
Ruzaini Abdullah Arshah- Doctor of Philosophy
- Lecturer at Universiti Malaysia Pahang Al-Sultan Abdullah
Ruzaini Abdullah Arshah
- Doctor of Philosophy
- Lecturer at Universiti Malaysia Pahang Al-Sultan Abdullah
About
93
Publications
74,260
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
1,544
Citations
Introduction
Ruzaini Abdullah Arshah currently works at the Faculty of Computing, Universiti Malaysia Pahang. Ruzaini does research in Information Systems (Business Informatics), Software Engineering and Databases.
Current institution
Additional affiliations
September 2020 - November 2020
Publications
Publications (93)
The process of retaining leadership succession at higher education institutions (HEI) is crucial since it has entailed the process of selecting the ideal candidate. The goal is to guide universities toward maintaining organizations' excellence in their academic leadership and management (ALM) positions. Due to the lack of established standards for...
This paper examines the factors determining a positive Information Security Culture (ISC) concept and the influence of ISC towards ISP compliance intention (INT) between IT and non-IT professionals in Malaysian public universities. Partial least square structural equation modelling, using PLS MGA, is used to assess the measurement and structural mo...
Cloud computing has been around for quite long, yet some organizations have never used it, especially MSMEs in Indonesia. Several factors hinder its implementation by MSMEs, including unequal infrastructure for using the internet in Indonesia. This paper assesses the literature on cloud computing, SaaS, e-Commerce, and e-wallet to determine the ini...
A far-reaching expansion of advanced information technology enables ease and seamless communications over online social networks, which have been a de facto premium correspondents in the current cyber world. The ever-growing social network data has gained attention in recent years and can be handy for industrial revolution 4.0. With the integration...
IT support services are the crucial part in daily business operation services in any organization. Special attention is needed, especially in managing users or client satisfaction when using the IT services to address the user’s problem or request IT hardware issues. Service quality (SQ) dimension is used to measure the effectiveness in delivering...
During the Talent Development Intervention programme, there is a need to provide an effective model to assess awareness, skills and experience among potential academics. To qualify as an Academic Leader or Academic Manager, there are certain characteristics and t raits necessary. However, there is a lack of research on the training of talented acad...
Flood is the major natural hazard in Malaysia in terms of populations affected, area extent, frequency, social–economic damage, and flood duration. This shows the importance of providing comprehensive and effective flood mitigation management, which requires government agencies to enhance their employment performance that involves technological inn...
For several years, great effort has been devoted to the study of e-commerce adoption. However, studies on the effect of information culture as internal organisational factors on e-commerce adoption are still lacking. Therefore, the aim of this study is to propose a model to examine the information culture factors affecting e-commerce adoption. To a...
Flash flood is a natural disaster that often occurs after heavy rain, and it is getting more common nowadays. The flood early warning and response system (FEWRS) can be installed to minimize the level of damage and the number of casualties due to flood by providing accurate and reliable flood data. Unfortunately, the existing number of studies deta...
Cloud-Based E-learning is indeed the new paradigm shift in the information and communication technology. As much as the field is still in its infancy stage, various educational institutions have adopted the cloud-based E-learning around the world at all the levels of education. Cloud-based E-learning has shown significant progress and success among...
The traditional banking system, such as transactions over the counter using bank book is enhanced by adding the elements of electronic banking, where nowadays all transactions can be done over the network, because of globalization and the advancement of information and communication technology. However, significant threats to this technology also c...
Prevalent research highlights that a positive Information Security Culture (ISC) could improve security behaviour, in particular, the employee's intention to comply with Information Security Policy (INT) in an organization. Although there are substantial empirical studies that suggest INT is influenced by Attitude (ATT), Normative Belief (NB) and S...
The technology enhancement learning (TEL) needs continuous use and high perception from learners with collaborative of technologies and multi-media applications. The problem of continuous intention in e-learning applications relies on the type of technology used that changes from one university to another. This study aims to design a framework deve...
IT Policy IT Services Service Level Agreement (SLA) Service Level Agreement (SLA) is a contract between a service provider and different levels of users in the organization. SLA lays out the metrics by which a service is measured, as well as penalties should the expected service levels are not met. SLA reduces the amount of job schedule based on IT...
For several years, great effort has been devoted to the study of e-commerce adoption. However, studies on the effect of information culture as internal organisational factors on e-commerce adoption are still lacking. Therefore, the aim of this study is to propose a model to examine the information culture factors affecting e-commerce adoption. To a...
