About
62
Publications
62,411
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
1,419
Citations
Introduction
Azah Anir Norman is an Associate Professor in the Dept of Information Systems, Faculty of Computer Science and Information Technology, University of Malaya (UM). The areas of interest are in information security governance; information security management; information security systems; information security & trust; information security and privacy; information security education awareness; information security and assurance, information security policy and governance
Current institution
Publications
Publications (62)
Previous chapter explained the justification for conducting qualitative research and described the data collection methods involved, followed by a description of the qualitative data analysis process, which covers the selection of the participants and the interviews that were conducted. This chapter first presents the findings of the qualitative re...
The research methodology is the key component of the study that outlines the detailed activities of the research being undertaken. The research method selected is imperative in setting the right direction for the research and ensures the validity of the data collected. The chapter starts by describing the paradigm and various research for the appro...
The first chapter explained the research’s context, topic, objectives, questions, and its theoretical and practical contributions. This chapter begins with a literature analysis of BYOD characteristics, benefits and security risks and BYOD security policy compliance models and theories. The aim of thorough review is to lay the foundation for the di...
The previous chapter has reviewed theories and factors thoroughly to pave the way for the discovery of important factors impacting the BYOD security policy compliance intention. The identified factors serve as the basis for the conceptualization of the BYOD security policy compliance research framework. Detailed reviews of each hypothesized indepen...
Previous studies on BYOD security policy compliance had informed us that little research has been accomplished on identifying factors that influence security policy compliance amongst CNII agencies’ employees. Drawing from various theories namely, Organizational Control Theory, Social Cognitive Theory, security culture, additional factors such as S...
Cybersecurity is becoming an overly critical issue in contemporary times. Cyberspace safety is declining, covering all sphere of humanity. Deterioration in cybersecurity knowledge and awareness has resulted to more cybercrime victimisation. The more novel security systems are being developed, the higher the innovativeness of cybercriminals techniqu...
Over the past 20 years, universities have become the major drivers to improve scientific research and socio-industrial development, while Small and medium-sized enterprises (SMEs) have become key players in regional GDP contribution and technological innovation. Despite extensive studies on university-industry collaboration (UIC), there is a gap in...
Self-disclosure is one of the inevitable risky behaviors when using social media, which could lead to grave repercussions. Though self-disclosing benefits are abundant, risks like privacy invasion, security breaches, victim blaming, and cyber victimization await. However, the existing literature mainly discusses privacy-related factors as self-disc...
Background:
Several studies focus on the use of emerging technologies to support and monitor health but are centred around the elderly group of people. Meanwhile, the average elderly popularly known as the middle-aged have not been put into consideration regarding the subject matter.
Objective:
This article focuses on the use behaviour and accep...
Blockchain’s subversive potential challenges the traditional paradigm by centering around a complex equation that embodies the fundamental principle of trust. In this study, a model known as the Chain of Trust is proposed to uncover the embedded trust within this equation. Through a web-based self-administered survey involving 258 users, the resear...
Sarcasm is one of the nonliteral languages usually employed in social networks and microblogging websites to convey implicit information in an individual communication message. This could lead to the misclassification of tweets. This paper focuses on sarcasm detection on tweets, which has been experimented with the use of textual features. The text...
bold xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">Background:
Self-disclosure on social media can cause some privacy risks, but it benefits users and businesses if adequately managed. Companies may benefit from users’ self-disclosure on social media to better understand the consumers’ needs, customize s...
Bring Your Own Device (BYOD) is considered one of the top security risks organizations face today as these devices are very much part of the working culture of today’s employees. However, there is still a lack of understanding of BYOD security risks and their impact on both information security and service delivery, particularly in the government s...
Sarcasm is the main reason behind the faulty classification of tweets. It brings a challenge in natural language processing (NLP) as it hampers the method of finding people’s actual sentiment. Various feature engineering techniques are being investigated for the automatic detection of sarcasm. However, most related techniques have always concentrat...
