Rodziah Atan

Rodziah Atan
Universiti Putra Malaysia | UPM · Department of Software Engineering and Information Systems

PhD in Software Engineering

About

140
Publications
58,767
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
960
Citations

Publications

Publications (140)
Preprint
Corporate identity has played a vital role in the Halal industry to create a strong foundation for its reputation in the long run. This paper used two modeling analyses for two different data. The first analysis aims to predict the relationship between Corporate Identity Management between Internal Brand and Employee Brand Support (consequence) med...
Article
Full-text available
The global Halal industry is one of the world’s fastest-growing consumer segments, as evidenced by substantial research and published papers. This paper aims to identify and characterize the factors that influence organizational performance in companies within the Halal industry. It also offers an overview of the factors influencing companies’ orga...
Preprint
Full-text available
The global Halal industry is one of the world's fastest growing consumer segments, as evidenced by substantial research and published papers. This paper aims to identify and characterize the factors that influence organizational performance in companies within the Halal industry. It also offers an overview of the factors influencing companies' orga...
Article
Full-text available
Higher Education Institutions (HEIs) consider resource optimization as an essential concern. Cloud computing (CC) in the fourth industrial revolution became the de-facto standard for delivering IT resources and services. CC is now a mainstream technology, andHEIs across the globe are rapidly transitioning to this model; hence, maintaining the reten...
Article
The progression of scientific data from various laboratory instruments is increasing these days. As different laboratory instruments hold different structures and formats of data, it became a concern in the management and analysis of data because of the heterogeneity of data structure and format. This paper offered a metadata structure to standardi...
Article
Full-text available
Resource optimization is a key concern for Higher Education Institutions (HEIs). Cloud Computing, as the recent generation in computing technology of the fourth industrial revolution, has emerged as the main standard of service and resource delivery. As cloud computing has grown into a mature technology and is being rapidly adopted in many HEIs acr...
Conference Paper
The progression of scientific data from various laboratory instruments is increasing these days. As different laboratory instruments hold different structures and formats of data, it became a concern in the management and analysis of data because of the heterogeneity of data structure and format. This paper offered a metadata structure to standardi...
Article
Full-text available
Cloud computing (CC) delivers services for organizations, particularly for higher education institutions (HEIs) anywhere and anytime, based on scalability and pay-per-use approach. Examining the factors influencing the decision-makers’ intention towards adopting CC plays an essential role in HEIs. Therefore, this study aimed to understand and predi...
Chapter
Full-text available
Cloud computing (CC) is a new computing paradigm in higher educational institutions (HEIs). CC allows educational services to be delivered at anytime anywhere settings. Despite all its advantages, the adoption of CC in general and cloud-based education as a service (CEaaS) in specific is still not yet clearly understood in HEIs. Besides, there is a...
Article
Full-text available
Healthcare systems are transformed digitally with the help of medical technology, information systems, electronic medical records, wearable and smart devices, and handheld devices. The advancement in the medical big data, along with the availability of new computational models in the field of healthcare, has enabled the caretakers and researchers t...
Article
Full-text available
Safeguarding the high quality of halal food products is a new realm to explore with the advent of new technologies. The efficiency of food industry management has boosted the applicability of product traceability system with the aid of the internet of things (IoT). Traceability system with the use of IoT has facilitated food industry players in man...
Conference Paper
Despite the vast investigations that had assessed the capabilities of big data analytics (BDA), studies regarding the influential factors of BDA implementation (BDAI) are in scarcity, particularly within the organisational context. The paucity of studies on BDAI evaluation has partly motivated this study. As such, this study performed content valid...
Conference Paper
Service Level Agreement (SLA) is an important contract between service provider and service recipient where services are expected to be delivered and received accordingly. SLA should include all information regarding the services provided along with their expected performance measures. Usually, the common parameter to define the quality of service...
Conference Paper
Service Level Agreement (SLA) is an important contract between service provider and service recipient where services are expected to be delivered and received accordingly. SLA should include all information regarding the services provided along with their expected performance measures. Usually, the common parameter to define the quality of service...