This study analyses comprehensive of the existing theories that validate the accuracy of technology acceptance models (TAM). Also, examining the adopted TAM factors in conjunction with massive open online course (MOOC) features for continuous intention to use. The main problem phased TAM is the adoption of the right factors used for modelling desig...
Information and communication technologies (ICT) have been implemented mainly in government organizations, where e-government has become prevalent. The previous research focuses mostly on e-government adoption from the perspective of citizens. However, there is a scarcity of research conducted from the viewpoint of the employee. This study tried to...
This paper will discuss the impact of E-Learning prospect on the improvement of learner academic performance of Oman universities. The study explains the needs to expand working on E-Learning models and continue use of face to face traditional educational process. The real problem faced education is a need for several applications and technologies...
Despite strong recommendations by scholars to establish Information Security Culture (ISC), the lack of ISC guidelines persists, particularly in aspects that could effectively improve employees’ security behavior in an organization. This study proposes an ISC model based on seven new formulated dimensions to examine its influence on employees’ Info...
Abstract: For several years, great effort has been devoted to the study of e-commerce adoption. However, studies on the effect of information culture as internal organisational factors on e-commerce adoption are still lacking. Therefore, the aim of this study is to propose a model to examine the information culture factors affecting e-commerce adop...
The establishment of Information Security Culture (ISC) has been recommended for improving employees’ information security in the organization. To date, there is still no clear guidance or model for assessing and cultivating ISC for Malaysian organizations, despite some Malaysian-based studies being carried out. In order to shed light to this issue...
Recent years have seen continuous exposure of online social network (OSN) users to the security vulnerability due to socio-technical cyber hazards committed by OSN associates. Unfortunately, the current OSN platforms has lack of functionalities for automatic users protection in initiating online friendship and online users interaction within their...
Over the decade Cloud-Based Business Services (CBBS) has emerged as a technological trend utilized in businesses towards improving the deployment of Information Communication Technology (ICT) services for competitive advantage. But, findings from prior studies suggest that there are issues related to service inconsistency which affects the effect o...
In the business world, cloud computing (CC) technologies are emerging computing platforms used to improve the deployment of ICT services with the aim of improving performance and competitive advantage. However, enough attention has not been given to the factors that influence the continuous use behavior of organizations towards CC services. Hence,...
this article about creating an adapted framework to evaluate student satisfaction on using UCOM model as e-learning model.
The cultivation of positive Information Security Culture (ISC) is an effective way to promote security behavior and practices among employees in the organization. However, there is yet a consensus on a standard set of dimensions for the ISC concept. ISC has been associated with many facets, with some overlapping dimensions found in the literature....
Requirement engineering course is perceived as an important course that become one of compulsory courses to be thought to Software Engineering graduates. However, Requirement Engineering Education (REE) is suffering from difficulty in content delivery (lecturer) and learning (student) due to the nature of Requirement Engineering theoretical and div...
There are many vital roles and attributes played by the internal organizational environment in IT adoption. Technological innovations are adopted as a result of the reaction of many organizations to change and for influencing the business environment. For this study, a conceptual model was developed to focus on the effect of information culture as...
Educational institutions are adopting Online Social Networks (OSNs) to support learning activities in university campuses. However, implementing a new technology requires identifying and assessing the factors that innuence users' acceptance of a new technology. Accordingly, this method enables the critical prediction of the success or failure of a...
Many Higher Education Institutions are shifting to Cloud-Based E-Iearning (CBEL) due to its benefits. These benefits include reduced costs of accessing IT services, pooling of resources, scalability, and mobility as well as consumer satisfaction among others. However, some institutions especially in developing countries in general and Gulf Cooperat...
This empirical study investigates whether the universities’ communication model and the technology acceptance model (TAM), which includes four factors, namely, academic performance, student satisfaction, effectiveness and support assessment, simultaneously enhance student satisfaction and improve the teaching method and academic performance level....
Recent flood event in Malaysia especially at the East Coast region of Peninsular Malaysia shows the importance of providing a comprehensive and effective disaster mitigation management which encompasses the involvement of government agencies, private organization and NGOs. The early warning and response model is an important element in the mitigati...
