Rahayu Ahmad

Rahayu Ahmad
Verified
Rahayu verified their affiliation via an institutional email.
Verified
Rahayu verified their affiliation via an institutional email.
  • PhD Information Systems , University of Maryland Baltimore County
  • Professor (Associate) at Northern University of Malaysia

research funded by Higher Education Ministry on Cashless Adoption research funded by government agency MCMC

About

51
Publications
23,107
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
234
Citations
Current institution
Northern University of Malaysia
Current position
  • Professor (Associate)

Publications

Publications (51)
Conference Paper
Blogs have democratized participation for everyone who wants to publish on the Internet. This trend, however, is problematic for readers trying to determine trustworthy and believeable sources. This blog diary study, allowed us to understand what aspects influenced believability and ultimately utililty through capturing routine blog-surfing behavio...
Article
Crowdsourcing is one of the initiatives implemented by the Malaysian government to improve the quality of life for people with low household income. Since Malaysia is just starting to roll out this crowdsourcing initiative, examining the intricate relationships of motivational factors is an important beginning step towards sustaining the usage of t...
Conference Paper
Full-text available
Online discussion has become one of the important strategies for the teacher to teach the students to think critically when conveying their ideas and become more proactive and creative. In this paper, padlet online discussion communication was conducted to examine its effectiveness in enhancing critical thinking. In this study, there are two types...
Conference Paper
Full-text available
Although there is a significant growth of emerging online programming communities, little succeeded in encouraging members to contribute and share their knowledge. The role of leadership to address the under contribution problem is gaining attention among researchers. This study grounded on path-goal theory to Investigates specifically the role of...
Article
Full-text available
This paper presents formal recipient model of support seeking behavior. Support seeking is significantly dynamic and it includes substantial changes as demanding condition happen. From this perspective, the proposed model covers integrating of both coping strategies, support preferences and network ties. The recipient model can be used to recognize...
Chapter
Full-text available
Social media services have become a prevalent communication tool due to their capability to instantly share information with a large number of people for free. However, social media also facilitate cyberbullying, and studies have shown that cyberbullying on social media has a severe impact compared to other platforms. In some cases, cyberbullying p...
Chapter
Portal GREaT is a one-stop center developed by the Ministry of Edu-cation Malaysia (MoHE) to provide Malaysian graduates with information on career opportunities, advancement, upscaling, and rescaling programs. It consists of various modules designed to cater to the specific needs of different users, including graduates, industries, and MoHE. Howev...
Article
Full-text available
The Recommender System (RS) has become an important area of research in recent years, not only because it allows people to find related products and services but because it has also expanded the research area on recommending human relationships, known as the Social Recommender System (SRS). Successful application of recommended system algorithms re...
Article
Full-text available
Cybercrimes are increasing at an alarming rate and cause detrimental effects to the victims. Routine Activity Theory (RAT) is commonly used to understand the factors influencing cybercrime victimization. However, there have been inconsistent findings on the applicability of RAT theory. This study performs a Systematic Literature Review analysis to...
Article
Full-text available
Online communities are rapidly growing as an outlet for social support and community building. However, very few succeeded in inspiring members to share their knowledge. The problem of under contribution in online settings has triggered researchers to investigate the role of personal attributes in promoting knowledge sharing. Using social cognitive...
Article
Purpose Despite internet banking’s popularity, there is a rise in phishing attacks related to online banking transactions. Phishing attacks involved the process of sending out electronic mails impersonating the valid banking institutions to their customers and demanding confidential data such as credential and transaction authorisation code. The pu...
Article
Full-text available
The purpose of this study is to investigate the quality design criteria for developing a Massive Open Online Course (MOOC). Currently, there are limited studies that highlight the required design criteria for the MOOC programming courses. A descriptive analysis was conducted to examine the characteristics of the three important quality design crite...
Article
Full-text available
Social support is essential, especially in a working environment, because it can reduce psychological strain. The psychological strain associated with mental health in daily lives could have been gained from mismatched staffing and indirect control of the staffs. In order to meditate the problem, in this study, a hybrid serendipity social recommend...