Sarcasm is a complicated linguistic term commonly found in e-commerce and social media sites. Failure to identify sarcastic utterances in Natural Language Processing applications such as sentiment analysis and opinion mining will confuse classification algorithms and generate false results. Several studies on sarcasm detection have utilised differe...
Introduction. Sharing information on Facebook is becoming increasingly popular. Sharing text, video, voice, and pictures with unique content of the language-specific and sacred text, is becoming a trend. Consequently, issues of secure and trustable content have become increasingly important to all netizens. This issue has its foundations in the int...
Social entrepreneurship (SE) had been introduced in the university as one of the efforts to nurture future social entrepreneurs. SE courses established at the university level with a combination of cooperation from the local community and industry give a more effective impact on the local community. The knowledge and skills taught from universities...
Mobile cloud computing (MCC) is a domain that stemmed from advances in mobile technology and cloud computing. Although debate continues about the best strategies to preserve privacy and personal data protection in MCC, it is essential to explore the effects of applying privacy by design (PbD) to preserve privacy and personal data protection in MCC....
Sarcasm is a form of sentiment whereby people express the implicit information, usually the opposite of the message content in order to hurt someone emotionally or criticise something in a humorous way. Sarcasm identification in textual data, being one of the hardest challenges in natural language processing (NLP), has recently become an interestin...
The omnipresence of Bring Your Own Device (BYOD) in organizations and employees’ lives makes it a challenge to ensure adherence to security policy. In such situation, it is vital to understand the features of BYOD that impact the threat landscape, as well as identifying factors that contribute to security policy compliant behavior to create a secur...
This study examines the efficacy of robots as assistive technology (AT) learning tools for children with autism spectrum disorder (ASD). The study attempts to find answers to whether robots as assistive tools can (i) profoundly improve achievement in learning and (ii) provide valuable learning experiences among this group of children. Using LEGO Mi...
As a result of a shift in the world of technology, the combination of ubiquitous mobile networks and cloud computing produced the mobile cloud computing (MCC) domain. As a consequence of a major concern of cloud users, privacy and data protection are getting substantial attention in the field. Currently, a considerable number of papers have been pu...
This systematic mapping literature aims to identify current research and directions for future studies in terms of combating cyber propaganda in the social media, which is used by both human effort and technological approaches (socio-technical) for mitigation. Out of 5176 retrieved articles, only 98 of them were selected for primary studies; classi...
The proliferation of mobile devices has brought the Bring Your Own Device (BYOD) trend in organizations, along with significant challenges when employees fail to comply with security policies. Previous reviews in this research area had focused solely on the technical issues surrounding BYOD implementation while leaving out the human behavior in com...
Organizations have different takes on Information Security Management Systems (ISMS) since security measurements vary according to their business relevance. One way to assure ISMS is being well-implemented is by having a standard compliance such as the ISO 27000 series. The ISO 27000 series is a family of standards that provides a framework for bes...
A lot of cybersecurity breaches occur due to human errors. Tertiary institutions need to enhance students’ cybersecurity awareness and capabilities, hence promoting safe cybersecurity behaviors. Socio-psychological factors affects students’ cybersecurity behaviors. We explore to what extent age, gender and educational level, plays a role in mediati...
Advancements in information and communication technology, and online web users have given attention to the virtual representation of each user, which is crucial for effective service personalization. Meeting users need and preferences is an ongoing challenge in service personalization. This issue can be addressed through the building of a comprehen...
International students are valuable resources in higher education but they often face challenges due to lack of social engagement and unfamiliarity with the new social context. The use of social network sites (SNS) such as Facebook has the potential to support international students, but limited studies have examined the actual information-seeking...
During the decade, interactions among people have gradually changed as a result of the popularity, availability and accessibility of social networking sites (SNSs). SNSs enhance our lives in terms of relaxation, knowledge, and communication. On the other hand, the information security and privacy of SNS users have been threatened with most users no...
