Ruzaini Abdullah Arshah

Ruzaini Abdullah Arshah
  • Doctor of Philosophy
  • Lecturer at Universiti Malaysia Pahang Al-Sultan Abdullah

About

93
Publications
74,260
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
1,544
Citations
Introduction
Ruzaini Abdullah Arshah currently works at the Faculty of Computing, Universiti Malaysia Pahang. Ruzaini does research in Information Systems (Business Informatics), Software Engineering and Databases.
Current institution
Universiti Malaysia Pahang Al-Sultan Abdullah
Current position
  • Lecturer
Additional affiliations
September 2020 - November 2020
Universiti Malaysia Pahang Al-Sultan Abdullah
Position
  • Professor

Publications

Publications (93)
Article
The process of retaining leadership succession at higher education institutions (HEI) is crucial since it has entailed the process of selecting the ideal candidate. The goal is to guide universities toward maintaining organizations' excellence in their academic leadership and management (ALM) positions. Due to the lack of established standards for...
Article
Full-text available
This paper examines the factors determining a positive Information Security Culture (ISC) concept and the influence of ISC towards ISP compliance intention (INT) between IT and non-IT professionals in Malaysian public universities. Partial least square structural equation modelling, using PLS MGA, is used to assess the measurement and structural mo...
Conference Paper
Full-text available
Cloud computing has been around for quite long, yet some organizations have never used it, especially MSMEs in Indonesia. Several factors hinder its implementation by MSMEs, including unequal infrastructure for using the internet in Indonesia. This paper assesses the literature on cloud computing, SaaS, e-Commerce, and e-wallet to determine the ini...
Article
A far-reaching expansion of advanced information technology enables ease and seamless communications over online social networks, which have been a de facto premium correspondents in the current cyber world. The ever-growing social network data has gained attention in recent years and can be handy for industrial revolution 4.0. With the integration...
Article
Full-text available
IT support services are the crucial part in daily business operation services in any organization. Special attention is needed, especially in managing users or client satisfaction when using the IT services to address the user’s problem or request IT hardware issues. Service quality (SQ) dimension is used to measure the effectiveness in delivering...
Article
Full-text available
During the Talent Development Intervention programme, there is a need to provide an effective model to assess awareness, skills and experience among potential academics. To qualify as an Academic Leader or Academic Manager, there are certain characteristics and t raits necessary. However, there is a lack of research on the training of talented acad...
Article
Full-text available
Flood is the major natural hazard in Malaysia in terms of populations affected, area extent, frequency, social–economic damage, and flood duration. This shows the importance of providing comprehensive and effective flood mitigation management, which requires government agencies to enhance their employment performance that involves technological inn...
Article
For several years, great effort has been devoted to the study of e-commerce adoption. However, studies on the effect of information culture as internal organisational factors on e-commerce adoption are still lacking. Therefore, the aim of this study is to propose a model to examine the information culture factors affecting e-commerce adoption. To a...
Article
Full-text available
Flash flood is a natural disaster that often occurs after heavy rain, and it is getting more common nowadays. The flood early warning and response system (FEWRS) can be installed to minimize the level of damage and the number of casualties due to flood by providing accurate and reliable flood data. Unfortunately, the existing number of studies deta...
Conference Paper
Cloud-Based E-learning is indeed the new paradigm shift in the information and communication technology. As much as the field is still in its infancy stage, various educational institutions have adopted the cloud-based E-learning around the world at all the levels of education. Cloud-based E-learning has shown significant progress and success among...
Article
Full-text available
The traditional banking system, such as transactions over the counter using bank book is enhanced by adding the elements of electronic banking, where nowadays all transactions can be done over the network, because of globalization and the advancement of information and communication technology. However, significant threats to this technology also c...
Article
Full-text available
Prevalent research highlights that a positive Information Security Culture (ISC) could improve security behaviour, in particular, the employee's intention to comply with Information Security Policy (INT) in an organization. Although there are substantial empirical studies that suggest INT is influenced by Attitude (ATT), Normative Belief (NB) and S...
Article
Full-text available
The technology enhancement learning (TEL) needs continuous use and high perception from learners with collaborative of technologies and multi-media applications. The problem of continuous intention in e-learning applications relies on the type of technology used that changes from one university to another. This study aims to design a framework deve...
Conference Paper
Full-text available
IT Policy IT Services Service Level Agreement (SLA) Service Level Agreement (SLA) is a contract between a service provider and different levels of users in the organization. SLA lays out the metrics by which a service is measured, as well as penalties should the expected service levels are not met. SLA reduces the amount of job schedule based on IT...
Article
Full-text available
For several years, great effort has been devoted to the study of e-commerce adoption. However, studies on the effect of information culture as internal organisational factors on e-commerce adoption are still lacking. Therefore, the aim of this study is to propose a model to examine the information culture factors affecting e-commerce adoption. To a...
Conference Paper
Full-text available
