Marzanah A. JabarUniversiti Putra Malaysia | UPM · Department of Information System
Marzanah A. Jabar
About
63
Publications
179,247
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
731
Citations
Publications
Publications (63)
Software developers have shown a lot of interest in using agile approaches and methods to manage projects. The Agile Manifesto in 2001 provided a good basis to use this as it formulated its 4 values and 12 principles. Adaptability was a common feature in the Agile Manifesto to make agility happen and there appears a need to combine dynamism to ensu...
Provision of sufficient knowledge to users is the ultimate goal of a knowledge management system (KMS). Unfortunately, existing KMS’s relyon human effort foraccess to desired knowledge. Semantic technologies have become a force for paradigm shift in KMS research. They aim to enable the delivery of the right knowledge to the right person and in the...
Tacit knowledge is perceived as the most strategically important resource of competitiveness. The rise of web-based applications such as social media also gives rise to the question on whether these applications can facilitate tacit knowledge sharing in a collaborative work environment. Previous studies have indicated that such notion is indeed pos...
Cloud computing represents the most important shift in computing and information technology (IT). However, security and privacy remain the main obstacles to its widespread adoption. In this research we will review the security and privacy challenges that affect critical data in cloud computing and identify solutions that are used to address these c...
The motivation of this paper is that the measurement based on the flow of information connecting software components can be used to evaluate component-based software system dependency. The ability to measure system dependency implies the capability to locate weakness in the system design and to determine the level of software quality. In this paper...
The growth of the Internet and web as a source of information and communication has led companies to use websites as an education tool. E-learning is gaining more acceptance as days pass because it provides learning opportunity any time and in any place. Moreover, e-learning has the potential to benefit learner/student, instructor, manager, adminis...
Effectiveness and efficiency of ERP execution is depending on the organization implementation. Every company
that embarks on ERP execution will definitely hope that the execution will be success and effective. The concept of
Critical Success Factors (CSFs) early emerged in 1961. Many studies have been conducted in order to analyze on
the most CSFs....
Mobile enterprise applications are primarily developed for existing backend enterprise systems and some usage scenarios require storing of large files on the mobile devices. These files range from large PDFs to media files in various formats (MPEG videos).These files needs to be used offline, sometimes updated and shared among users. In this paper,...
This paper discusses the Agile methodologies and the use of its water-scrum-fall derivative for software project
development. This approach seems to be a good alternative to the current development methods.
This paper aims in analysing the application of Social Media to enhance the Knowledge Integra-tion (KI) by
proposed of KI model for Small Medium Enterprises (SMEs) by using Rasch Model Application. An initial conceptual
model has been constructed based on TOE framework (Tech-nology, Organization, Environment) which is including
KI, Social Media, SM...
The purpose of this research is defining the main factors influencing on decision of management system on sensitive
data in cloud. The framework is proposed, a structured interview with experts working on cloud computing and a
pilot study conduct to explore the main objectives of framework. The framework using multilevel to enhance
management infor...
The purpose of this research is defining the main factors influencing on decision of management system on sensitive data in cloud. The framework is proposed to enhance management information systems decision on sensitive information in cloud environment. The structured interview with several security experts working on cloud computing security to i...
This study is among the first research that develops an instrument to measure Internet Banking Service (IBS) quality in Malaysian context based on Technology Acceptance Model (TAM) and nine service quality dimensions. The objective of this research is to highlight the weaknesses and strengths of IBS quality dimensions from Malaysian users' perspect...
Huge yearly investments were made by organizations for the development and maintenance. However, it has been reported that most of the IT projects fails as it is delayed, over budget and discontinued quality. A systematic literature review (SLR) was conducted to identify the critical success factors (CSFs) for the IT projects. Nine (9) CSFs was ide...
Semantic similarity is defined as the closeness of two concepts, based on the likeliness of their meaning. Most
semantic similarity is applied uses ontology. This research are uses ontology as a case study due to their efficiency,
scalability, lack of constraints and the availability of large ontologies. Ontology-based semantic similarity is used i...
Information security has been identified by organizations as part of internal operations that need to be well implemented and protected. This is because each day the organizations face a high probability of increase of threats to their networks and services that will lead to information security issues. Thus, effective information security manageme...
