Marzanah A. Jabar

Marzanah A. Jabar
Universiti Putra Malaysia | UPM · Department of Information System

About

63
Publications
179,247
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
731
Citations

Publications

Publications (63)
Article
Software developers have shown a lot of interest in using agile approaches and methods to manage projects. The Agile Manifesto in 2001 provided a good basis to use this as it formulated its 4 values and 12 principles. Adaptability was a common feature in the Agile Manifesto to make agility happen and there appears a need to combine dynamism to ensu...
Article
Full-text available
Provision of sufficient knowledge to users is the ultimate goal of a knowledge management system (KMS). Unfortunately, existing KMS’s relyon human effort foraccess to desired knowledge. Semantic technologies have become a force for paradigm shift in KMS research. They aim to enable the delivery of the right knowledge to the right person and in the...
Chapter
Tacit knowledge is perceived as the most strategically important resource of competitiveness. The rise of web-based applications such as social media also gives rise to the question on whether these applications can facilitate tacit knowledge sharing in a collaborative work environment. Previous studies have indicated that such notion is indeed pos...
Article
Full-text available
Cloud computing represents the most important shift in computing and information technology (IT). However, security and privacy remain the main obstacles to its widespread adoption. In this research we will review the security and privacy challenges that affect critical data in cloud computing and identify solutions that are used to address these c...
Conference Paper
Full-text available
The motivation of this paper is that the measurement based on the flow of information connecting software components can be used to evaluate component-based software system dependency. The ability to measure system dependency implies the capability to locate weakness in the system design and to determine the level of software quality. In this paper...
Conference Paper
Full-text available
The growth of the Internet and web as a source of information and communication has led companies to use websites as an education tool. E-learning is gaining more acceptance as days pass because it provides learning opportunity any time and in any place. Moreover, e-learning has the potential to benefit learner/student, instructor, manager, adminis...
Article
Full-text available
Effectiveness and efficiency of ERP execution is depending on the organization implementation. Every company that embarks on ERP execution will definitely hope that the execution will be success and effective. The concept of Critical Success Factors (CSFs) early emerged in 1961. Many studies have been conducted in order to analyze on the most CSFs....
Conference Paper
Full-text available
Mobile enterprise applications are primarily developed for existing backend enterprise systems and some usage scenarios require storing of large files on the mobile devices. These files range from large PDFs to media files in various formats (MPEG videos).These files needs to be used offline, sometimes updated and shared among users. In this paper,...
Article
Full-text available
This paper discusses the Agile methodologies and the use of its water-scrum-fall derivative for software project development. This approach seems to be a good alternative to the current development methods.
Article
Full-text available
This paper aims in analysing the application of Social Media to enhance the Knowledge Integra-tion (KI) by proposed of KI model for Small Medium Enterprises (SMEs) by using Rasch Model Application. An initial conceptual model has been constructed based on TOE framework (Tech-nology, Organization, Environment) which is including KI, Social Media, SM...
Article
Full-text available
The purpose of this research is defining the main factors influencing on decision of management system on sensitive data in cloud. The framework is proposed, a structured interview with experts working on cloud computing and a pilot study conduct to explore the main objectives of framework. The framework using multilevel to enhance management infor...
Article
Full-text available
The purpose of this research is defining the main factors influencing on decision of management system on sensitive data in cloud. The framework is proposed to enhance management information systems decision on sensitive information in cloud environment. The structured interview with several security experts working on cloud computing security to i...
Article
Full-text available
This study is among the first research that develops an instrument to measure Internet Banking Service (IBS) quality in Malaysian context based on Technology Acceptance Model (TAM) and nine service quality dimensions. The objective of this research is to highlight the weaknesses and strengths of IBS quality dimensions from Malaysian users' perspect...
Article
Full-text available
Huge yearly investments were made by organizations for the development and maintenance. However, it has been reported that most of the IT projects fails as it is delayed, over budget and discontinued quality. A systematic literature review (SLR) was conducted to identify the critical success factors (CSFs) for the IT projects. Nine (9) CSFs was ide...
Article
Full-text available
Semantic similarity is defined as the closeness of two concepts, based on the likeliness of their meaning. Most semantic similarity is applied uses ontology. This research are uses ontology as a case study due to their efficiency, scalability, lack of constraints and the availability of large ontologies. Ontology-based semantic similarity is used i...
Article
Full-text available
Information security has been identified by organizations as part of internal operations that need to be well implemented and protected. This is because each day the organizations face a high probability of increase of threats to their networks and services that will lead to information security issues. Thus, effective information security manageme...
Article
Full-text available
In practice, collected data usually are incomplete and contains missing value. Existing approaches in managing missing values overlook the importance of trustworthy data values in replacing missing values. In view that trusted completed data is very important in data analysis, we proposed a framework of missing value replacement using trustworthy d...
Article
