About
86
Publications
56,021
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
626
Citations
Introduction
Skills and Expertise
Current institution
Additional affiliations
June 2012 - present
Education
October 2008 - April 2012
Publications
Publications (86)
Purpose — This paper aims to propose a framework of Islamic estate planning of crypto assets in Malaysia. Design/Methodology/Approach — The paper used an interview method to obtain information related to Islamic estate planning of crypto assets. Semi-structured interviews were conducted with informants of five different backgrounds including lawyer...
Many people own online accounts, with some having financial values like Internet banking, e-wallet and cryptocurrency. In the case of sudden death, their heirs are unaware of the digital assets possessed by the deceased person, which causes the assets to be lost forever, and the heirs might not receive the assets. If an estate plan did not account...
The rapid growth of computer technology has led to the invention of digital assets containing financial values like cryptocurrency and e-wallets, consequently increasing individuals’ digital asset ownership. However, many people do not realise the importance of estate planning for their digital assets. In the case of sudden death, unavailable estat...
We live in an information world where visual data undergo exponential growth within a very short time window. With diverging content diversity, we simply have no capacity to keep track of those data. While short video platforms (such as TikTok™ or YouTube Shorts™) can helped users viewing relevant videos within the shortest time possible, those vid...
This study evaluated the effectiveness of a malware awareness program designed to enhance college students’ knowledge of malware prevention strategies and promote responsible online behavior. The program group discussions and presentations are designed to address misconceptions and improve students’ understanding of malware prevention, including id...
Video data has grown significantly as a result of the expanding usage of high-resolution cameras and longer retention periods, necessitating effective archiving solutions, such as video surveillance systems, that make data easy to retrieve and maintain data integrity. These systems are relied upon by businesses and private users to protect their as...
Smart technologies have become increasingly integral to modern society, bringing many benefits and opportunities. However, they also raise important questions about their impacts on individuals, organisations, and society and how everyone can move forward smoothly in integrating and adopting technology. Therefore, this study analysed and reviewed t...
Smart technologies have become increasingly integral to modern society, bringing many benefits and opportunities. However, they also raise important questions about their impacts on individuals, organisations, and society and how everyone can move forward smoothly in integrating and adopting technology. Therefore, this study analysed and reviewed t...
Students engage with the core operations of university business processes, making them potential targets susceptible to significant cyberattack risks due to their limited experience and knowledge in information security. Consequently, IT students must gain awareness and competence in information security to mitigate potential threats and attacks, i...
Purpose
This paper aims to collect evidence on the issues and challenges in cryptocurrency estate planning and the possible approaches or methods to address them. Then, this paper also aims to understand Malaysia’s situation compared to global situations and determine how the country could address those challenges.
Design/methodology/approach
This...
The Internet of Things (IoT) has become the fundamental infrastructure of many intelligent applications, such as smart homes. IoT applications store distributes various information, including user authentication information, over a public channel that exposes it to security threats and attacks. Therefore, this study intends to protect authenticatio...
The limited capabilities of IoT devices have resulted in some of the tasks of IoT applications being distributed to a cloud server, which witnessed the arisen of the cloud of things (COT). It enables IoT applications' development and deployment as a service, providing additional data storage, enhanced processing performance, and fast communication...
Many previous studies had proven that The PRESENT algorithm is ultra-lightweight encryption. Therefore, it is suitable for use in an IoT environment. However, the main problem with block encryption algorithms like PRESENT is that it causes attackers to break the encryption key. In the context of a fingerprint template, it contains a header and many...
Many previous studies had proven that The PRESENT algorithm is ultra-lightweight encryption. Therefore, it is suitable for use in an IoT environment. However, the main problem with block encryption algorithms like PRESENT is that it causes attackers to break the encryption key. In the context of a fingerprint template, it contains a header and many...
Recently, the adoption of smart home technology has been on the rise and becoming a trend for home residents. The development of Internet-of-Things (IoT) technology drives the smart home authentication system with biometric systems such as facial recognition, fingerprint, and voice control techniques. In the context of homeowners, security is alway...
Purpose
Despite internet banking’s popularity, there is a rise in phishing attacks related to online banking transactions. Phishing attacks involved the process of sending out electronic mails impersonating the valid banking institutions to their customers and demanding confidential data such as credential and transaction authorisation code. The pu...