This study analyses comprehensive of the existing theories that validate the accuracy of technology acceptance models (TAM). Also, examining the adopted TAM factors in conjunction with massive open online course (MOOC) features for continuous intention to use. The main problem phased TAM is the adoption of the right factors used for modelling desig...
Article
Full-text available
Information and communication technologies (ICT) have been implemented mainly in government organizations, where e-government has become prevalent. The previous research focuses mostly on e-government adoption from the perspective of citizens. However, there is a scarcity of research conducted from the viewpoint of the employee. This study tried to...
Article
Full-text available
This paper will discuss the impact of E-Learning prospect on the improvement of learner academic performance of Oman universities. The study explains the needs to expand working on E-Learning models and continue use of face to face traditional educational process. The real problem faced education is a need for several applications and technologies...
Article
Despite strong recommendations by scholars to establish Information Security Culture (ISC), the lack of ISC guidelines persists, particularly in aspects that could effectively improve employees’ security behavior in an organization. This study proposes an ISC model based on seven new formulated dimensions to examine its influence on employees’ Info...
Preprint
Full-text available
Abstract: For several years, great effort has been devoted to the study of e-commerce adoption. However, studies on the effect of information culture as internal organisational factors on e-commerce adoption are still lacking. Therefore, the aim of this study is to propose a model to examine the information culture factors affecting e-commerce adop...
Conference Paper
The establishment of Information Security Culture (ISC) has been recommended for improving employees’ information security in the organization. To date, there is still no clear guidance or model for assessing and cultivating ISC for Malaysian organizations, despite some Malaysian-based studies being carried out. In order to shed light to this issue...
Article
Recent years have seen continuous exposure of online social network (OSN) users to the security vulnerability due to socio-technical cyber hazards committed by OSN associates. Unfortunately, the current OSN platforms has lack of functionalities for automatic users protection in initiating online friendship and online users interaction within their...
Conference Paper
Full-text available
Over the decade Cloud-Based Business Services (CBBS) has emerged as a technological trend utilized in businesses towards improving the deployment of Information Communication Technology (ICT) services for competitive advantage. But, findings from prior studies suggest that there are issues related to service inconsistency which affects the effect o...
Conference Paper
Full-text available
In the business world, cloud computing (CC) technologies are emerging computing platforms used to improve the deployment of ICT services with the aim of improving performance and competitive advantage. However, enough attention has not been given to the factors that influence the continuous use behavior of organizations towards CC services. Hence,...
Article
Full-text available
this article about creating an adapted framework to evaluate student satisfaction on using UCOM model as e-learning model.
Article
The cultivation of positive Information Security Culture (ISC) is an effective way to promote security behavior and practices among employees in the organization. However, there is yet a consensus on a standard set of dimensions for the ISC concept. ISC has been associated with many facets, with some overlapping dimensions found in the literature....
Conference Paper
Requirement engineering course is perceived as an important course that become one of compulsory courses to be thought to Software Engineering graduates. However, Requirement Engineering Education (REE) is suffering from difficulty in content delivery (lecturer) and learning (student) due to the nature of Requirement Engineering theoretical and div...
Chapter
Full-text available
There are many vital roles and attributes played by the internal organizational environment in IT adoption. Technological innovations are adopted as a result of the reaction of many organizations to change and for influencing the business environment. For this study, a conceptual model was developed to focus on the effect of information culture as...
Article
Full-text available
Educational institutions are adopting Online Social Networks (OSNs) to support learning activities in university campuses. However, implementing a new technology requires identifying and assessing the factors that innuence users' acceptance of a new technology. Accordingly, this method enables the critical prediction of the success or failure of a...
Conference Paper
Many Higher Education Institutions are shifting to Cloud-Based E-Iearning (CBEL) due to its benefits. These benefits include reduced costs of accessing IT services, pooling of resources, scalability, and mobility as well as consumer satisfaction among others. However, some institutions especially in developing countries in general and Gulf Cooperat...
Article
Full-text available
This empirical study investigates whether the universities’ communication model and the technology acceptance model (TAM), which includes four factors, namely, academic performance, student satisfaction, effectiveness and support assessment, simultaneously enhance student satisfaction and improve the teaching method and academic performance level....
Article
Full-text available
Recent flood event in Malaysia especially at the East Coast region of Peninsular Malaysia shows the importance of providing a comprehensive and effective disaster mitigation management which encompasses the involvement of government agencies, private organization and NGOs. The early warning and response model is an important element in the mitigati...
Conference Paper
This paper discusses a pilot study on conceptualization and validation of Information Security Culture (ISC) as a multidimensional second-order formative construct. The concept was developed in our previous works, and is based on widely accepted concepts of Organizational Culture and ISC. The model is validated using samples from employees of one M...
Article
Full-text available