Users’ adherence to security policy, reduced internal security threats, appropriate security
behaviour and a culture of security-aware users are among the results of an effective security
awareness effort in an organisation. Generally, security awareness efforts are meant to change
behaviour communally, however, most of them are actually focused on...
Purpose
The explosion of social media use such as Facebook among higher education students is deemed to have great potential in widely disseminating environmental sustainability awareness. The paper aims to capture, summarise, synthesise and comment on the role of social media to garner interest of students and staff on environmental sustainabilit...
Purpose
The paper aims to investigate the current Information Systems Security (ISS) practices of the Social Software Application (SSA) users via the Internet.
Design/methodology/approach
The paper opted for a systematic literature review (SLR) survey on ISS and its practices in SSAs between 2010 and 2015. The studies includes a set of 39 papers...
Purpose
The purpose of this paper is to investigate the information-seeking behaviour of international students in terms of their information needs and to highlight the role of social media.
Design/methodology/approach
In this paper, a systematic literature survey was conducted in order to investigate information-seeking trends among international...
Wasatiyyah is a concept introduced in the public administration by Prime Minister Dato ’Seri Mohd. Najib Tun Razak in 2010. The emphasis on this concept and approaches for the country is seen as a welfare approach in all aspects of sustainable development. It is also a confirmation of the view that Malaysia is an Islamic state and rejects any form...
Information System Security Management (ISSM) studies today have presented remarkable solutions in addressing security management (SM) problems. Many companies have designed SM procedures to protect their businesses from threats. Often, ISSM implemented by these businesses are based largely on common practices, current understanding and business re...
In recent years, Muslims have depended on the Halal logo, displayed on food packaging, to indicate that the products are prepared according to Halal precepts. As laid out in the Quran, Halal designates that which is lawful and permitted. However, due to the rapid development of advanced technology and the stringent procedures legislated by the Depa...
The adoption of Information Systems (IS) in many businesses is at a fast tempo in order to be more competitive. This fast adoption is very much supported by the rapid technology advancement and the increasing demand from business stakeholders. Together with the introduction of the Internet with its remarkable features, plus the free-form of policin...
As Halal is the greatest concert to all Muslims, several measures have been taken by the authorities to educate Muslims about Halal status on food products. Introducing Halal logo is one of the significant approaches. Challenges faced by manufacturers in promoting their products to Muslims consumers made process of securing Halal logo harder. Fake...
Weakness of information presented on the food packaging of specific food product usually lead to confusion and redundant unsold goods stacked-up in the shopping market. Barcode, labels and ingredients information by far is not adequate to authenticate the validity of the information claimed by the manufacturer or food producer. This long-establishe...
The lack of information presented on the food packaging of specific food product usually lead to confusion, thus redundant unsold goods are stacked-up in the shopping market. Barcode, labels and ingredients information by far is not adequate to authenticate the validity of the food information claimed by the manufacturer or food producer. This long...
Personal Software Process (PSP) ultimately provides software engineers an excellent framework and practice that can help them to improve the quality of their work, by analyzing their performance statistically and helping them to achieve realistic goals set by them. Besides, PSP offers many benefits to software engineers. However, through findings a...
This paper presents the design and development of an insurance policies recommender for prospect client. The main aims of MyINS are twofold. The first aim is to simplify the process for client in making decision base on the information recommended through this system. The second aim is to allow client to choose the insurance policy that is most sui...
Knowledge Management (KM) refers to a range of practices used by organizations to identify, create, represent and distribute knowledge for reuse, awareness, and learning across organizations. Libraries have always been regarded as a reader's haven. With the proven advantages of KM, libraries are able to use this technology to improve their services...
Knowledge Management (KM) refers to a range of practices used by organizations to identify, create, represent, and distribute knowledge for reuse, awareness, and learning across the organizations. KM is fast emerging in applications involving large repositories of data and information. Realizing the benefits and potential of KM, organizations are b...