Article
Public health, safety and welfare of community is one of the important sustainable development goals. Basic water supply, electricity and waste disposal must be in optimum condition in promoting quality of life. Citizens need to be afforded with simple and usable system for reporting problems related to the public facilities and services to their l...
Article
Full-text available
This paper presents formal recipient model of support seeking behavior. Support seeking is significantly dynamic and it includes substantial changes as demanding condition happen. From this perspective, the proposed model covers integrating of both coping strategies, support preferences and network ties. The recipient model can be used to recognize...
Conference Paper
Full-text available
As virtual teams are naturally distributed and diverse, they are susceptible to faultline, causing teams fracturing into subgroups. The current works examining perceived faultline have mostly concentrated on collocated teams. Examining these phenomena in virtual teams deserves more attention due to the greater possibility of members making an inacc...
Article
Full-text available
It is important to consider the user participation in the development of the e-government system for ensuring that this system is free of any conceptual issues and all user expectations can be satisfied during the system deployment. Development of an e-government system can be very hard due to the presence of different stakeholders and problems inc...
Article
Reflective learning has been recognized as one of the most important lifelong learning skills due to its influence on the learning skills of the students towards the attaining understanding of complex ideas. The rise of blog publishing has given new aspiration for reflection learning unlike the traditional journals which only serve the instructor....
Conference Paper
Full-text available
Online communities are rapidly growing as an outlet for social support and community building. However, very few succeeded in inspiring members to share their knowledge. The problem of under contribution in online settings has triggered researchers to investigate the role of virtual leadership in promoting knowledge sharing. Using path-goal theory,...
Conference Paper
Influence maximization has been an area of active research in recent years. This study aims to extend the fundamental influence maximization problem (IMP) with respect to a set of target users on a social network. It is important to aim the target users to speed up the rate of information diffusion and reduce the information diffusion cost. In doin...
Article
Full-text available
Although there is a significant growth of emerging online programming communities, little succeeded in encouraging members to contribute and share their knowledge. Addressing problems of low contribution trigger researchers to examine the role of leadership in virtual communities. This study grounded on path-goal theory, examines the role of partic...
Article
Full-text available
Abstract: Online discussion has become one of the important strategies for the teacher to teach the students to think critically in conveying their ideas and become more proactive and creative.Although there are two types of critical thinking skills: macro and micro critical thinkingbut in this paper,padlet online discussion communication (PODBC) w...
Article
Full-text available
This article is based on a study which examined the information dissemination process on the social media during the Malaysia 2014 floods by employing the Social Network Analysis. Specifically, the study analyzed the type of network structure formed and its density, the influential people involved, and the kind of information shared during the floo...
Article
Full-text available
Despite the early start that Iraq had in the e-government project and its launch in 2004, the pace of development is rather slow. This study aims to identify the main themes of the technical challenges hindering the development of e-government in Iraq. Systematic literature review was employed in this study to collect and analyse papers published o...
Article
Full-text available
This article is based on a study which examined the information dissemination process on the social media during the Malaysia 2014 floods by employing the Social Network Analysis. Specifically, the study analyzed the type of network structure formed and its density, the influential people involved, and the kind of information shared during the floo...
Article
Full-text available
Despite the significant increasing numbers of emerging virtual communities, very few succeeded in inspiring members to share their knowledge. Many researchers realize this problem and led to many studies on examining factors that affect knowledge sharing. However, there is a scarcity of studies and frameworks that examine virtual leadershipbehavior...
Article
Full-text available
Crowdsourcing introduces new perspectives in innovation, allowing for new products and services to shift away from the traditional manufacture-centric model to a more user-centric one. In order for businesses to reap the benefits of open innovation, it is necessary to understand the factors that motivate ideators to contribute valuable ideas. Equal...
Article
Full-text available
