Norliza Katuk

Norliza Katuk
  • PhD(Information Technology)
  • Professor (Associate) at Northern University of Malaysia

About

86
Publications
56,021
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
626
Citations
Current institution
Northern University of Malaysia
Current position
  • Professor (Associate)
Additional affiliations
June 2012 - present
Northern University of Malaysia
Position
  • Senior Researcher
Education
October 2008 - April 2012
Massey University
Field of study
  • Information Technology

Publications

Publications (86)
Article
Full-text available
Purpose — This paper aims to propose a framework of Islamic estate planning of crypto assets in Malaysia. Design/Methodology/Approach — The paper used an interview method to obtain information related to Islamic estate planning of crypto assets. Semi-structured interviews were conducted with informants of five different backgrounds including lawyer...
Article
Many people own online accounts, with some having financial values like Internet banking, e-wallet and cryptocurrency. In the case of sudden death, their heirs are unaware of the digital assets possessed by the deceased person, which causes the assets to be lost forever, and the heirs might not receive the assets. If an estate plan did not account...
Chapter
The rapid growth of computer technology has led to the invention of digital assets containing financial values like cryptocurrency and e-wallets, consequently increasing individuals’ digital asset ownership. However, many people do not realise the importance of estate planning for their digital assets. In the case of sudden death, unavailable estat...
Chapter
We live in an information world where visual data undergo exponential growth within a very short time window. With diverging content diversity, we simply have no capacity to keep track of those data. While short video platforms (such as TikTok™ or YouTube Shorts™) can helped users viewing relevant videos within the shortest time possible, those vid...
Chapter
This study evaluated the effectiveness of a malware awareness program designed to enhance college students’ knowledge of malware prevention strategies and promote responsible online behavior. The program group discussions and presentations are designed to address misconceptions and improve students’ understanding of malware prevention, including id...
Chapter
Video data has grown significantly as a result of the expanding usage of high-resolution cameras and longer retention periods, necessitating effective archiving solutions, such as video surveillance systems, that make data easy to retrieve and maintain data integrity. These systems are relied upon by businesses and private users to protect their as...
Article
Full-text available
Smart technologies have become increasingly integral to modern society, bringing many benefits and opportunities. However, they also raise important questions about their impacts on individuals, organisations, and society and how everyone can move forward smoothly in integrating and adopting technology. Therefore, this study analysed and reviewed t...
Article
Full-text available
Smart technologies have become increasingly integral to modern society, bringing many benefits and opportunities. However, they also raise important questions about their impacts on individuals, organisations, and society and how everyone can move forward smoothly in integrating and adopting technology. Therefore, this study analysed and reviewed t...
Article
Full-text available
Students engage with the core operations of university business processes, making them potential targets susceptible to significant cyberattack risks due to their limited experience and knowledge in information security. Consequently, IT students must gain awareness and competence in information security to mitigate potential threats and attacks, i...
Article
Purpose This paper aims to collect evidence on the issues and challenges in cryptocurrency estate planning and the possible approaches or methods to address them. Then, this paper also aims to understand Malaysia’s situation compared to global situations and determine how the country could address those challenges. Design/methodology/approach This...
Article
Full-text available
The Internet of Things (IoT) has become the fundamental infrastructure of many intelligent applications, such as smart homes. IoT applications store distributes various information, including user authentication information, over a public channel that exposes it to security threats and attacks. Therefore, this study intends to protect authenticatio...
Article
Full-text available
The limited capabilities of IoT devices have resulted in some of the tasks of IoT applications being distributed to a cloud server, which witnessed the arisen of the cloud of things (COT). It enables IoT applications' development and deployment as a service, providing additional data storage, enhanced processing performance, and fast communication...
Article
Full-text available
Many previous studies had proven that The PRESENT algorithm is ultra-lightweight encryption. Therefore, it is suitable for use in an IoT environment. However, the main problem with block encryption algorithms like PRESENT is that it causes attackers to break the encryption key. In the context of a fingerprint template, it contains a header and many...
Article
Full-text available
Many previous studies had proven that The PRESENT algorithm is ultra-lightweight encryption. Therefore, it is suitable for use in an IoT environment. However, the main problem with block encryption algorithms like PRESENT is that it causes attackers to break the encryption key. In the context of a fingerprint template, it contains a header and many...
Article
Full-text available
Recently, the adoption of smart home technology has been on the rise and becoming a trend for home residents. The development of Internet-of-Things (IoT) technology drives the smart home authentication system with biometric systems such as facial recognition, fingerprint, and voice control techniques. In the context of homeowners, security is alway...
Article
Purpose Despite internet banking’s popularity, there is a rise in phishing attacks related to online banking transactions. Phishing attacks involved the process of sending out electronic mails impersonating the valid banking institutions to their customers and demanding confidential data such as credential and transaction authorisation code. The pu...
