Siti Hajar Othman

Siti Hajar Othman
Universiti Teknologi Malaysia | UTM · School of Computing, Faculty of Engineering

PhD

About

89
Publications
68,294
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
725
Citations
Citations since 2017
59 Research Items
615 Citations
2017201820192020202120222023050100150
2017201820192020202120222023050100150
2017201820192020202120222023050100150
2017201820192020202120222023050100150
Additional affiliations
September 2000 - September 2014
Universiti Teknologi Malaysia
Position
  • Professor (Associate)

Publications

Publications (89)
Article
Full-text available
Cryptocurrency is a digital currency used in financial systems that utilizes blockchain technology and cryptographic functions to gain transparency and decentralization. Because cryptocurrency prices fluctuate so much, tools for monitoring and forecasting them are required. Long short-term memory (LSTM) is a deep learning model that is capable of s...
Conference Paper
Full-text available
Cybersecurity is increasingly becoming an important discussion topic in the boardroom of companies, regardless of the size or industry. Hackers nowadays are becoming increasingly smart. Instead of attacking big multinational companies, international banks and government organisations which have built strong protection against cyber threats, the per...
Article
Full-text available
The Internet of Things (IoT) Investigation of Forensics (IoTFI) is one of the subdomains of Digital Forensics that aims to record and evaluate incidents involving the Internet of Things (IoT). Because of the many different standards, operating systems, and infrastructure-based aspects that make up the Internet of Things industry, this sector is ext...
Article
Full-text available
Financial fraud, considered as deceptive tactics for gaining financial benefits, has recently become a widespread menace in companies and organizations. Conventional techniques such as manual verifications and inspections are imprecise, costly, and time consuming for identifying such fraudulent activities. With the advent of artificial intelligence...
Article
Full-text available
The world economy today has adopted the internet as a medium of transactions, this has made many organizations use the internet for their daily activities. With this, there is an urgent need to have knowledge in cybersecurity and also how to defend critical assets. The objective of this paper is to identify the level of cybersecurity awareness of s...
Chapter
Full-text available
Mobile Forensic (MF) is a branch of digital forensic used to collect and analyze mobile device crimes. Several forensic models and frameworks have been proposed in the literature for the MF domain to identify, acquire, and investigate MF crimes. However, these models are redundant and developed for specific purposes. Therefore, the authors develope...
Article
Full-text available
Cybersecurity has gained increasing interest among firms of different sizes and industries due to the significant rise of cyber-attacks over time. Technology start-ups are particularly vulnerable to cyber-attacks, as appropriate security measures cannot be executed due to their limited human capital and financial resources to quantify cyber risks a...
Article
Wireless sensor network is very popular in the industrial application due to its characteristics of infrastructure-less wireless network and self-configured for physical and environmental conditions monitoring. However, the dynamic environments of wireless network expose WSN to network vulnerabilities. Intrusion Detection System (IDS) has been used...
Article
Full-text available
The land is a very valuable asset for any government. It’s government job to ensure that the land registration and transfer are done without any fraud, good speed and transparency. The current land registration method employed by the governments are not open to frauds, hacks, and corruption of land records. Fraud is one of the major problems in lan...
Article
Full-text available
Maintenance data for government buildings in Putrajaya, Malaysia, consists of a vast volume of data that is divided into different classes based on the functions of the maintenance tasks. As a result, multiple interactions from stakeholders and customers are required. This necessitates the collection of data that is specific to the stakeholders and...
Preprint
Full-text available
Internet of Things Forensics (IoTFs) is a new discipline in digital forensics science used in the detection, acquisition, preservation, rebuilding, analyzing, and the presentation of evidence from IoT environments. IoTFs discipline still suffers from several issues and challenges that have in the recent past been documented. For example, heterogene...
Article
Wireless sensor network (WSN) is among the popular communication technology which capable of self-configured and infrastructure-less wireless networks to monitor physical or environmental conditions. WSN also is the most standard services employed in commercial and industrial applications, because of its technical development in a processor, commun...
Article
Full-text available
Effective maintenance management requires proper data management for decision-making purposes. Big Data (BD) and Business Intelligence’s (BI) growing trend has created many challenges for government data management in particular. The government finds difficulties in integrating the massive volume of data with high-speed processing due to incapable...
Article
Full-text available
Using a face validity approach, this paper provides a validation of the Database Forensic Investigation Metamodel (DBFIM). The DBFIM was developed to solve interoperability, heterogeneity, complexity, and ambiguity in the database forensic investigation (DBFI) field, where several models were identified, collected, and reviewed to develop DBFIM. Ho...
Chapter
Information and Communication Technology (ICT) is an important driver for socio-economic innovation, and a promising tool for better managing future risk in a changing climate. ICT technology has been widely applied to support disaster management cycles (prevention/mitigation, preparedness, response, and recovery/rehabilitation). This paper present...
Article
Full-text available