This paper discusses a pilot study on conceptualization and validation of Information Security Culture (ISC) as a multidimensional second-order formative construct. The concept was developed in our previous works, and is based on widely accepted concepts of Organizational Culture and ISC. The model is validated using samples from employees of one M...
The present study aimed to investigate the impact of security and privacy perceptions on bank customers' trust to accept and adopt online banking services. Specifically, the investigation in the study focused on the factors affecting customers' trust to accept and use online banking services. In order to achieve this, a survey was administered to a...
Background/Objectives: The purpose of this paper is to examine the role of trust in internet banking services based on empirical evidence from the survey conducted with commercial banks’ consumers in Irbid, the second largest city in Jordan. The paper answers the main research question: ‘Do the Ease of Use and Perceived Usefulness affect consumers’...
For a decade since year of 2000 until 2010, Theory of Planned Behavior [TPB] and its main construct of Attitude, Normative belief and Self-efficacy have been considered as a significant theory and factors in the area ISP compliance behaviour study. However, there are still some questions exist particularly on to what extent this theory is significa...
For a decade since year of 2000 until 2010, Theory of Planned Behavior [TPB] and its main construct of Attitude, Normative belief and Self-efficacy have been considered as a significant theory and factors in the area ISP compliance behaviour study. However, there are still some questions exist particularly on to what extent this theory is significa...
The purpose of this paper is to understand the importance, relevance and the need of implementing Cloud-Based E-Learning (CBEL) in Higher education institutions (HEIs) in Oman. The paper maintains its emphasis on addressing the effectiveness of the cloud based e-learning system and also takes into account the activities of comparing and contrasting...
Technology enhancement learning is a process that leads to deep point of learning and adds knowledge of technologies. Various studies shed light on technology development and its effect in educational sector. The aim of this integrative review is to examine the current evidence of the impact of technology learning on student learning and academic p...
Academic accreditation standards are defined clearly in Higher Educational Institutions (HEI) plans, management, and delivering results of assessment student with learning outcomes. In recent years, all universities and institutions work hard to increase their approval privileges, skills, achievements through getting the accreditation from HEI. The...
Informal specifications are commonly adopted for requirements engineering (RE), especially for customer-oriented system development projects, but their validity with respect to the user's requirements is usually difficult to perform. The common reason for the difficulty is that the specifications are often misinterpreted by the stakeholders due to...
This paper reviews Information Security Culture (ISC) studies published in six leading databases from year 2000 until 2016 to investigate empirical findings that could support the relationship between ISC and employee’s security behavior as well as to identify the findings that could be applied as guidelines to cultivate ISC in the organization. Th...
The establishment and cultivation of Information Security Culture (ISC) in an organization can promote desired employees’ behavior in adhering to Information Security Policy (ISP). Some factors of ISC have been investigated in ISP compliance studies, however there is no clear indication numbers of ISC dimensions available and how significant these...
This research aims at validating the vital factors that affecting the continuous use of cloud computing services through literature review and experts' evaluation. These factors are factors that have an effect on the decision makers to forge ahead in the use of cloud computing services in their various organizations. Semi-structured interviews usin...
Cloud computing refers to adopting advanced virtualized resources for high scalability that can be shared with end users. Utilization of this technology is expediting in the world to intensify the potential of cloud computing based on E-learning in higher education institutions. Due to various apparent reasons, some higher education institutions ar...
Existing classification techniques, which are previously proposed for eliminating data inconsistency, could not achieve an efficient parameter reduction in soft set theory as it affects the obtained decisions. Additionally, data decomposition based on previous algorithms could not achieve better parameter reduction with available domain space. Mean...
The primary purpose of carrying out this research work is to identify the crucial factors that influence the continuous use of cloud computing services in organizations. To achieve this identified objective, this research work carried out a comprehensive literature review on cloud computing services' adoption at the organizational level, particular...
Trust is essential for all online transactions adoption and usage including online banking. In this paper, online banking trust was addressed through empirical evidence from the survey conducted in Jordanian commercial banks. An extended Technology Acceptance Model (TAM) framework used in this study. Partial Least Squares (PLS) to analyze the data,...
Trust is essential for all online transactions adoption and usage including online banking. In this paper, online banking trust was addressed through empirical evidence from the survey conducted in Jordanian commercial banks. An extended Technology Acceptance Model (TAM) framework used in this study. Partial Least Squares (PLS) used to analyze the...