Article
Full-text available
Safety critical systems use software to meet their functionalities. Failures in these software lead to a very high impact on the environment in which the safety critical systems are used. Several criteria are considered in safety critical systems, which are: reliability, availability, maintainability and safety. In this paper, we focus on measuring...
Article
Full-text available
In today's higher education institutions (HEIs), intelligentization and digitization of education process are greatly required. Production industries are presently making changes from large-scale production to specialized or customized production. The term Industry 4.0 (IR 4.0) represents the fourth industrial revolution; the present movement or in...
Article
A set of questionnaire was designed to study the current state of requirement reuse practices in Malaysia. This paper describes the design of the survey on requirement reuse practice instrument, and the assessment of its reliability and validity. Cronbach’s Alpha test was used to check on its reliability and respondents’ feedback, to assess the lev...
Article
End users and consumers of halal industry are facing difficulties in finding verified halal information. This occurred due to information that is stored in silos at every point of activity for every process chain, employing different structures and models, creating an issue of information verification. Integration of multiple information systems ge...
Article
The growth of data from scientific experiments is increasing nowadays. These data came from different experiments done through various laboratory instruments or machines. It became an issue to manage and analyse scientific experimental data because of the heterogeneous nature of data structure and format. This paper proposed a knowledge metadata re...
Article
Full-text available
Cloud computing (CC) is a recently developed computing paradigm that can be utilized to deliver everything-as-a-service to various businesses. In higher education institutions (HEIs), CC is rapidly being deployed and becoming an integral part of institution experience. CC adoption in HEIs is accompanied by numerous scientific contributions that add...
Conference Paper
Full-text available
In the food industry particularly, the supply chain involves multilevel players from suppliers to end consumers. In uplifting food supply chain safety value, the halal concept has been introduced to food industry instead of other existing safety certificates such as Good Agricultural Practice (GAP), Hazard Analysis and Critical Control Points (HACC...
Article
Full-text available
Each characteristic of Big Data (volume, velocity, variety, and value) illustrate a unique challenge to Big Data Analytics. The performance of Big Data from velocity characteristic, in particular, appear challenging of time complexity for reduced processing in dissimilar frameworks ranging from batch-oriented, MapReduce-based to real-time and strea...
Chapter
Data integration for scientific experiments and research is important to researchers in many research areas like biotechnology, medical, and biomedical research. This is because many experiments and research data are stored in different sources as well as involving multidisciplinary fields which make it difficult to manage and analyze the experimen...
Article
Full-text available
Cloud computing is a growing field, providing the need for enterprises and individuals to access cloud computing resources to meet their organizational computing requirements. The features of scalability, low cost and unlimited resources of cloud computing encourage many organizations and individuals to transfer their data including personal, finan...
Article
Full-text available
Cloud computing represents the most important shift in computing and information technology (IT). However, security and privacy remain the main obstacles to its widespread adoption. In this research we will review the security and privacy challenges that affect critical data in cloud computing and identify solutions that are used to address these c...
Article
Full-text available
A raw dataset prepared by researchers comes with a lot of information. Whether the information is usefull or not, completely depends on the requirement and purposes. In machine learning, data pre-processing is the very initial stage. It is a must to make sure the dataset is totally suitable for the requirement. In significant directed random walk (...
Article
Full-text available
The significance of big data advancement has benefited various organizations to leverage the potential insights and capabilities of big data in organizational performance and decision-making. However, the analytics outcome and quality of big data analytics (BDA) implementation has yet to be addressed. Therefore the aims of this paper are to identif...
Conference Paper
The relationship between the weight of a single genes and the connection between the genes had been studied. Chemistry and physical sciences have proved the attraction between molecules. Molecules are attracted to each other by bond. This paper is presented to disclose the relationship between weight and connectivity of nodes with biased random wal...
Article
Full-text available
E-learning does not function properly if the system is not in accordance with user needs. This study aims to establish an evaluation model for e-learning user interface according to user acceptance. The model is designed based on three categories: user learning style, usability and user benefits. Results of measurements of the three categories will...