The efforts in designing and developing lightweight cryptography (LWC) started a decade ago. Many scholarly studies in literature report the enhancement of conventional cryptographic algorithms and the development of new algorithms. This significant number of studies resulted in the rise of many review studies on LWC in IoT. Due to the vast number...
Social media analytics is a method for social network data such as Facebook, Instagram, LinkedIn, and Twitter to be gathered and evaluated. Marketers typically use it to monitor online discussions about goods and businesses. There is a lack of knowledge about social media analysis in society and the amount of unstructured data is increasing, which...
Purpose – Many REpresentational State Transfer (RESTful) Web services suffered from anti-patterns
problem, which may diminish the sustainability of the services. The anti-patterns problem could happen in
the code of the programme or the uniform resource identifiers (URIs) of RESTful Web services. This study
aims to address the problem by proposing...
Citations have been an acceptable journal performance metric used by many indexing databases for inclusion and discontinuation of journals in their list. Therefore, editorial teams must maintain their journal performance by increasing article citations for continuous content indexing in the databases. With this aim in hand, this study intended to a...
Purpose
Halal tourism is a subset of tourism activities geared towards Muslim which are aligned with the Islamic principles. As a response to this, many food operators have realised the importance of having a halal certification to establish a better market position. In the context of Indonesia, it is yet to be known what attitudes the food operato...
Fingerprint is a reliable user authentication method as it is unique to individual users that makes it efficient for authenticating users. In a fingerprint authentication system, user fingerprint information is stored in databases in an image format known as a fingerprint template. Although fingerprint is reliable, the templates stored in the datab...
Single Sign-on (SSO) authentication was introduced to overcome the problem of password memorability issue by enabling the users to login once using a set of username and password that allows an access into multiple websites. Among several SSO protocol, OpenID is said to offer flexibility and security. Unfortunately, the existing OpenID model is pro...
Web services provide a uniform framework to achieve a high level of interaction between distributed heterogeneous software systems and data resources shared over the Internet. Producing a well-designed web service is significant because it leads to a more understandable service and a higher level of interaction and leads to effective software maint...
Modern mobile phones or smartphones have multipurpose functions apart from being used as a device for voice and text communications. They are also embedded with many useful sensors, including camera, barometer, accelerometer, and digital compass. Unlike other types of sensor, the smartphone camera has been underutilized. This paper aims to fill the...
The aspiration that lies behind Service Oriented-Computing (SOC) is to achieve a greatest loosely communication between vendors of service and end-users. Moreover, the vision for SOC is getting an effective portability and interoperability with a high degree of flexibility and speed . Thus, Web Service (WS) technology becomes the promising choice f...
Security and privacy issues are a major concern to users of social network sites (SNS). These issues range from unauthorized access to personal information to cyber bullying. Previous researchers have been exerting different perspectives including technical, psychological and law to study privacy and security issues. However, the issues of security...
Authentication is a security component that maintains user access to applications. It has been the primary reason for users to create user-names and passwords before they can use applications. In creating usernames and passwords; users are required to fill in their personal information in which it is a time-consuming process. Additionally, it also...
The concept of security and privacy in Social Networks Sites (SNS) are becoming very popular and the number of users are increasing rapidly. These issues run from unapproved access to individual data to digital harassing. Past researchers have been applying alternate points of view including specialized tools and law to ponder protection and securi...
Many application providers enforce users to register and create credentials to use their applications. The registration process usually requires the users to fill in personal information in which it is a time-consuming process. Additionally, it also increases the number of usernames and passwords that users need to remember which leads to password...
The fingerprint is the most widely used technology for identification or authentication systems, which can be known as fingerprint authentication systems (FAS). In addition to providing security, the fingerprint is also easy to use, very reliable and has a high accuracy for identity recognition. FAS is still exposed to security attacks because fing...
Modern mobile phones or smartphones have become a pervasive and affordable device for users at different levels of age around the world. Smartphones equipped with many useful sensors, including camera, barometer, accelerometer, and digital compass. The sensors on smartphones attracted researchers and developers to develop mobile applications (apps)...
Agile Scrum Software development methodology has been accepted widely by the Software Engineering (SE) community. This is mainly due to agile principles that emphasize on rapid development process which enables working quality software to be delivered on time. Successful Agile Scrum project depends on the high-performance of team members that assig...
The problem of password memorability among users has led to the introduction of Single Sign-On (SSO) authentication. It enables users to login using a set of username and password which then allows an access into multiple websites without the hassle of repeating the same usernames and passwords. One of the most common SSO protocol is OpenID which i...