In practice, collected data usually are incomplete and contains missing value. Existing approaches in managing missing values overlook the importance of trustworthy data values in replacing missing values. In view that trusted completed data is very important in data analysis, we proposed a framework of missing value replacement using trustworthy d...
With the rising popularity of social media in the past few years, several researches ratiocinate that this type of interactive and collaborative technology could be a beneficial tool for the sharing of tacit knowledge. Nevertheless, very few literatures have tackled the subject of how social media could facilitate tacit knowledge sharing among medi...
. With the rising popularity of social media in the past few years, several researches ratiocinate that this type of interactive and collaborative technology could be a beneficial tool for the sharing of tacit knowledge. Nevertheless, very few literatures have tackled the subject of how social media could facilitate tacit knowledge sharing among me...
The aim of this review is to highlight issues in data quality research and to discuss potential research opportunity to achieve high data quality within an organization. The review adopted systematic literature review method based on research articles published in journals and conference proceedings. We developed a review strategy based on specific...
Objectives: This paper found that there is a need to propose a framework to measure the global virtual teams' performance involving online training and development, organizational commitment, and motivation in global IT projects. Also this research aims to examine the relationship among online training and development, organizational commitment, mo...
The growing number of big data technologies and analytic solutions has been developed to support the requirement of big data implementation. The capability of analyzing big data becomes critical issues in the big data implementation because the traditional analytics tools are no longer suitable to process and analyze the massive amount and differen...
Today the trend is to perform software development work via distributed geographical area among team, individual or even as an organization. However, due to the global market and international presence of many companies, there is a need to implement a global virtual teams. The global virtual team members are gradually engaged in globalized business...
Healthcare systems have recently received attention from industry related to the sensitive and confidential information stored in it. This information is shared among different physicians, surgeons and technicians in the distributed and heterogeneous environment. Bearing these security concerns in mind a model driven methodology of using security p...
The global virtual teams (GVTs) comprise of team members who are geographically dispersed, culturally varied, and mainly depends on information and communication technologies (ICT) to communicate with each other's. In spite of technological leverages, the GVTs facing many challenges that affect their performance. Hence, the online training and deve...
In spite of the increasing prevalence of global virtual teams (GVTs), It should be noted that in spite of the advantages of technology provides, most of global IT projects tend to face problems and risks, and great deal of such projects fail to reach all their objectives. According to the literature review we found that there is a lack of communica...
In most of the organizations, the collaboration across time, culture, and geographical boundaries has become one of the common practice and has given rise to the concept of globally teams known as virtual teams. Virtual teams use technologies to communicate with each other such as email, video conference, and text messages. Based on a review of the...
Ahstract-Virtual teams are established to during software development environment. Virtual team members are gradually engaged in globalized business environments across space, time and organizational boundaries with links ensured by information and communication technologies. A virtual team relies on communication, collaboration, and information ex...
Guaranteeing high data quality level is an important issue to increase the efficiency of the business processes. In fact, poor data quality produces wrong information, which leads to the failure of the business process improvement. Identifying data quality problems has positive impact on overall effectiveness and efficiency of the process improveme...
As mobile devices evolve, research on providing locationbased services attract researchers interest. A location-based service recommends information based on users geographical location provided by a mobile device. Mobile devices are engaged with users daily activities and lots of information and services are requested by users, so suggesting the p...
Nowadays, activities and decisions making in an organization is based on data and information obtained from data analysis, which provides various services for constructing reliable and accurate process. As data are significant resources in all organizations the quality of data is critical for managers and operating processes to identify related per...
In the recent past, there has been a huge increase in the crime rate, hence the significance of task to predict, prevent or solve the crimes. In this paper, we conducted an experiment to obtain better supervised classification learning algorithms to predict crime status by using two different feature selection methods tested on real dataset. Compar...
Data and information obtained from data analysis is an essential asset to construct and support information systems. As data is a significant resource, the quality of data is critical to enhance data quality and increase the effectiveness of busi-ness processes. Relationships among all four major data quality dimensions for process improvement are...
Awareness of data quality dimensions and their relationships, poses new challenges to the database provider during the past two decades. Although, information systems have continuous improvement against their data problems, their success progressively depends on their methodology. This paper presents a methodology to measure, analyze and evaluate d...