The present study aimed to investigate the impact of security and privacy perceptions on bank customers' trust to accept and adopt online banking services. Specifically, the investigation in the study focused on the factors affecting customers' trust to accept and use online banking services. In order to achieve this, a survey was administered to a...
Article
Full-text available
Background/Objectives: The purpose of this paper is to examine the role of trust in internet banking services based on empirical evidence from the survey conducted with commercial banks’ consumers in Irbid, the second largest city in Jordan. The paper answers the main research question: ‘Do the Ease of Use and Perceived Usefulness affect consumers’...
Article
For a decade since year of 2000 until 2010, Theory of Planned Behavior [TPB] and its main construct of Attitude, Normative belief and Self-efficacy have been considered as a significant theory and factors in the area ISP compliance behaviour study. However, there are still some questions exist particularly on to what extent this theory is significa...
Article
Full-text available
For a decade since year of 2000 until 2010, Theory of Planned Behavior [TPB] and its main construct of Attitude, Normative belief and Self-efficacy have been considered as a significant theory and factors in the area ISP compliance behaviour study. However, there are still some questions exist particularly on to what extent this theory is significa...
Article
Full-text available
The purpose of this paper is to understand the importance, relevance and the need of implementing Cloud-Based E-Learning (CBEL) in Higher education institutions (HEIs) in Oman. The paper maintains its emphasis on addressing the effectiveness of the cloud based e-learning system and also takes into account the activities of comparing and contrasting...
Article
Full-text available
Technology enhancement learning is a process that leads to deep point of learning and adds knowledge of technologies. Various studies shed light on technology development and its effect in educational sector. The aim of this integrative review is to examine the current evidence of the impact of technology learning on student learning and academic p...
Conference Paper
Full-text available
Academic accreditation standards are defined clearly in Higher Educational Institutions (HEI) plans, management, and delivering results of assessment student with learning outcomes. In recent years, all universities and institutions work hard to increase their approval privileges, skills, achievements through getting the accreditation from HEI. The...
Conference Paper
Informal specifications are commonly adopted for requirements engineering (RE), especially for customer-oriented system development projects, but their validity with respect to the user's requirements is usually difficult to perform. The common reason for the difficulty is that the specifications are often misinterpreted by the stakeholders due to...
Article
This paper reviews Information Security Culture (ISC) studies published in six leading databases from year 2000 until 2016 to investigate empirical findings that could support the relationship between ISC and employee’s security behavior as well as to identify the findings that could be applied as guidelines to cultivate ISC in the organization. Th...
Article
The establishment and cultivation of Information Security Culture (ISC) in an organization can promote desired employees’ behavior in adhering to Information Security Policy (ISP). Some factors of ISC have been investigated in ISP compliance studies, however there is no clear indication numbers of ISC dimensions available and how significant these...
Conference Paper
Full-text available
This research aims at validating the vital factors that affecting the continuous use of cloud computing services through literature review and experts' evaluation. These factors are factors that have an effect on the decision makers to forge ahead in the use of cloud computing services in their various organizations. Semi-structured interviews usin...
Conference Paper
Full-text available
Cloud computing refers to adopting advanced virtualized resources for high scalability that can be shared with end users. Utilization of this technology is expediting in the world to intensify the potential of cloud computing based on E-learning in higher education institutions. Due to various apparent reasons, some higher education institutions ar...
Article
Full-text available
Existing classification techniques, which are previously proposed for eliminating data inconsistency, could not achieve an efficient parameter reduction in soft set theory as it affects the obtained decisions. Additionally, data decomposition based on previous algorithms could not achieve better parameter reduction with available domain space. Mean...
Conference Paper
Full-text available
The primary purpose of carrying out this research work is to identify the crucial factors that influence the continuous use of cloud computing services in organizations. To achieve this identified objective, this research work carried out a comprehensive literature review on cloud computing services' adoption at the organizational level, particular...
Conference Paper
Full-text available
Trust is essential for all online transactions adoption and usage including online banking. In this paper, online banking trust was addressed through empirical evidence from the survey conducted in Jordanian commercial banks. An extended Technology Acceptance Model (TAM) framework used in this study. Partial Least Squares (PLS) to analyze the data,...
Article
Full-text available
Trust is essential for all online transactions adoption and usage including online banking. In this paper, online banking trust was addressed through empirical evidence from the survey conducted in Jordanian commercial banks. An extended Technology Acceptance Model (TAM) framework used in this study. Partial Least Squares (PLS) used to analyze the...
Article
The target of the study is to apply the success of engineering psychology to the area of Formal Engineering Methods, concentrating on validating the requirement specification at system analysis phase of a system development process. This paper presents a systematic approach to integrating specification animation into the process of writing requirem...
Conference Paper