Today, the internet has become the backbone to empower and facilitate our daily activities, including educational, financial, and social activities. Nigeria is among the top list of countries that suffered economically from cybercriminals. Many researchers have turned their attention to identifying the cybersecurity awareness of students but limite...
Article
With cybercrime on the rise, the healthcare environment has been listed as the top 5 of the most targeted industries for information security breaches. This is due to the current migration from physical to Electronic Health Records (EHR). The challenges of controlling the database costs also continue to escalate. As a result, measures such as Bring...
Article
Full-text available
Cybersecurity is growing exponentially day by day in both the public and private sectors. This growth also comes with a new and dynamic cyber-threats risk that causes both sectors' performance to halt. These sectors must update their cybersecurity measures and must understand the capability and maturity of their organization's cybersecurity prepare...
Article
Full-text available
The purpose of this study is to investigate the conflict of South China Sea area and develop an ontology architecture South China Sea conflict. The South China Sea is a marginal sea that is part of the Pacific Ocean, covering an area of about 3,500,000 square kilometres (1,400,000 sq mi) from the Karimata and Malacca Straits to the Taiwan Strait. U...
Article
Full-text available
The emergence of the internet and also the use of various online applications and the exposure to the social platforms that are evolving day by day have positioned students to online risk. Online fraud, cyber-bully, phishing are among those risks students are exposed to in their daily activities. To find a solution to that, cybersecurity awareness...
Conference Paper
Full-text available
This research work was conducted to identify the level of cybersecurity awareness among University students and to propose a way forward.
Article
Full-text available
This Case Study reports the preliminary results of a quantitative survey aimed to identify students' awareness and enthusiasm to learn cybersecurity in Nigerian Universities. The objective of the survey was to see how students in this developing country are aware of cyber-attacks and how they can mitigate the attacks and to find out if cybersecurit...
Article
Full-text available
Database Forensic Investigation (DBFI) involves the identification, collection, preservation, reconstruction, analysis, and reporting of database incidents. However, it is a heterogeneous, complex, and ambiguous field due to the variety and multidimensional nature of database systems. A small number of DBFI process models have been proposed to solv...
Conference Paper
Full-text available
Bitcoin is a kind of Cryptocurrency and now is one of type of investment on the stock market. Stock markets are influenced by many risks of factor. And bitcoin is one kind of cryptocurrency that keep rising in recent few years, and sometimes sudden fall without knowing influence behind it on the stock market. Because it’s fluctuations, there’s a ne...
Article
Full-text available
After Bitcoin Introduced around the world, many Cryptocurrencies was created that followed the standard of bitcoin. The use of Bitcoin or other Cryptocurrency as a currency is also an interesting study from an Islamic economic perspective. They tried to use gold with value back by gold , which gold itself is famous for its exchange rate stability....
Research
Cloud computing (CC) is a future technological trend for technological infrastructure development. And it is growing strongly as the backbone of industrial future technological infrastructure. As CC service has a lot to offer, it also has some major downside that clients cannot ignore. For CC service adoption, the potential candidates are SMEs but...
Article
Full-text available
Purpose: According to the literature concerned with this study, less than satisfactory outcomes have been achieved through implementing business process improvements methods (BPIMs) in industries, in general, and in healthcare, in particular. The existing methods used need to be enhanced in order to create more effective outcomes. There has also b...
Conference Paper
Full-text available
Bitcoin is a kind of Cryptocurrency and now is one of type of investment in the stock market. Stock markets are influenced by many risk of factor. And bitcoin is one kind of cryptocurrency that keep rising in recent few years, and sometimes fall without knowing influence behind it, on stock market. Because it's fluctuations, there's a need Autamote...
Article
Full-text available
School period for teenagers can be considered as a challenging and critical stage for them. This is because, at this stage, many teenagers facing a challenge of identity crisis and intend to explore and addicted to the internet easily. Overuse the internet may lead to an individual psychology include mental and emotional. The field of cyberpsycholo...
Article
Full-text available
This paper reports a preliminary study on the implementation of the big data concept in property management by using a business intelligence application. Property management seeks to maximise value by optimising operational efficiency that requires a high degree of technological literacy in managing properties and assets. Property management requir...
Article
Full-text available
In Malaysia, issues related to disaster management are always given attention in society and by the responsible parties. However, in general, citizen do not think of the consequential impact of disaster due to less of knowledge regarding the early phase in disaster management. Therefore, citizen in those areas will be more vulnerable to landslide a...
Thesis
Full-text available
Cloud computing (CC) is a future technological trend for technological infrastructure development. And it is growing strongly as the backbone of industrial future technological infrastructure. As CC service has a lot to offer, it also has some major downside that clients cannot ignore. For CC service adoption, the potential candidates are SMEs but...
Article
Nowadays, most fortunes of the commercial banks today are linked with Information Technology (IT) assets they possess and the way they audit their organizations IT assets. As information assets become the heart of commercial banks, Information Security Risk Audit and Assessment (ISRAA) is increasingly involved in managing commercial banks informati...
