and time constraints. However, the framework confirmatory done through expert-judgement proves that the framework had thoroughly assessed information security risk management from an outsourcing perspective and is applicable to ICT projects implemented in Malaysia. Fundamentally, the development of the framework will enable organizations to identify ISR factors and to urgently address them so that the full benefits of ICT outsourcing may be reaped

    Accelerating Creative Techno-preneuriship Through Innovative Design and Technology Integration

    Get PDF
    Creative techno-preneurship investigates a new frontier in the integration of creative technology to design more innovative entrepreneurship models to suit their business model and the goals of their organization. Entrepreneurs use this technology and approach creatively to identify opportunities from advanced creative technology research and development that can be used for entrepreneurship activities. To remain competitive, businesses must innovate. Simultaneously, technology is constantly advancing, and work-related tools are constantly changing. This forces organizations to stay current with technology and puts pressure on employees to use the technologies at their disposal to create innovative solutions that further the organization’s goals. It is hoped that this integration model will be a milestone in the trend to support future developments of digital content in particular to uplift the digital comic development in Malaysia. Keywords: creative innovation, digital technology, creative techno-preneurship, incubato

    THE IMPACT OF PERSONAL PRODUCTIVITY DUE TO THE ATTACKS OF CORONAVIRUS DISEASE 2019: USING PARTIAL LEAST STRUCTURAL EQUATION MODEL

    Get PDF
    Global coronavirus disease 2019 (COVID-19) is an infectious disease caused by severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2). The disease was first identified in December 2019 in Wuhan, the capital of China’s Hubei Province, and has since spread globally, resulting in the ongoing 2019–2020 coronavirus pandemic that has an impact which would be disturbed the personal productivity in the community. The dependent variable which is threat of COVID-19 (Thr_Cov-19), vulnerability of COVID-19 (Vul_Cov-19), and the unexpected change in society factors and one independent variable that is personal disturbance factors is used in this paper. Moreover, using as an indicator which will determine disturbance of personal productivity (D_PP) in the society. Since multiple regression by partial least square-structural equation modeling is used to examined of data by following unstructured method. Moreover, the resulting point out three dependent variables significantly influences on the independent variable of personal productivity in the society. As a matter of fact, this study concludes the foremost influence factor on D_PP in society due to COVID-19 risk factors such as Thr_Cov-19, Vul_Cov-19, and unexpected changed in the society factors. This study contributes to introductory study but vibrant understanding in stimulating the prediction of personal productivity in the society due to the COVID-19 attacks

    Task-Technology Fit for Textile Cyberpreneur’s Intention to Adopt Cloud-based M-Retail Application

    Get PDF
    Task-Technology  Fit  (TTF)  model  has been widely used in many researches for understanding the compatibility of task characteristics and technology characteristics. Applying TTF in mobile retail (m-retail) context from the perspectives of retailers might give the insights of their intention to adopt mobile cloud application technology for online business operations. Since it is currently common for retailers such as textile cyberpreneurs to conduct m-retail via the uses of certain mobile applications and devices, it is essential to investigate the usage intention based on task-related factors. Therefore, the objective of this study is to examine the compatibility of textile cyberpreneurs’ tasks and characteristics of cloud-based m-retail application (CBMA) along with their usage intention to adopt the technology for their online business transactions. This research model surveyed 348 Malaysian textile cyberpreneurs. The results show that both task characteristics and technology characteristics have positive significant effects on task-technology fit. Further analysis also suggests the fitness between task and technology has positively influenced textile cyberpreneurs’ intention to adopt cloud-based m-retail application. The findings contributed in acknowledging the usage intention among textile cyberpreneurs based on task-related factors which might be useful for service providers in delivering the right services for end-users. The directions for future research are also discussed

    A model of Islamic animated infographic as an innovative approach for digital Da’wah dissemination / Nur Nazihah Rahim … [et al.]

    Get PDF
    The animated infographic is becoming increasingly popular because it can attract audience attention instead of simply writing. It becomes a practical approach in disseminating information in most appealing, fun and easiest way. As people are living in myriad information, somehow it creates some problems such as confusing and difficult in recalling such information. Thus, it is unable to give an understanding for each information. Despite this, animated infographics could be a solution to convey the information successfully. Moreover, in this context of the study, Islamic animated infographic turns into one of an innovative approach to convey the Islamic da’wah in the digital era. There were still limited studies to assist in producing a model for Islamic animated infographic for da’wah dissemination. Moreover, there was a lack of reference on Islamic animation specifically in Islamic animated infographic corresponding with the nature of da’wah dissemination through digital towards Muslim community in Malaysia. Therefore, this study intends to develop a model of Islamic animated infographic as an innovative approach in digital da’wah. The method of this study was using assessment by the experts and survey of the 111 respondents both in Islamic background and design field. The significance of the research revealed that the Islamic animated infographic model can gives total comprehension and absorption of da’wah values to understand and practice in life. Islamic animated infographic model as a tool for da’wah dissemination is not just accepted by the audience as mere entertainment but also for the purpose of da’wah dissemination as well. It can be concluded that Islamic animated infographic could be an innovative approach in disseminating da’wah using digital technology towards the Muslim community in Malaysia by express the beauty of Islam through a creative and attractive approach