For a decade since the year of 2000 until 2010, Theory of Planned Behavior (TPB) and its main construct of Attitude, Normative belief and Self-efficacy have been considered as a significant theory and factors in the area ISP compliance behaviour study. However, there are still some questions exist particularly on to what extent this theory is signi...
Conference Paper
The adherence of employees towards Information Security Policy (ISP) established in the organization is crucial in reducing information security risks. Some scholars have suggested that employees' compliance to ISP could be influenced by Information Security Culture (ISC) cultivated in the organization. Several studies on the impact of ISC towards...
Article
The need for an instrument to comprehensively assess Integrated Information System (IIS) is crucial in order to provide complete status on IIS effectiveness to the organisation. The instrument is considered comprehensive when it includes all the three main domains of Information System integration namely organisational, technical and strategic doma...
Conference Paper
Full-text available
The cultivation of Information Security Culture (ISC) in organization would assists information security management in terms of improving employees' security behavior in dealing with information assets. Many studies have been done to explore and investigate this ISC in various aspects including the concepts, factors, challenges and particular appli...
Article
The Social Research Network Sites (SRNS), online platform used by researchers, have huge amounts of information that would sometimes overwhelm the researchers. However, they need a dashboard as a tool to provide awareness on current information that are related to their fields of research; thus, the proposed dashboard model for the researchers in t...
Article
Full-text available
Social networking sites, a web-based application have permeated the boundary between personal lives and student lives. Nowadays, students in higher learning used social networking site such as Facebook to facilitate their learning through the academic collaboration which it further enhances students' social capital. Social networking site has many...
Article
Full-text available
This study attempts to answer the main research question: ‘Do security and privacy perceptions affect customers’ trust to accept and use internet banking technology to perform their banking transactions?’ This study examined the factors that affected Jordanian customers’ trust to accept internet banking services. Path analysis was used to analyze 1...
Article
Full-text available
This study attempts to answer the main research question: ‘Do security and privacy perceptions affect customers' trust to accept and use Internet banking technology to perform their banking transactions?’ This study examined the factors that affected Jordanian customers’ trust to accept Internet banking services. Path analysis was used to analyze 1...
Research
Full-text available
Publisher : Journal of Theoretical and Applied Information Technology
Article
Feed-forward, Back Propagation (BP) Network is a network structure capable of modeling the class prediction as a nonlinear combination of the inputs. The network has proven its suitability in solving several complex tasks, most especially when trained with appropriate algorithms. This study presents an enhancement of this network with a view to boo...
Article
Full-text available
Several undergraduate students most especially the new students do have an unacceptable Grade Point Average (GPA) at the end of their first year. Research has shown that during this period, stress by this set of students sometime responsible for their poor performance as they are faced with many challenges. Having knowledge about their previous aca...
Article
Full-text available
Learning models used for prediction purposes are mostly developed without paying much cognizance to the size of datasets that can produce models of high accuracy and better generalization. Although, the general believe is that, large dataset is needed to construct a predictive learning model. To describe a data set as large in size, perhaps, is cir...
Article
Full-text available
There are various social media that are currently available for users and their main objective is to let users keep in touch with friends worldwide or meet new people. This paper tries to provide an insight on classification of existing social media and social networking sites main features. Then, we highlight that all social media and social netwo...
Article
Full-text available
The basic idea to build significant attribute the uncertain objects should remove. Several theories are dealing with uncertainty, soft set theory also handles this uncertainty problem which still an open area to be explored in knowledge management. The propose techniques Known as Filtering data set which used for maintained the inferior object and...
Article
Full-text available
Several students usually fall victims of low grade point at the end of their first year in the institution of higher learning and some were even withdrawn due to their unacceptable grade point average (GPA); this could be prevented if necessary measures were taken at the appropriate time. In this paper, a model using fuzzy logic approach to predict...
Article
Full-text available
The assessment of Integrated Information Systems (IIS) is seen as an important exercise in organisation to enable the IS managers, as well as top management, to understand their return on investment in IS integration. Study has found out that very few organisations have proper assessment tool, and while other organisations have never done proper as...
Conference Paper
Full-text available
There is a need to address issues related to IS integration since integration are essential to organizations to move forward and supporting their business functions. However, there is no tool available to assess the complexity of IS integration, before thinking of measuring the success of integration initiative. If we can device a framework that de...
Article
Full-text available
One of the challenges of Knowledge Management System in an organization is to integrate both the tacit and explicit knowledge in one integrated system. Though a lot of organizations have developed their own Information System to capture the explicit knowledge, but most of the information systems are not knowledge based. The same thing happen when c...

Network

Cited By