The target of the study is to apply the success of engineering psychology to the area of Formal Engineering Methods, concentrating on validating the requirement specification at system analysis phase of a system development process. This paper presents a systematic approach to integrating specification animation into the process of writing requirem...
For a decade since the year of 2000 until 2010, Theory of Planned Behavior (TPB) and its main construct of Attitude, Normative belief and Self-efficacy have been considered as a significant theory and factors in the area ISP compliance behaviour study. However, there are still some questions exist particularly on to what extent this theory is signi...
The adherence of employees towards Information Security Policy (ISP) established in the organization is crucial in reducing information security risks. Some scholars have suggested that employees' compliance to ISP could be influenced by Information Security Culture (ISC) cultivated in the organization. Several studies on the impact of ISC towards...
The need for an instrument to comprehensively assess Integrated Information System (IIS) is crucial in order to provide complete status on IIS effectiveness to the organisation. The instrument is considered comprehensive when it includes all the three main domains of Information System integration namely organisational, technical and strategic doma...
The cultivation of Information Security Culture (ISC) in organization would assists information security management in terms of improving employees' security behavior in dealing with information assets. Many studies have been done to explore and investigate this ISC in various aspects including the concepts, factors, challenges and particular appli...
The Social Research Network Sites (SRNS), online platform used by researchers, have huge amounts of information that would sometimes overwhelm the researchers. However, they need a dashboard as a tool to provide awareness on current information that are related to their fields of research; thus, the proposed dashboard model for the researchers in t...
Social networking sites, a web-based application have permeated the boundary between personal lives and student lives. Nowadays, students in higher learning used social networking site such as Facebook to facilitate their learning through the academic collaboration which it further enhances students' social capital. Social networking site has many...
This study attempts to answer the main research question: ‘Do security and privacy perceptions affect customers’ trust to accept and use internet banking technology to perform their banking transactions?’ This study examined the factors that affected Jordanian customers’ trust to accept internet banking services. Path analysis was used to analyze 1...
This study attempts to answer the main research question: ‘Do security and privacy perceptions affect customers' trust to accept and use Internet banking technology to perform their banking transactions?’ This study examined the factors that affected Jordanian customers’ trust to accept Internet banking services. Path analysis was used to analyze 1...
Publisher : Journal of Theoretical and Applied Information Technology
Feed-forward, Back Propagation (BP) Network is a network structure capable of modeling the class prediction as a nonlinear combination of the inputs. The network has proven its suitability in solving several complex tasks, most especially when trained with appropriate algorithms. This study presents an enhancement of this network with a view to boo...
Several undergraduate students most especially the new students do have an unacceptable Grade Point Average (GPA) at the end of their first year. Research has shown that during this period, stress by this set of students sometime responsible for their poor performance as they are faced with many challenges. Having knowledge about their previous aca...
Learning models used for prediction purposes are mostly developed without paying much cognizance to the size of datasets that can produce models of high accuracy and better generalization. Although, the general believe is that, large dataset is needed to construct a predictive learning model. To describe a data set as large in size, perhaps, is cir...
There are various social media that are currently available for users and their main objective is to let users keep in touch with friends worldwide or meet new people. This paper tries to provide an insight on classification of existing social media and social networking sites main features. Then, we highlight that all social media and social netwo...
The basic idea to build significant attribute the uncertain objects should remove. Several theories are dealing with uncertainty, soft set theory also handles this uncertainty problem which still an open area to be explored in knowledge management. The propose techniques Known as Filtering data set which used for maintained the inferior object and...
Several students usually fall victims of low grade point at the end of their first year in the institution of higher learning and some were even withdrawn due to their unacceptable grade point average (GPA); this could be prevented if necessary measures were taken at the appropriate time. In this paper, a model using fuzzy logic approach to predict...
The assessment of Integrated Information Systems (IIS) is seen as an important exercise in organisation to enable the IS managers, as well as top management, to understand their return on investment in IS integration. Study has found out that very few organisations have proper assessment tool, and while other organisations have never done proper as...
There is a need to address issues related to IS integration since integration are essential to organizations to move forward and supporting their business functions. However, there is no tool available to assess the complexity of IS integration, before thinking of measuring the success of integration initiative. If we can device a framework that de...
One of the challenges of Knowledge Management System in an organization is to integrate both the tacit and explicit knowledge in one integrated system. Though a lot of organizations have developed their own Information System to capture the explicit knowledge, but most of the information systems are not knowledge based. The same thing happen when c...