Article
Full-text available
Software birthmark is an important property of software that is successfully used to detect piracy and theft of software. Estimation of a birthmark provides critical information about the extent of piracy performed in a software. This information can then be used to decide over many important issues related with software theft and piracy, including...
Conference Paper
Data-driven decision-making can offer improved insights for information value and create new business opportunity. The purpose of this paper is to present the findings of expert opinion in verifying the influencing factors in big data analytics (BDA) implementation that are beneficial in developing the BDA implementation assessment model. The study...
Article
Full-text available
This paper explains the interrelationship of organization, people and technology dimensions were considered in formulating the big data analytics (BDA) environment assessment model. The theoretical lenses used in the model development are included Resource-based View (RBV) and Information Systems Success Model (ISSM).
Article
Full-text available
This paper attempts to provides a distinctive contribution for the body of knowledge in studying the theoriticalmodels and factors affecting cloud computing (CC) adoption in higher education institutions (HEIs) at organizational level incorporating four dominant models; Technology-organization-environment (TOE) theory, The Fit-Viability Model (FVM)...
Article
Full-text available
The purpose of this research is defining the main factors influencing on decision of management system on sensitive data in cloud. The framework is proposed to enhance management information systems decision on sensitive information in cloud environment. The structured interview with several security experts working on cloud computing security to i...
Article
Full-text available
Telemarketing is a type of direct marketing where a salesperson contacts the customers to sell products or services over the phone. The database of prospective customers comes from direct marketing database. It is important for the company to predict the set of customers with highest probability to accept the sales or offer based on their personal...
Article
Full-text available
This paper is presented to expose the different perspective of random walk. Random walk is applied in many different fields for prediction purposes and hence, it was further developed to improve the accuracy of prediction.
Conference Paper
Big data analytics (BDA) readiness factors have been widely researched; nevertheless, few have investigated the impact and success factors of BDA implementation in the organizational context. The relevance and quality of BDA outcomes have been a significant concern to the organizational leaders in supporting them for strategic decision-making. To t...
Article
Full-text available
Due to limitations of current e-commerce websites and today's highly competitive e-commerce environment, businesses using Virtual Reality technologies to improve customers' interactivity, by providing shopping experiences with their products and services similar to the real-life shopping, are better recognized. In this paper, the key aspects of 3D...
Article
Service Level Agreement (SLA) enforcement’s impact measure is a potential research area to be explored. Assumptions that this study is making are, SLA management will become better by a firm enforcement, which monitors and encourage every customer to be responsible to launch report of bugs or mischief of services such as unsatisfactory service qual...
Article
Full-text available
Most of the business model depends on big data adoption and development as a major strategy to gain valuable insights and business value for competitive advantages. The trend and rapid growth of data required top management to assess the impact of big data development outcomes towards business value. An appropriate strategic assessment model should...
Preprint
Full-text available
Cloud computing is a modern technology that gives access to the network upon request to required computing resources such as to network, servers, storage, applications and services. Agricultural data is massive data that belongs to certain country which has to be protected as national property. The cloud computing services normally relied on data t...
Article
Data integration in scientific experiments is important to the scientists in many research domains. This is because many experimental data involved multidiscipline areas and run in different machines or instruments which results in data stored in different ends and human intervention is required in forming a chain of data analysis. Ontology is one...
Conference Paper
Cloud computing is a modern technology and it gives access to the network upon request to required computing resources (network, servers, storage, applications and services). This exciting computing model depends on data traffic and controlled by a third party. Despite the expected savings in infrastructure and the development cost for business fle...
Conference Paper
Full-text available
An interface is very effective to encourage the users intention and engage them to achieve their destination in e-learning process. This research aims to explore the user needs through learner experience on using e-learning interface. The case study is needed to identify and to collect the learner problem in e-learning, especially in User Interface...
Conference Paper
Various SLA monitoring systems are proposed by different features and abilities to evaluate the agreed SLA. The current SLA monitoring systems in cloud computing for its structural, behavioral characteristics and situation are also in place. The systematic reviews of a well-known methods and approaches shows a significant numbers of researches been...
