15 research outputs found

    Online learning adoption in a developing countries : a case of the Indonesian Open University

    Get PDF
    As many academic institutions adopt web-based learning or online learning to deliver variety of courses, the effectiveness and efficiency of these new technologies are still doubtful. By adopting TAM as research model, this study tends to investigate factors influencing online learning adoption in Universitas Terbuka (UT), Indonesia

    Information disclosure behaviour in social media among Malaysian youth: the impact of privacy concern, risk and trust

    Get PDF
    People have been using Social Network Sites (SNS) to communicate and make friends through online. Although SNS has been benefited its users in many ways, information privacy seemed to be overlooked. This study proposes a framework to examine usersโ€™ protective behaviour associated with information disclosure in SNS. The proposed framework was derived based on the Protection Motivation Theory and Privacy Concer

    Information disclosure behaviour in social media among Malaysian youth : the impact of privacy concern, risk and trust

    Get PDF
    People have been using Social Network Sites (SNS) to communicate and make friends through online. Although SNS has been benefited its users in many ways, information privacy seemed to be overlooked. This study proposes a framework to examine users? protective behaviour associated with information disclosure in SNS. The proposed framework was derived based on the Protection Motivation Theory and Privacy Concern

    Evading Antivirus Software Detection Using Python and PowerShell Obfuscation Framework

    Get PDF
    Avoiding antivirus detection in penetration testing activities is quite complex. The simplest, most effective, and most efficient way is by obfuscating malicious code. However, the obfuscation process will also be very complex and time-consuming if done manually. To solve this problem, there are many tools or frameworks on the internet that can automate the obfuscation process, but how effective are the obfuscation tools to evade antivirus detection. This paper aims to provide an overview of the effectiveness of the obfuscation framework in avoiding antivirus detection

    Modeling G2C Adoption in Developing Country: A Case Study of Malaysia

    Get PDF
    Electronic government or e-government has long been known as a breakthrough of a new form of communication and transaction between the government and citizens, the government and industries, and among the government agencies. Simply, e-government is meant not only to help the government to accomplish its daily administrative activities but also to provide an easier way to communicate with external entities such as citizens and businesses throughout the utilization of information and communication technology (ICT). With the implementation of e-government in Malaysia, study about Government to Citizens (G2C) adoption could be significantly important in reflecting its progress. Against this backdrop, this research intends to study G2C adoption in Malaysia by adopting Technology Acceptance Model (TAM) theory as a framework. Other factors that are believed to be influencing citizensโ€™ intention to use G2C system are also examined in the study

    An integrated model of E-Government adoption the case of electronic tax filing among Indonesian corporate taxpayers

    No full text
    Electronic Tax Filing or e-filing system has been regarded as one of the important egovernment initiatives to optimize the tax returns for a country. Indonesian government has put huge investment on the development of e-filing system and infrastructure, yet the rate of adoption is still low. Directorate General of Taxation (DJP) as e-filing service provider should have considered several aspects in increasing number of e-filing service subscribers including system, individual, government and social characteristics. Therefore, this study aims to explain e-filing acceptance and use among the corporate taxpayers by adopting several prominent technology adoption frameworks and theories such as Technology Acceptance Model (TAM), Innovation Diffusion Theory (IDT) and Perceived Characteristics of Innovating (PCI) as well as incorporating relevant factors such as trust, risk, security control, privacy protection and reputation into the research model. To better understand about e-filing implementation, a mix method approach involving survey study and semi-structured interview were conducted. A total of 156 respondents from different corporations participated in the survey study

    MOVING TOWARD E-BUSINESS: CUSTOMER RELATIONSHIP MANAGEMENT ALIGNMENT IN MALAYSIAN SMALL BUSINESS

    No full text
    MOVING TOWARD E-BUSINESS: CUSTOMER RELATIONSHIP MANAGEMENT ALIGNMENT IN MALAYSIAN SMALL BUSINES

    An empirical study of the factors influencing information disclosure behaviour in social networking sites

    No full text
    Since the introduction of social networks over a decade ago, a number of research has focused on understanding the behavior of social network user in disclosing information over the Social Network Sites(SNS). Although the issue of privacy breach on SNS has been widely reported, very few studies have used the Protection Motivation Theory (PMT) as a framework to understand SNS userโ€™s behaviour related to information disclosure. This study employed the PMT, incorporated with trust, perceived risk and privacy concern to investigate the factors affecting information disclosure behavior on SNS among 486 undergraduate students in Malaysia. Our findings showed that perceived risk, perceived benefits and trust on SNS influenced individual information disclosure behaviour. However, privacy concern was found not related to information disclosure behaviour

    Face Recognition of Indonesiaโ€™s Top Government Officials Using Deep Convolutional Neural Network

    No full text
    Facial recognition is a part of Computer Vision that is used to get facial coordinates from an image. Many algorithms have been developed to support Facial Detection such as Cascade Face Detection using Haar-Like features and AdaBoost to classify its Cascade and Convolutional Neural Network (CNN). Face recognition in this study uses the Deep Convolutional Neural Network (DCNN) method, and the output of this method is the measurement value of the face. In the model training process, Triplet Loss from Triplet Network Deep Metric Learning is used to get good face grouping results. The value of this face measurement will then be measured using the Euclidean distance calculation to determine the similarity of the input face from the dataset. This Research is using 6 images of Government officers in Indonesia to determine the accuracy of the model when there is a new picture of these officers inputted into the training machine. The result provides a 94% accuracy level with a variety of face positions and levels of brightness.Facial recognition is a part of Computer Vision that is used to get facial coordinates from an image. Many algorithms have been developed to support Facial Detection such as Cascade Face Detection using Haar-Like features and AdaBoost to classify its Cascade and Convolutional Neural Network (CNN). Face recognition in this study uses the Deep Convolutional Neural Network (DCNN) method, and the output of this method is the measurement value of the face. In the model training process, Triplet Loss from Triplet Network Deep Metric Learning is used to get good face grouping results. The value of this face measurement will then be measured using the Euclidean distance calculation to determine the similarity of the input face from the dataset. This Research is using 6 images of Government officers in Indonesia to determine the accuracy of the model when there is a new picture of these officers inputted into the training machine. The result provides a 94% accuracy level with a variety of face positions and levels of brightness

    Social Network Analysis: Identification of Communication and Information Dissemination (Case Study of Holywings)

    No full text
    Social media especially Twitter has been used by corporation or organization as an effective tool to interact and communicate with the consumers. Holywings is one of the popular restaurants in Indonesia that use social media as a tool to promote and disseminate information regarding their products and services. However, one of their promotional items has gone viral and invited public protests which turned into a trending topic on Twitter for a couple of weeks. Holywings allegedly improperly promoted their products by using the most honorable names, โ€œMuhammadโ€ and โ€œMariaโ€. Social network analysis of Twitter data is conducted to identify and examine information circulating among the users, which leads to wider public attention and law enforcement. In this study, we focused on the conversation about Holywings on Twitter from 24 June to 31 July 2022. The analysis was carried out using Python to retrieve data and Gephi software to visualize the interactions and the intensity of the network group in viewing the spread of information. The findings reveal the centrality account that caused the news to go viral are the CNN Indonesia (@CNNIndonesia) news media account and Haris Pertama (@knpiharis), with a centrality of 0.161 and 0.282, respectively. There are also 121 groups involved in the conversation with modularity of 0.821
    corecore