About
6
Publications
968
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
10
Citations
Introduction
Skills and Expertise
Publications
Publications (6)
The issue of data privacy, as well as its security and policy management has received a fair share of media attention since the introduction of the Personal Data Protection Act 2010 (PDPA) in Malaysia. Governments around the world have variously introduced similar laws such as the Australian Privacy Act of 1988, and the European General Data Protec...
Information security governance (ISG) is a relatively new and under-researched topic. A review of literature shows the lack of an ISG framework or model that can help the implementation of ISG. This research aims to introduce an empirically grounded ISG process model as a practical reference to facilitate the implementation of ISG in organisations....
An ad-hoc wireless network is a collection of wireless mobile nodes that self-configure to construct a network without the need for any established infrastructure or backbone. Ad hoc networks use mobile nodes to enable communication outside wireless transmission range. Mobile Ad-hoc wireless networks (MANETs) assume no existing infrastructure is av...
The robust development of the telecommunication technologies has boosted the massive production of the mobile devices such as smartphones, phablets, tablets, and laptops. The use of these mobile devices has experienced an explosive growth and come in vary screen sizes. This development has changed the way how web contents is organized and displayed...
This paper discusses the various texture-based and vector-based approaches to classify coins.These two types of approaches are common for software-based coin sorting systems. Many researchers have applied algorithms known in artificial intelligence research for feature extraction, selection and classification of coin images. However, without a comm...
This paper presents an empirical assessment of the “New Economy” in China, drawing upon the linkage between information technology (IT) and economic growth. The aim of this paper is to interpret China’s economic growth from a perspective which emphasizes IT as a factor in economic growth. While the explosive growth of IT investment in the developed...