With the rising popularity of social media in the past few years, several researches ratiocinate that this type of interactive and collaborative technology could be a beneficial tool for the sharing of tacit knowledge. Nevertheless, very few literatures have tackled the subject of how social media could facilitate tacit knowledge sharing among medi...
Article
Full-text available
. With the rising popularity of social media in the past few years, several researches ratiocinate that this type of interactive and collaborative technology could be a beneficial tool for the sharing of tacit knowledge. Nevertheless, very few literatures have tackled the subject of how social media could facilitate tacit knowledge sharing among me...
Article
Full-text available
The aim of this review is to highlight issues in data quality research and to discuss potential research opportunity to achieve high data quality within an organization. The review adopted systematic literature review method based on research articles published in journals and conference proceedings. We developed a review strategy based on specific...
Article
Full-text available
Objectives: This paper found that there is a need to propose a framework to measure the global virtual teams' performance involving online training and development, organizational commitment, and motivation in global IT projects. Also this research aims to examine the relationship among online training and development, organizational commitment, mo...
Article
Full-text available
The growing number of big data technologies and analytic solutions has been developed to support the requirement of big data implementation. The capability of analyzing big data becomes critical issues in the big data implementation because the traditional analytics tools are no longer suitable to process and analyze the massive amount and differen...
Article
Full-text available
Today the trend is to perform software development work via distributed geographical area among team, individual or even as an organization. However, due to the global market and international presence of many companies, there is a need to implement a global virtual teams. The global virtual team members are gradually engaged in globalized business...
Article
Healthcare systems have recently received attention from industry related to the sensitive and confidential information stored in it. This information is shared among different physicians, surgeons and technicians in the distributed and heterogeneous environment. Bearing these security concerns in mind a model driven methodology of using security p...
Article
Full-text available
The global virtual teams (GVTs) comprise of team members who are geographically dispersed, culturally varied, and mainly depends on information and communication technologies (ICT) to communicate with each other's. In spite of technological leverages, the GVTs facing many challenges that affect their performance. Hence, the online training and deve...
Article
Full-text available
In spite of the increasing prevalence of global virtual teams (GVTs), It should be noted that in spite of the advantages of technology provides, most of global IT projects tend to face problems and risks, and great deal of such projects fail to reach all their objectives. According to the literature review we found that there is a lack of communica...
Conference Paper
Full-text available
In most of the organizations, the collaboration across time, culture, and geographical boundaries has become one of the common practice and has given rise to the concept of globally teams known as virtual teams. Virtual teams use technologies to communicate with each other such as email, video conference, and text messages. Based on a review of the...
Conference Paper
Full-text available
Ahstract-Virtual teams are established to during software development environment. Virtual team members are gradually engaged in globalized business environments across space, time and organizational boundaries with links ensured by information and communication technologies. A virtual team relies on communication, collaboration, and information ex...
Conference Paper
Full-text available
Guaranteeing high data quality level is an important issue to increase the efficiency of the business processes. In fact, poor data quality produces wrong information, which leads to the failure of the business process improvement. Identifying data quality problems has positive impact on overall effectiveness and efficiency of the process improveme...
Chapter
As mobile devices evolve, research on providing locationbased services attract researchers interest. A location-based service recommends information based on users geographical location provided by a mobile device. Mobile devices are engaged with users daily activities and lots of information and services are requested by users, so suggesting the p...
Article
Full-text available
Nowadays, activities and decisions making in an organization is based on data and information obtained from data analysis, which provides various services for constructing reliable and accurate process. As data are significant resources in all organizations the quality of data is critical for managers and operating processes to identify related per...
Article
Full-text available
In the recent past, there has been a huge increase in the crime rate, hence the significance of task to predict, prevent or solve the crimes. In this paper, we conducted an experiment to obtain better supervised classification learning algorithms to predict crime status by using two different feature selection methods tested on real dataset. Compar...
Data
Full-text available
Data and information obtained from data analysis is an essential asset to construct and support information systems. As data is a significant resource, the quality of data is critical to enhance data quality and increase the effectiveness of busi-ness processes. Relationships among all four major data quality dimensions for process improvement are...
Article
Full-text available
Awareness of data quality dimensions and their relationships, poses new challenges to the database provider during the past two decades. Although, information systems have continuous improvement against their data problems, their success progressively depends on their methodology. This paper presents a methodology to measure, analyze and evaluate d...
Article
Full-text available