Article
Full-text available
The efforts in designing and developing lightweight cryptography (LWC) started a decade ago. Many scholarly studies in literature report the enhancement of conventional cryptographic algorithms and the development of new algorithms. This significant number of studies resulted in the rise of many review studies on LWC in IoT. Due to the vast number...
Article
Full-text available
Social media analytics is a method for social network data such as Facebook, Instagram, LinkedIn, and Twitter to be gathered and evaluated. Marketers typically use it to monitor online discussions about goods and businesses. There is a lack of knowledge about social media analysis in society and the amount of unstructured data is increasing, which...
Article
Purpose – Many REpresentational State Transfer (RESTful) Web services suffered from anti-patterns problem, which may diminish the sustainability of the services. The anti-patterns problem could happen in the code of the programme or the uniform resource identifiers (URIs) of RESTful Web services. This study aims to address the problem by proposing...
Article
Full-text available
Citations have been an acceptable journal performance metric used by many indexing databases for inclusion and discontinuation of journals in their list. Therefore, editorial teams must maintain their journal performance by increasing article citations for continuous content indexing in the databases. With this aim in hand, this study intended to a...
Article
Purpose Halal tourism is a subset of tourism activities geared towards Muslim which are aligned with the Islamic principles. As a response to this, many food operators have realised the importance of having a halal certification to establish a better market position. In the context of Indonesia, it is yet to be known what attitudes the food operato...
Article
Full-text available
Fingerprint is a reliable user authentication method as it is unique to individual users that makes it efficient for authenticating users. In a fingerprint authentication system, user fingerprint information is stored in databases in an image format known as a fingerprint template. Although fingerprint is reliable, the templates stored in the datab...
Preprint
Full-text available
Single Sign-on (SSO) authentication was introduced to overcome the problem of password memorability issue by enabling the users to login once using a set of username and password that allows an access into multiple websites. Among several SSO protocol, OpenID is said to offer flexibility and security. Unfortunately, the existing OpenID model is pro...
Article
Full-text available
Web services provide a uniform framework to achieve a high level of interaction between distributed heterogeneous software systems and data resources shared over the Internet. Producing a well-designed web service is significant because it leads to a more understandable service and a higher level of interaction and leads to effective software maint...
Article
Full-text available
Modern mobile phones or smartphones have multipurpose functions apart from being used as a device for voice and text communications. They are also embedded with many useful sensors, including camera, barometer, accelerometer, and digital compass. Unlike other types of sensor, the smartphone camera has been underutilized. This paper aims to fill the...
Chapter
The aspiration that lies behind Service Oriented-Computing (SOC) is to achieve a greatest loosely communication between vendors of service and end-users. Moreover, the vision for SOC is getting an effective portability and interoperability with a high degree of flexibility and speed . Thus, Web Service (WS) technology becomes the promising choice f...
Article
Security and privacy issues are a major concern to users of social network sites (SNS). These issues range from unauthorized access to personal information to cyber bullying. Previous researchers have been exerting different perspectives including technical, psychological and law to study privacy and security issues. However, the issues of security...
Article
Authentication is a security component that maintains user access to applications. It has been the primary reason for users to create user-names and passwords before they can use applications. In creating usernames and passwords; users are required to fill in their personal information in which it is a time-consuming process. Additionally, it also...
Article
The concept of security and privacy in Social Networks Sites (SNS) are becoming very popular and the number of users are increasing rapidly. These issues run from unapproved access to individual data to digital harassing. Past researchers have been applying alternate points of view including specialized tools and law to ponder protection and securi...
Conference Paper
Many application providers enforce users to register and create credentials to use their applications. The registration process usually requires the users to fill in personal information in which it is a time-consuming process. Additionally, it also increases the number of usernames and passwords that users need to remember which leads to password...
Article
Full-text available
The fingerprint is the most widely used technology for identification or authentication systems, which can be known as fingerprint authentication systems (FAS). In addition to providing security, the fingerprint is also easy to use, very reliable and has a high accuracy for identity recognition. FAS is still exposed to security attacks because fing...
Article
Full-text available
Modern mobile phones or smartphones have become a pervasive and affordable device for users at different levels of age around the world. Smartphones equipped with many useful sensors, including camera, barometer, accelerometer, and digital compass. The sensors on smartphones attracted researchers and developers to develop mobile applications (apps)...
Article
Full-text available
Agile Scrum Software development methodology has been accepted widely by the Software Engineering (SE) community. This is mainly due to agile principles that emphasize on rapid development process which enables working quality software to be delivered on time. Successful Agile Scrum project depends on the high-performance of team members that assig...
Article