A component-based software system (CBSS) is a software system that is developed by integrating components that have been deployed independently. In the last few years, many researchers have proposed metrics to evaluate CBSS attributes. However, the practical use of these metrics can be difficult. For example, some of the metrics have concepts that...
Data and information obtained from data analysis is an essential asset to construct and support information systems. As data is a significant resource, the quality of data is critical to enhance data quality and increase the effectiveness of busi-ness processes. Relationships among all four major data quality dimensions for process improvement are...
Improving data quality is a basic step for all companies and organizations as it leads to increase opportunity to achieve top services. The aim of this study was to validate and adapt the four major data quality dimensions’ instruments in different information systems. The four important quality dimensions which were used in this study were; Accura...
The motivation of this study is to bridge the gap between component providers and component users, especially in the area of component evaluation, using component information flow (CIF) measurement and multidimensional approaches for measurement interpretation. By measuring the design of component-based software systems (CBSS), software designers,...
Knowledge hoarding in Requirements Elicitation (RE) phase could lead to Information Systems Development (ISD) project failure. Many researchers have discussed important factors in knowledge sharing. Nevertheless, the success rate for ISD projects is low and there are other major factors for consideration. Review was conducted to identify potential...
Different notions and techniques have been proposed to support query in XML. This led to the generation of algorithms to provide more efficient and accurate query processing. This research proposes an efficient algorithm to support keyword query in XML document. The propose algorithm, namely XMCCTree, employs MCLCA notion with some modifications in...
Nowadays, software projects are increasingly grown and complex. Therefore, the lack of comprehensive project initiation is a very pervasive failing. That is the success of the software development project relies on the quality of the project initiation. Whereas, 40% of the factors that impact on the success of the software project are included in t...
Keyword query is an important research in information retrieval. Although many approaches have been proposed, searching for efficient and accurate approach to answer keyword query still continue. This paper presents a new algorithm to select and generate MCCTree from XML document called XMCCTree. This algorithm uses CLCA and MCLCA notions and consi...
Software reuse is a major concern in many software development companies. It is one of the main strategies used to reduce
the cost of software product development. Studies show that the reuse strategy is the most significant strategy in terms of
effort and quality. That it could save the half of the software development effort and increase the qual...
In last decade, software engineering research increasingly focused on software quality enhancement and evaluation, whereas most of these researches concentrate on the internal/ development perspective. However, users mainly care in the quality of performs intended functions efficiently without knowing how the software product was developed, how it...
In last decade, researchers have often tried to improve the usability, portability, integrity and other aspects of software in order for it to be more users friendly and gain user trust. Several approaches and techniques have been proposed to reduce the negative effects of software size and complexity. Moreover, several software quality models were...
Software engineering practices are becoming increasingly important in order to mitigate any risk of failure that could result in costly downtime, incorrect behavior, or safety failures. Requirement elicitation is the process to systematically extract and identify the requirement of the system from a combination of human stakeholder, the system's en...
The concept of reusability is widely used, in order to reduce cost, effort, and time of software development. Reusability also increases the productivity, maintainability, portability, and reliability of the software products, which it has been evaluated before in other software products. The problems faced in software engineering not a lack of reu...
the software is always required to be developed and maintained a quality to the rapid progresses in industry, technology, economy, and other fields. Thus, software maintainability is the major activity in the software life cycle. This process bypass the cost required to develop new software product. However, software maintenance costs often total t...
Problem statement: In managing knowledge and competencies as a strategic advantage to an organization, there are difficulties in capturing, storing, sharing and reusing all this knowledge. Researchers have agreed that assessing tacit knowledge is difficult because knowhow of an employee are elusive and what more to assess them. It is compounded whe...
This paper is an initial review of literature, investigating qualitative research, to show its relevance in information system disciplines. Qualitative research involves the use of qualitative data, such as interviews, documents, and participant observation data, to understand and explain social phenomena. Qualitative research can be found in many...
The difficulty of defining and capitalizing the knowledge in an organization from the business data captured in text files. These text files defined as unstructured document that is without a specific format example, plain text. Hence, this paper presents an Interrogative Knowledge Identification framework to identify unstructured documents that en...
Nowadays, software products rapidly increased and it
is usage not limited to specific people or corporation. It is now used
in the most of human life activities. Therefore, the quality of the
software product is increasingly being important and the users
demanding higher quality than ever before. However, most of this
research is focused on the int...