This paper proposes the architecture and components of a web-based content sequencing system known IT-Tutor. It organizes an appropriate sequence of learning content based on individual students’ prior knowledge. The dynamic and flexible organization of learning content is meant to achieve adaptive computer-based learning. IT-Tutor was evaluated in...
The emergent of mobile device technology has increased the need for wireless network coverage in organizations. Users with mobile devices such as smartphones, computer tablets, and laptops require a wireless network to access the Internet services. Network administrators face challenges in managing access to the Internet and data usage by these dev...
Students' engagement in computer-based learning activity is hard to regulate and maintain at an optimal level. Hence, many students do not benefit from it, and they tend not to use it again after the first attempt. This is a challenge towards ensuring the sustainability of future computer-based learning. In order to overcome this issue, this resear...
Home security system is an emerging technology that gained much attention recently by homeowners. The conventional hardwired system is easy to install in newly developed homes; however, the existing homes require complex configuration of such systems which involves substantial cost. Hence, a wireless home security system has been an alternative to...
Network Intrusion Detection Systems (NIDSs) have always been designed to enhance and improve the network security issue by detecting, identifying, assessing and reporting any unauthorized and illegal network connections and activities. The purpose of this research is to improve on the existing Anomaly Based Intrusion Detection (ABID) method using K...
Digital repository is one of the tools for sharing and dissemination of knowledge. Through this system, a broader group of user can retrieve the information contained in the repository and utilized them for academic purposes. Through this repository, proceedings articles specifically articles from the proceedings of Knowledge Management Internation...
Single Sign-on (SSO) authentication was introduced to overcome the problem of password memorability issue by enabling the users to login once using a set of username and password that allows an access into multiple websites. Among several SSO protocol, OpenID is said to offer flexibility and security. Unfortunately, the existing OpenID model is pro...
Social login (SL) has recently emerged as a solution for single sign-on (SSO) within the web and mobile environments. It allows users to use their existing social network credentials (SNC) to login to third party web applications without the need to create a new identity in the intended applications’ database. Although it has been used by many web...
The utilization of the Internet has grown tremendously resulting in more critical data are being transmitted and handled online. Hence, these occurring changes have led to draw the conclusion that the number of attacks on the important information over the internet is increasing yearly. Intrusion is one of the main threat to the internet. Various t...
Single Sign-On (SSO) requires one time authentication with a set of username and password which then allows an authorized user to enter all resources. This scheme was introduced to overcome the issue of memorability load among users who own several accounts. Currently, there are four main SSO protocols; 1)Security Assertion Markup Language (SAML),...
This article presents a research concerning password management and single sign-on for accessing Internet applications. Many Internet applications require users to subscribe to their services and authenticate themselves through the use of login credentials. The number of such applications is increasing exponentially, which caused ineffective login...
This paper investigates linear and nonlinear navigations in Web-based learning (WBL) systems. The aim of the study was to identify whether the linear and the nonlinear navigations could be the factors that influence students’ engagement within WBL environment. An experimental study was conducted on seventy-two students from a university in Malaysia...
Students’ cognitive-affective states are human-elements that are crucial in the design of computer-based learning (CBL) systems. This paper presents an investigation of students’ cognitiveaffective states (i.e., engaged concentration, anxiety, and boredom) when they learn a particular course within CBL systems. The results of past studies by other...
Students' cognitive-affective states are human-elements that are crucial in the design of computer-based learning (CBL) systems. This paper presents an investigation of students' cognitiveaffective states (i.e., engaged concentration, anxiety, and boredom) when they learn a particular course within CBL systems. The results of past studies by other...
This paper reports a study concerning linear and non-linear navigations in WBI. The effects of the two navigations on students' engagement aspects namely; control, focus, curiosity, and intrinsic interests were investigated. The study aimed to identify whether the linear and the non-linear navigations could be the factors that influence students' e...
The traditional hypermedia learning systems (HLS) provide learners with a non-linear navigation of learning content. However, it does not benefit all students as planning for navigation path may cause disorientation. This paper proposes an approach named Skill-Challenge Balancing (SCB) that provides adaptive navigation support for learners to learn...
The present study aims to show if a skill-challenge balancing (SCB) instruction strategy can assist learners to motivationally engage in computer-based learning. Csikszentmihalyi's flow theory (self-control, curiosity, focus of attention, and intrinsic interest) was applied to an account of the optimal learning experience in SCB-based learning acti...