The problem of password memorability among users has led to the introduction of Single Sign-On (SSO) authentication. It enables users to login using a set of username and password which then allows an access into multiple websites without the hassle of repeating the same usernames and passwords. One of the most common SSO protocol is OpenID which i...
Article
This paper proposes the architecture and components of a web-based content sequencing system known IT-Tutor. It organizes an appropriate sequence of learning content based on individual students’ prior knowledge. The dynamic and flexible organization of learning content is meant to achieve adaptive computer-based learning. IT-Tutor was evaluated in...
Conference Paper
The emergent of mobile device technology has increased the need for wireless network coverage in organizations. Users with mobile devices such as smartphones, computer tablets, and laptops require a wireless network to access the Internet services. Network administrators face challenges in managing access to the Internet and data usage by these dev...
Article
Students' engagement in computer-based learning activity is hard to regulate and maintain at an optimal level. Hence, many students do not benefit from it, and they tend not to use it again after the first attempt. This is a challenge towards ensuring the sustainability of future computer-based learning. In order to overcome this issue, this resear...
Conference Paper
Full-text available
Home security system is an emerging technology that gained much attention recently by homeowners. The conventional hardwired system is easy to install in newly developed homes; however, the existing homes require complex configuration of such systems which involves substantial cost. Hence, a wireless home security system has been an alternative to...
Conference Paper
Network Intrusion Detection Systems (NIDSs) have always been designed to enhance and improve the network security issue by detecting, identifying, assessing and reporting any unauthorized and illegal network connections and activities. The purpose of this research is to improve on the existing Anomaly Based Intrusion Detection (ABID) method using K...
Article
Full-text available
Digital repository is one of the tools for sharing and dissemination of knowledge. Through this system, a broader group of user can retrieve the information contained in the repository and utilized them for academic purposes. Through this repository, proceedings articles specifically articles from the proceedings of Knowledge Management Internation...
Article
Single Sign-on (SSO) authentication was introduced to overcome the problem of password memorability issue by enabling the users to login once using a set of username and password that allows an access into multiple websites. Among several SSO protocol, OpenID is said to offer flexibility and security. Unfortunately, the existing OpenID model is pro...
Conference Paper
Social login (SL) has recently emerged as a solution for single sign-on (SSO) within the web and mobile environments. It allows users to use their existing social network credentials (SNC) to login to third party web applications without the need to create a new identity in the intended applications’ database. Although it has been used by many web...
Conference Paper
Full-text available
The utilization of the Internet has grown tremendously resulting in more critical data are being transmitted and handled online. Hence, these occurring changes have led to draw the conclusion that the number of attacks on the important information over the internet is increasing yearly. Intrusion is one of the main threat to the internet. Various t...
Conference Paper
Single Sign-On (SSO) requires one time authentication with a set of username and password which then allows an authorized user to enter all resources. This scheme was introduced to overcome the issue of memorability load among users who own several accounts. Currently, there are four main SSO protocols; 1)Security Assertion Markup Language (SAML),...
Chapter
This article presents a research concerning password management and single sign-on for accessing Internet applications. Many Internet applications require users to subscribe to their services and authenticate themselves through the use of login credentials. The number of such applications is increasing exponentially, which caused ineffective login...
Chapter
This paper investigates linear and nonlinear navigations in Web-based learning (WBL) systems. The aim of the study was to identify whether the linear and the nonlinear navigations could be the factors that influence students’ engagement within WBL environment. An experimental study was conducted on seventy-two students from a university in Malaysia...
Article
Full-text available
Students’ cognitive-affective states are human-elements that are crucial in the design of computer-based learning (CBL) systems. This paper presents an investigation of students’ cognitiveaffective states (i.e., engaged concentration, anxiety, and boredom) when they learn a particular course within CBL systems. The results of past studies by other...
Article
Full-text available
Students' cognitive-affective states are human-elements that are crucial in the design of computer-based learning (CBL) systems. This paper presents an investigation of students' cognitiveaffective states (i.e., engaged concentration, anxiety, and boredom) when they learn a particular course within CBL systems. The results of past studies by other...
Article
Full-text available
This paper reports a study concerning linear and non-linear navigations in WBI. The effects of the two navigations on students' engagement aspects namely; control, focus, curiosity, and intrinsic interests were investigated. The study aimed to identify whether the linear and the non-linear navigations could be the factors that influence students' e...
Conference Paper
The traditional hypermedia learning systems (HLS) provide learners with a non-linear navigation of learning content. However, it does not benefit all students as planning for navigation path may cause disorientation. This paper proposes an approach named Skill-Challenge Balancing (SCB) that provides adaptive navigation support for learners to learn...
Article
The present study aims to show if a skill-challenge balancing (SCB) instruction strategy can assist learners to motivationally engage in computer-based learning. Csikszentmihalyi's flow theory (self-control, curiosity, focus of attention, and intrinsic interest) was applied to an account of the optimal learning experience in SCB-based learning acti...