    Conceptual framework on information security risk management in information technology outsourcing / Nik Zulkarnaen Khidzir, Noor Habibah Arshad and Azlinah Mohamed

    Get PDF
    Data security and protection are seriously considered as information security risk for information asset in IT outsourcing (ITO). Therefore, risk management and analysis for security management is an approach to determine which security controls are appropriate and cost effective to be implemented across organization for ITO to secure data/information asset. However, previous established approach does not extensively focus into information security risk in ITO. For that reason, a conceptual framework on information security risk management in IT outsourcing (ISRM-ITO) will be introduced throughout this paper. An extensive amount of literature review on fundamental concepts, theoretical background and previous findings on information security risk management and ITO had been conducted. Throughout the review, theoretical foundation and the process that lead to success in managing information security risk ITO were identified and these findings become a key component in developing the conceptual framework. ISRM-ITO conceptual framework consists of two layers. The first layer concentrates on information security risks identification and analysis before the decision is made to outsource it. The second layer will cover the approach of information security risk management which is used to analyze, mitigate and monitor risks for the rest of the ITO lifecycle. Proposed conceptual framework could improve organization practices in information security study for IT outsourcing through the adoption of risk management approach. Finally, an approach to determine a cost effective security control for information security risk can be implemented successfully in the ITO cycle

    A Conceptual Framework of Cloud-Based Mobile-Retail Application for Textile Cyberpreneurs

    Get PDF
    Cloud-based m-retail application is commonly used by internet retailers and cyberpreneurs for conducting online business operations. The emergence of third-party e-commerce platforms along with incentives from Malaysian government has easily enabled the utilization of mobile marketplace app among both Malaysian sellers and customers. As m-retail has just started to gain attention in Malaysia, more works must be done to overcome the academic research limitations in terms of technological and non-technological perspectives. Meanwhile, textile and apparel products are among the most popular to be sold via the internet in addition to the growing number of related businesses. The uses of latest technology such as cloud-based mobile-retail application may help business owners to sustain for business survival. In designing a mobile applications for specific users, a thorough investigation must be performed. A conceptual framework of the apps might be helpful in providing a general overview of required elements for developing a successful mobile-retail applications. Extensive literature reviews, qualitative analysis, interviews and questionnaires have been conducted in designing and validating the proposed framework. The analysis results shows mean values from the survey are > 3.5 for the core element variables in this research. Thus, the statistical analysis validation results indicates the importance of the element as the fundamental component for the proposed framework. Therefore, this paper intends to propose a conceptual framework of cloud-based mobile-retail application specifically to be used by textile cyberpreneurs which might be helpful for related key players

    Risk and Threat via Online Social Network among Academia at Higher Education

    Get PDF
    The evolution of information and communication technologies (ICT) nowadays has changed the life style of human living.The current modern societies have adopted ICT as an important thing that they are really needed in their life, especially as a tool to be used for communications activity. However, unfortunately ICT also exposed its user in circumstances of risk, threats and vulnerability.This paper will discuss the risk and threats to the users who are using social media as a medium to communicate. In this paper, the fraction of user will be divided by two types which are gender and working experience.The data that obtained from the distributed of questionnaires among respondent will be analysed by using SPSS. Data will be analysed by using two-way ANOVA statistic in order to examine the significant level in between gender and working experience as an independent variable in this study with the level of threats in cyber security risk towards lecturers who are working in higher education institutions in Malaysia.This article also will provide an empirical data and will be referred to another researcher in the future for their further research perhaps

    A hybrid particle swarm optimization - extreme learning machine approach for intrusion detection system

    Get PDF
    There are several limitations that facing intrusion-detection system in current days, such as high rates of false positive alerts, low detection rates of rare but dangerous attacks. Daily, there are reports of incidents such as major ex-filtration of data for the purposes of stealing identities. Hybrid model's approaches have been widely used to increase the effectiveness of intrusion-detection platforms. This work proposes the extreme learning machine (ELM) is one of the poplar machine learning algorithms which, easy to implement with excellent learning performance characteristics. However, the internal power parameters (weight and basis) of ELM are initialized at random, causing the algorithm to be unstable. The Particle swarm optimization (PSO) is a well-known meta-heuristic which is used in this research to optimize the ELM. Our propose model has been apple based as intrusion detection and validated based on NSL-KDD data set. Our developed model has been compared against a basic ELM. PSO-ELM has outperformed a basic model in the testing accuracy
    corecore