15 research outputs found
Online learning adoption in a developing countries : a case of the Indonesian Open University
As many academic institutions adopt web-based learning or online learning to deliver variety of courses, the effectiveness and efficiency of these new technologies are still doubtful. By adopting TAM as research model, this
study tends to investigate factors influencing online learning adoption in Universitas Terbuka (UT), Indonesia
Information disclosure behaviour in social media among Malaysian youth: the impact of privacy concern, risk and trust
People have been using Social Network Sites
(SNS) to communicate and make friends through online.
Although SNS has been benefited its users in many
ways, information privacy seemed to be overlooked.
This study proposes a framework to examine usersโ
protective behaviour associated with information
disclosure in SNS. The proposed framework was
derived based on the Protection Motivation Theory and
Privacy Concer
Information disclosure behaviour in social media among Malaysian youth : the impact of privacy concern, risk and trust
People have been using Social Network Sites (SNS) to communicate and make friends through online. Although SNS has been benefited its users in many ways, information privacy seemed to be overlooked. This study proposes a framework to examine users? protective behaviour associated with information disclosure in SNS. The proposed framework was derived based on the Protection Motivation Theory and Privacy Concern
Evading Antivirus Software Detection Using Python and PowerShell Obfuscation Framework
Avoiding antivirus detection in penetration testing activities is quite complex. The simplest, most effective, and most efficient way is by obfuscating malicious code. However, the obfuscation process will also be very complex and time-consuming if done manually. To solve this problem, there are many tools or frameworks on the internet that can automate the obfuscation process, but how effective are the obfuscation tools to evade antivirus detection. This paper aims to provide an overview of the effectiveness of the obfuscation framework in avoiding antivirus detection
Modeling G2C Adoption in Developing Country: A Case Study of Malaysia
Electronic government or e-government has long been known as a breakthrough of a new form of communication and transaction between the government and citizens, the government and industries, and among the government agencies. Simply, e-government is meant not only to help the government to accomplish its daily administrative activities but also to provide an easier way to communicate with external entities such as citizens and businesses throughout the utilization of information and communication technology (ICT). With the implementation of e-government in Malaysia, study about Government to Citizens (G2C) adoption could be significantly important in reflecting its progress. Against this backdrop, this research intends to study G2C adoption in Malaysia by adopting Technology Acceptance Model (TAM) theory as a framework. Other factors that are believed to be influencing citizensโ intention to use G2C system are also examined in the study
An integrated model of E-Government adoption the case of electronic tax filing among Indonesian corporate taxpayers
Electronic Tax Filing or e-filing system has been regarded as one of the important egovernment initiatives to optimize the tax returns for a country. Indonesian government has put huge investment on the development of e-filing system and infrastructure, yet the rate of adoption is still low. Directorate General of Taxation (DJP) as e-filing service provider should have considered several aspects in increasing number of e-filing service subscribers including system, individual, government and social characteristics. Therefore, this study aims to explain e-filing acceptance and use among the corporate taxpayers by adopting several prominent technology adoption frameworks and theories such as Technology Acceptance Model (TAM), Innovation Diffusion Theory (IDT) and Perceived Characteristics of Innovating (PCI) as well as incorporating relevant factors such as trust, risk, security control, privacy protection and reputation into the research model. To better understand about e-filing implementation, a mix method approach involving survey study and semi-structured interview were conducted. A total of 156 respondents from different corporations participated in the survey study
MOVING TOWARD E-BUSINESS: CUSTOMER RELATIONSHIP MANAGEMENT ALIGNMENT IN MALAYSIAN SMALL BUSINESS
MOVING TOWARD E-BUSINESS: CUSTOMER RELATIONSHIP MANAGEMENT ALIGNMENT IN MALAYSIAN SMALL BUSINES
An empirical study of the factors influencing information disclosure behaviour in social networking sites
Since the introduction of social networks over a decade ago, a number of research has focused on understanding the behavior of social network user in disclosing information over the Social Network Sites(SNS). Although the issue of privacy breach on SNS has been widely reported, very few studies have used the Protection Motivation Theory (PMT) as a framework to understand SNS userโs behaviour related to information disclosure. This study employed the PMT, incorporated with trust, perceived risk and privacy concern to investigate the factors affecting information disclosure
behavior on SNS among 486 undergraduate students in Malaysia. Our findings showed that perceived risk, perceived benefits and trust on SNS influenced individual information disclosure behaviour. However, privacy concern was found not related to information disclosure behaviour
Face Recognition of Indonesiaโs Top Government Officials Using Deep Convolutional Neural Network
Facial recognition is a part of Computer Vision that is used to get facial coordinates from an image. Many algorithms have been developed to support Facial Detection such as Cascade Face Detection using Haar-Like features and AdaBoost to classify its Cascade and Convolutional Neural Network (CNN). Face recognition in this study uses the Deep Convolutional Neural Network (DCNN) method, and the output of this method is the measurement value of the face. In the model training process, Triplet Loss from Triplet Network Deep Metric Learning is used to get good face grouping results. The value of this face measurement will then be measured using the Euclidean distance calculation to determine the similarity of the input face from the dataset. This Research is using 6 images of Government officers in Indonesia to determine the accuracy of the model when there is a new picture of these officers inputted into the training machine. The result provides a 94% accuracy level with a variety of face positions and levels of brightness.Facial recognition is a part of Computer Vision that is used to get facial coordinates from an image. Many algorithms have been developed to support Facial Detection such as Cascade Face Detection using Haar-Like features and AdaBoost to classify its Cascade and Convolutional Neural Network (CNN). Face recognition in this study uses the Deep Convolutional Neural Network (DCNN) method, and the output of this method is the measurement value of the face. In the model training process, Triplet Loss from Triplet Network Deep Metric Learning is used to get good face grouping results. The value of this face measurement will then be measured using the Euclidean distance calculation to determine the similarity of the input face from the dataset. This Research is using 6 images of Government officers in Indonesia to determine the accuracy of the model when there is a new picture of these officers inputted into the training machine. The result provides a 94% accuracy level with a variety of face positions and levels of brightness
Social Network Analysis: Identification of Communication and Information Dissemination (Case Study of Holywings)
Social media especially Twitter has been used by corporation or organization as an effective tool to interact and communicate with the consumers. Holywings is one of the popular restaurants in Indonesia that use social media as a tool to promote and disseminate information regarding their products and services. However, one of their promotional items has gone viral and invited public protests which turned into a trending topic on Twitter for a couple of weeks. Holywings allegedly improperly promoted their products by using the most honorable names, โMuhammadโ and โMariaโ. Social network analysis of Twitter data is conducted to identify and examine information circulating among the users, which leads to wider public attention and law enforcement. In this study, we focused on the conversation about Holywings on Twitter from 24 June to 31 July 2022. The analysis was carried out using Python to retrieve data and Gephi software to visualize the interactions and the intensity of the network group in viewing the spread of information. The findings reveal the centrality account that caused the news to go viral are the CNN Indonesia (@CNNIndonesia) news media account and Haris Pertama (@knpiharis), with a centrality of 0.161 and 0.282, respectively. There are also 121 groups involved in the conversation with modularity of 0.821