Article
Full-text available
Information security control assessment provides a comprehensive control analysis approach to assist an organization in measuring the effectiveness of its current and planned security controls.ISO/IEC 27005 is a risk management framework that can manage and treat risks in organizations.However, ISO/IEC 27005 does not define a clear guideline on how...
Conference Paper
The current state of information security compliance in workplaces is deteriorating. In many cases human factors were attributed as the cause of the problem. Humans are well known as the weakest link in the security chain. Commonly, end-users will depend on security messages when confronted with security-related decision making. Most of the time, e...
Conference Paper
This paper presents a research on product-specific web information gathering concept that intends to improve web searching through conventional search engines. Search engines are useful for searching general information; however, the results are not always accurate because they return the results based on key-words occurrences, but not accurateness...
Article
The number of password-protected Internet-based applications is increasing significantly compared to a decade ago. Consequently, it causes an increase in the number of login credentials that users have to manage, for both Internet ad mobile environments. This paper presents a study that specifically focused on students’ login credential management...
Article
Purpose – The purpose of this research is to investigate student engagement in guided web-based learning systems. It looks into students' engagement and their behavioral patterns in two types of guided learning systems (i.e. a fully- and a partially-guided). The research also aims to demonstrate how the engagement evolves from the beginning towards...
Article
With the growing demand in e-learning system, traditional e-learning systems have dramatically evolved to provide more adaptive ways of learning, in terms of learning objectives, courses, individual learning processes, and so on. This paper reports on differences in learning experience from the learner's perspectives when using an adaptive e-learni...
Conference Paper
This study investigated students' experiences in two types of instructional strategies (i.e., fully-guided and partially guided) and their learning experience patterns from the beginning towards the end of the computer-based interactions. An empirical study was performed on 41 students from a public university in Malaysia using two types of compute...
Conference Paper
This paper addresses the issue of content sequencing in computer-based learning (CBL). In doing so, it proposes a Skill-Challenge Balancing (SCB) approach as a way to enhance the CBL experience. The approach is based on the Flow Theory, allowing self-adjustment of the given levels of challenges in a given learning tasks so that the learner will con...
Conference Paper
This article reports on a study concerning an optimal learning experience by curriculum sequencing systems (CSS) that is being frequently used in adaptive e-learning systems design. In doing so, we first implemented a CSS application - `IT-Tutor' to teach tertiary students vis-à-vis `Computer Network' - using `dynamic sequencing approach (DSA)'. Ne...
Conference Paper
Computer applications in education are now common to complement a classroom teaching and learning activity. However, a reportedly obscure area in the computer-based instruction is how it can systematically implement the different learning path for the diverse levels of students. In this respect, the dynamic (or adaptive) curriculum sequencing is qu...
Conference Paper
As an early view in my doctoral study, this paper submits a framework for evaluating intelligent tutoring systems (ITSs), embracing well-known pedagogical theories -- Cognitive Theory of Multimedia Learning and Modality Principles. What I have interested in is that these theories have been successfully applied in e-learning systems design and evalu...
Conference Paper
Intelligent tutoring systems (ITSs) have been proven effective in supporting students' learning activities, but the actual utilization of ITSs has not been confirmed. Delegation of development tasks from developers to teachers through the use of ITS authoring tools (ITSATs) is not promoting rapid progress in this area of research. Designing ITSs us...
Article
Full-text available
Purpose – The purpose of this paper is to present the utilization of a web-based support system for flood response operation in Malaysia. The system is intentionally designed to improve process and data management towards providing prompt and effective response to victims. Design/methodology/approach – The implementation of the research adopted the...
Conference Paper
Full-text available
Patterns could be discovered from historical data and can be used to recommend decisions suitable for a typical situation in the past. In this study, the sliding window technique was used to discover flood patterns that relate hydrological data consisting of river water levels and rainfall measurements. Unique flood occurrence patterns were obtaine...
Article
Full-text available
Failed management in emergency response effort due to inefficient and ineffective operation influences the adoption of information and communication technology specifically the Internet technology and World Wide Web. Timeliness, rapid response and efficient information dissemination are crucial in emergency management. This paper proposes a softwar...
Article
The paper proposes an approach to transform an information based portal into a knowledge-based hub. The study is made on the Agribazaar, which is an information-based portal provided by the Department of Agriculture, Ministry of Agriculture and Agri-based Industry, Malaysia. Basically, the portal has been developed to offer an internet-based commer...
Conference Paper
Full-text available
In most countries in the world, flood had caused damages to properties and it involved a large amount of loss to individuals and governments. During the flood, it is important to have efficient flood response operation system to manage all activities among different related agencies. In Malaysia, flood response operations are divided according to t...

Network

Cited By