Crowdsourcing is an initiative implemented by the Malaysian government to support its National Key Result Area (NKRA) agenda to improve the lives of citizens with low household income in the B40 group. Crowdsourcing activities are done on mobile crowdsourcing platforms that enable workers to perform micro tasks at any time for a fixed payment. Howe...
Article
Crowdsourcing is an initiative implemented by the Malaysian government to support its National Key Result Area (NKRA) agenda to improve the lives of citizens with low household income in the B40 group. Crowdsourcing activities are done on mobile crowdsourcing platforms that enable workers to perform micro tasks at any time for a fixed payment. Howe...
Article
Cyberbullying is considered as one forms of bullying and is getting more attention from many researchers. A national report from CyberSAFE Malaysia shows that approximately 3,600 indicated that school children aged of 7 to 19 years old were being cyberbullied . To further examine this issue, this research develops a model grounded on Media Synchro...
Article
Full-text available
Despite the significant increasing numbers of emerging virtual communities, very few succeeded in inspiring members to share their knowledge. Many researchers realize this problem and led to many studies on examining factors that affect knowledge sharing. However, there is a scarcity of studies and frameworks that examine virtual leadershipbehavior...
Article
Full-text available
Business Intelligence (BI) is an innovative technology that facilitates analytics of big data. Deploying BI is a complex undertaking, expensive in nature, and time-consuming task as these software applications are high-risk/high-return projects. Improper implementation may lead to failure and in turn leave organizations into data rich and informati...
Article
Full-text available
Information dissemination during disaster is very crucial, but inherits several complexities associated with the dynamic characteristics of the disaster. Social media evangelists (activists) play an important role in disseminating critical updates at on-site locations. However, there is limited understanding on the network structure formed and it...
Article
The trends of using computer mediated communication (CMC) in online support group have become popular nowadays. However, limited empirical evidences demonstrating how CMC can facilitate comforting communication exists. Hence, this research will be among the first study to evaluate the proposed computer mediated comforting communication theory in on...
Conference Paper
Full-text available
Reading is one of the main activities that readers are immensely practicing during their daily lives and this activity is accompanied with some challenges that may cause disengagement during the process. Recently, assistive robotics technologies have shown extensive powerful effects in assisting its users to tackle various domain specific problems....
Conference Paper
Full-text available
Online social activists through social media play an important role in disseminating information during disaster. However the nature and scale of the typical activist's involvement with social media have remained unexplored topic. This study applies Social Network Analysis to identify the key information brokers, their roles and the type and flow o...
Article
Full-text available
Social commerce is gaining its popularity and becoming one of the important platforms for online commerce. Despite the growing advantages associated with s-commerce adoption, very few studies were conducted to examine the motives that drive consumers to adopt s-commerce platform. Thus, this study contributes by examining the influence of hedonic va...
Conference Paper
The Internet as a source of information became extremely important among information seekers in recent years. However, current Web technologies have created the opportunity for information producers to easily and anonymously publish information that can often be of questionable quality. Due to the absence of an editorial function (in most cases) us...
Conference Paper
The enthusiasm for adopting social media technologies should be tempered by a critical, empirical understanding of how they facilitate an effective learning envionrment. This study analyzed blog use in two graduate-level university courses, specifically identifying reflective learning markers in 279 blog entries. This analysis was deepened with fol...
Conference Paper
Reliance on the Internet as a source of information has increased dramatically in recent years among information seekers. The reliability of information on the Internet can sometimes be questionable due to the absence of an editorial function. Users need to carefully consider the quality of the information before using it. The goal of this research...
Conference Paper
As virtual teams are inherently heterogeneous and distributed in nature they have a greater tendency to fracture into subgroups. Proper management of these subgroups is critical as they are often more detrimental than beneficial. Research that systematically examines subgroup formation is limited in identifying factors that influence the negative o...
Article
Users judge the credibility of websites while browsing for information. The criteria that influence how they judge the credibility depend on many factors. In this study we found that computer expertise had a strong impact on what criteria users used in their credibility judgments. Participants evaluated websites they found while searching and descr...

Network

Cited By