Information security control assessment provides a comprehensive control analysis approach to assist an organization in measuring the effectiveness of its current and
planned security controls.ISO/IEC 27005 is a risk management framework that can manage and treat risks in organizations.However, ISO/IEC 27005 does not define a clear guideline on how...
The current state of information security compliance in workplaces is deteriorating. In many cases human factors were attributed as the cause of the problem. Humans are well known as the weakest link in the security chain. Commonly, end-users will depend on security messages when confronted with security-related decision making. Most of the time, e...
This paper presents a research on product-specific web information gathering concept that intends to improve web searching through conventional search engines. Search engines are useful for searching general information; however, the results are not always accurate because they return the results based on key-words occurrences, but not accurateness...
The number of password-protected Internet-based applications is increasing significantly compared to a decade ago. Consequently, it causes an increase in the number of login credentials that users have to manage, for both Internet ad mobile environments. This paper presents a study that specifically focused on students’ login credential management...
Purpose – The purpose of this research is to investigate student engagement in guided web-based learning systems. It looks into students' engagement and their behavioral patterns in two types of guided learning systems (i.e. a fully- and a partially-guided). The research also aims to demonstrate how the engagement evolves from the beginning towards...
With the growing demand in e-learning system, traditional e-learning systems have dramatically evolved to provide more adaptive ways of learning, in terms of learning objectives, courses, individual learning processes, and so on. This paper reports on differences in learning experience from the learner's perspectives when using an adaptive e-learni...
This study investigated students' experiences in two types of instructional strategies (i.e., fully-guided and partially guided) and their learning experience patterns from the beginning towards the end of the computer-based interactions. An empirical study was performed on 41 students from a public university in Malaysia using two types of compute...
This paper addresses the issue of content sequencing in computer-based learning (CBL). In doing so, it proposes a Skill-Challenge Balancing (SCB) approach as a way to enhance the CBL experience. The approach is based on the Flow Theory, allowing self-adjustment of the given levels of challenges in a given learning tasks so that the learner will con...
This article reports on a study concerning an optimal learning experience by curriculum sequencing systems (CSS) that is being frequently used in adaptive e-learning systems design. In doing so, we first implemented a CSS application - `IT-Tutor' to teach tertiary students vis-à-vis `Computer Network' - using `dynamic sequencing approach (DSA)'. Ne...
Computer applications in education are now common to complement a classroom teaching and learning activity. However, a reportedly obscure area in the computer-based instruction is how it can systematically implement the different learning path for the diverse levels of students. In this respect, the dynamic (or adaptive) curriculum sequencing is qu...
As an early view in my doctoral study, this paper submits a framework for evaluating intelligent tutoring systems (ITSs), embracing well-known pedagogical theories -- Cognitive Theory of Multimedia Learning and Modality Principles. What I have interested in is that these theories have been successfully applied in e-learning systems design and evalu...
Intelligent tutoring systems (ITSs) have been proven effective in supporting students' learning activities, but the actual utilization of ITSs has not been confirmed. Delegation of development tasks from developers to teachers through the use of ITS authoring tools (ITSATs) is not promoting rapid progress in this area of research. Designing ITSs us...
Purpose – The purpose of this paper is to present the utilization of a web-based support system for flood response operation in Malaysia. The system is intentionally designed to improve process and data management towards providing prompt and effective response to victims.
Design/methodology/approach – The implementation of the research adopted the...
Patterns could be discovered from historical data and can be used to recommend decisions suitable for a typical situation in the past. In this study, the sliding window technique was used to discover flood patterns that relate hydrological data consisting of river water levels and rainfall measurements. Unique flood occurrence patterns were obtaine...
Failed management in emergency response effort due to inefficient and ineffective operation influences the adoption of information and communication technology specifically the Internet technology and World Wide Web. Timeliness, rapid response and efficient information dissemination are crucial in emergency management. This paper proposes a softwar...
The paper proposes an approach to transform an information based portal into a knowledge-based hub. The study is made on the Agribazaar, which is an information-based portal provided by the Department of Agriculture, Ministry of Agriculture and Agri-based Industry, Malaysia. Basically, the portal has been developed to offer an internet-based commer...
In most countries in the world, flood had caused damages to properties and it involved a large amount of loss to individuals and governments. During the flood, it is important to have efficient flood response operation system to manage all activities among different related agencies. In Malaysia, flood response operations are divided according to t...