Conference Paper
Content Security Policy (CSP) is powerful client-side security layer that helps in mitigating and detecting wide ranges of web attacks including cross-site scripting (XSS). However, utilizing CSP by site administrators is a fallible process and may require significant changes in web application code. In this paper, we propose an approach to help si...
Article
Full-text available
E-learning is not going to work if the system is not used in accordance with user needs. User Interface is very important to encourage using the application. Many theories had discuss about user interface usability evaluation and technology acceptance separately, actually why we do not make it correlation between interface usability evaluation and...
Article
Full-text available
Since the last decade, semantic conflicts have been considered as a critical problem in establishing seamless message exchange between Web services. To provide the essential step for solving this problem, semantic conflicts have to be defined and classified properly. Most of the existing classifications that attempt to classify semantic conflicts l...
Article
System design is an important process in the development of any type of computer related system and a process of gathering user requirement of the system that will be developed. System design is important in software development because it assists the developer to develop a system according to what are required by the user. One of main components i...
Article
Recently, Semantic Annotations for WSDL (SAWSDL) standard emerged as a W3C recommendation to add semantics to WSDL components. SAWSDL annotates WSDL components with different semantics in order to automate Web service tasks, such as service discovery, composition, mediation, and invocation. In fact, certain service task requires a specific service...
Article
Full-text available
Semantic conflicts detection is considered to be one of the essential steps that should be carried out effectively, in order to pave the way towards establishing semantic interoperability between heterogeneous Web services. To achieve that, ontology plays the backbone of the detection process, which required to be implemented in a high quality mann...
Article
Full-text available
The service level agreement (SLA) is a mutual contract between the service provider and consumer which determines the agreed service level objective (SLO). The common SLA is a plain documental agreement without any relation to other dependent SLAs during the different layers of cloud computing. Hence, the cloud computing environment needs the hiera...
Article
There exist many similar services by different service providers available within the cloud environment. When the service offerings are packaged with similar functionalities, service consumers will be having a difficult time in evaluating the most relevant services that fit to their individual requirement. To address this issue, this paper proposes...
Conference Paper
Establishing semantic interoperability between the heterogeneous messages of Web services has been a critical issue since the emergence of Web service. So far, many approaches that are aimed at solving semantic conflicts to achieve semantic interoperability of heterogeneous messages of Web service have been proposed. However, despite the significan...
Article
Software maintenance (SM) environment is a highly complex area, knowledge-driven and collaborative. Therefore, Capability Maturity Model Integration (CMMI) is a process improvement approach that provides organizations with the essential elements of effective processes that ultimately improve their performance. We propose a new framework of CMMI bas...
Article
Requirement traceability matrix is a table that captures the complete user and system requirement for the system. It helps to trace from requirement till testing in order to verify that the requirement is fulfilled. In SCRUM development methodology, requirement traceability matrix is used to capture the linkage of user stories between product backl...
Article
Model transformation (MT) has become an important concern in Software Engineering [1], because it is related to system design. Model transformation can be used in many different application scenarios, for instance, to provide interoperability between models of different size and complexity [2]. Traditionally, model transformations are done for purp...
Article
Breakthroughs in technology are making the internet an ever-growing phenomenon, and we have witnessed an enormous growth of blogs in the blogosphere. However, the blogosphere has been crippled by disorganised and uncontrolled growth, and many blogs are of poor quality. Development domains, such as software engineering, website engineering, and info...
Article
Full-text available
Debugging on computer program is a complex cognitive activity. Although it is complex, it's still one of the popular issues in computer programming task. It is a difficult task, which is to understand what the error is and how to solve such error? In computer programming the difficulty is to understand the Object-Oriented programming concept togeth...
Article
In this paper will explain a model that being used to develop an Object Oriented Debugger (OOD). Unified Modeling Language (UML) is the best choice model and suitable to design the Object Oriented Debugger which will be developed in an object oriented programming environment. The model will provide an ability to capture the characteristics of a sys...