A component-based software system (CBSS) is a software system that is developed by integrating components that have been deployed independently. In the last few years, many researchers have proposed metrics to evaluate CBSS attributes. However, the practical use of these metrics can be difficult. For example, some of the metrics have concepts that...
Article
Full-text available
Data and information obtained from data analysis is an essential asset to construct and support information systems. As data is a significant resource, the quality of data is critical to enhance data quality and increase the effectiveness of busi-ness processes. Relationships among all four major data quality dimensions for process improvement are...
Article
Full-text available
Improving data quality is a basic step for all companies and organizations as it leads to increase opportunity to achieve top services. The aim of this study was to validate and adapt the four major data quality dimensions’ instruments in different information systems. The four important quality dimensions which were used in this study were; Accura...
Article
Full-text available
The motivation of this study is to bridge the gap between component providers and component users, especially in the area of component evaluation, using component information flow (CIF) measurement and multidimensional approaches for measurement interpretation. By measuring the design of component-based software systems (CBSS), software designers,...
Article
Knowledge hoarding in Requirements Elicitation (RE) phase could lead to Information Systems Development (ISD) project failure. Many researchers have discussed important factors in knowledge sharing. Nevertheless, the success rate for ISD projects is low and there are other major factors for consideration. Review was conducted to identify potential...
Article
Different notions and techniques have been proposed to support query in XML. This led to the generation of algorithms to provide more efficient and accurate query processing. This research proposes an efficient algorithm to support keyword query in XML document. The propose algorithm, namely XMCCTree, employs MCLCA notion with some modifications in...
Article
Full-text available
Nowadays, software projects are increasingly grown and complex. Therefore, the lack of comprehensive project initiation is a very pervasive failing. That is the success of the software development project relies on the quality of the project initiation. Whereas, 40% of the factors that impact on the success of the software project are included in t...
Conference Paper
Keyword query is an important research in information retrieval. Although many approaches have been proposed, searching for efficient and accurate approach to answer keyword query still continue. This paper presents a new algorithm to select and generate MCCTree from XML document called XMCCTree. This algorithm uses CLCA and MCLCA notions and consi...
Conference Paper
Full-text available
Software reuse is a major concern in many software development companies. It is one of the main strategies used to reduce the cost of software product development. Studies show that the reuse strategy is the most significant strategy in terms of effort and quality. That it could save the half of the software development effort and increase the qual...
Article
Full-text available
In last decade, software engineering research increasingly focused on software quality enhancement and evaluation, whereas most of these researches concentrate on the internal/ development perspective. However, users mainly care in the quality of performs intended functions efficiently without knowing how the software product was developed, how it...
Conference Paper
Full-text available
In last decade, researchers have often tried to improve the usability, portability, integrity and other aspects of software in order for it to be more users friendly and gain user trust. Several approaches and techniques have been proposed to reduce the negative effects of software size and complexity. Moreover, several software quality models were...
Article
Software engineering practices are becoming increasingly important in order to mitigate any risk of failure that could result in costly downtime, incorrect behavior, or safety failures. Requirement elicitation is the process to systematically extract and identify the requirement of the system from a combination of human stakeholder, the system's en...
Article
Full-text available
The concept of reusability is widely used, in order to reduce cost, effort, and time of software development. Reusability also increases the productivity, maintainability, portability, and reliability of the software products, which it has been evaluated before in other software products. The problems faced in software engineering not a lack of reu...
Article
Full-text available
the software is always required to be developed and maintained a quality to the rapid progresses in industry, technology, economy, and other fields. Thus, software maintainability is the major activity in the software life cycle. This process bypass the cost required to develop new software product. However, software maintenance costs often total t...
Article
Full-text available
Problem statement: In managing knowledge and competencies as a strategic advantage to an organization, there are difficulties in capturing, storing, sharing and reusing all this knowledge. Researchers have agreed that assessing tacit knowledge is difficult because knowhow of an employee are elusive and what more to assess them. It is compounded whe...
Article
Full-text available
This paper is an initial review of literature, investigating qualitative research, to show its relevance in information system disciplines. Qualitative research involves the use of qualitative data, such as interviews, documents, and participant observation data, to understand and explain social phenomena. Qualitative research can be found in many...
Article
Full-text available
The difficulty of defining and capitalizing the knowledge in an organization from the business data captured in text files. These text files defined as unstructured document that is without a specific format example, plain text. Hence, this paper presents an Interrogative Knowledge Identification framework to identify unstructured documents that en...
Article
Nowadays, software products rapidly increased and it is usage not limited to specific people or corporation. It is now used in the most of human life activities. Therefore, the quality of the software product is increasingly being important and the users demanding higher quality than ever before. However, most of this research is focused on the int...

Network

Cited By