Article
Business Continuity Plan (BCP) plays an important part in ensuring the business continuity of an organization in the event of major disruptions. In order to ensure the continuity of their critical business functions and critical services during and after a disaster, healthcare organizations such as hospitals, clinics, hospices and others can implem...
Article
Data Mining is a computational process that able to identify patterns, trends and behaviour from large datasets. With this advantages, data mining has been applied in many fields such as finance, healthcare, retail and so on. However, information disclosure become one of an issue during data mining process. Therefore, privacy protection is needed d...
Conference Paper
Full-text available
With the rapid development of technology, mobile devices have become an essential tool in terms of crime fighting and criminal investigation. However, many mobile forensics investigators face difficulties with the forensics investigation process in their domain. The difficulties are due to the heavy reliance of the forensics field on knowledge as a...
Article
Full-text available
Database forensics is a domain that uses database content and metadata to reveal malicious activities on database systems in an Internet of Things environment. Although the concept of database forensics has been around for a while, investigation of cyber crime activities and cyber breaches in an Internet of Things environment would benefit from the...
Article
Full-text available
With the rapid development of technology, mobile phones have become an essential tool in terms of crime fighting and criminal investigation. However, many mobile forensics investigators face difficulties with the investigation process in their domain. These difficulties are due to the heavy reliance of the forensics field on knowledge which, althou...
Data
Selection of common concepts. (DOCX)
Data
Validation summary against model set V1. (DOCX)
Data
Validation summary against model Set V2. (DOCX)
Data
Definitions of MFM concepts. (DOCX)
Article
Full-text available
In this research, we present the use of a Model Driven Architecture (MDA) in academic quality assurance (AQA) domain. To provide a detailed analysis of MDA, we show how the paradigm of MDA can be configured to implement the AQA application software based on information system (IS) platform. An extensive analysis of AQA models is constructed to extr...
Article
Full-text available
Database Forensics (DBF) is a widespread area of knowledge. It has many complex features and is well known amongst database investigators and practitioners. Several models and frameworks have been created specifically to allow knowledge-sharing and effective DBF activities. However, these are often narrow in focus and address specified database inc...
Data
Table A. The 38 DBF models for development (Set I) and validation (Set II). The perspectives they cover are denoted by ‘√’. (DOCX)
Data
Table B. Extracted database forensic concepts. (DOCX)
Data
Table C. Candidate and Proposed common concepts for the DBF domain. (DOCX)
Data
Table E. Validation summary against model set V1. (DOCX)
Data
Table H. Frequency result of artefact analysis and documentation & presentation-process concepts. (DOCX)
Data
Table D. List of proposed DBF concepts and definition. (DOCX)
Data
Table F. Validation summary against model set V2. (DOCX)
Data
Table G. Frequency results of identification and artefact collection-process concepts. (DOCX)
Chapter
Continual quality improvement (CQI) is a management method that has been employed in various areas, recently adopted in Institutions of Higher Learning (IHL). It is a part of total quality management element to increase the productivity, give impact to efficient business process for quality assurance, and encourage accountability to the organisatio...
Article
Objectives: There are numerous assessment practices being implemented by higher education practitioners. However, these best practices are not widely shared. In this study, a metamodel that shares the best practices is created to denote important concepts and knowledge related. Methods/Statistical Analysis: The development is using 8-steps metamode...
Article
A pattern for evaluating higher education using quality methods has been established in most of the world. Quality assurance has been adopted as one of the quality methods to evaluate the performance of higher education and to assure the quality at optimal level. However, managing quality assurance activities is a challenging one because it is invo...
Article
Full-text available
Database Forensic investigation is a domain which deals with database contents and their metadata to reveal malicious activities on database systems. Even though it is still new, but due to the overwhelming challenges and issues in the domain, this makes database forensic become a fast growing and much sought after research area. Based on observati...
Article
Timely knowledge sharing in disaster management (DM) is clearly vital, but it is remains challenging. Roles involved in DM processes often cut across many organizational boundaries and are dynamic. Knowledge involved is enormous and diverse. It includes information related to varieties of disasters, roles descriptions, plans and operations. Alas, p...
Article
Full-text available
Database Forensic Investigation (DBFI) discipline has been utilizing in identifying, collecting, preserving, analyzing, reconstructing and documenting database crimes. DBFI knowledge has scattered anywhere and has not ever an obvious structure to managing it. This study makes survey of several DBFI knowledge process models, algorithms, methods, art...
Conference Paper
This research examines the practice of Green Property Management (GPM) in for commercial buildings. Property Management is the process of taking care of properties so as to meet the interest of all people having interest in the property. The extent of damage to the environment from current unsustainable living today has driven building users and op...
Conference Paper
Full-text available
This research examines the practice of Green Property Management (GPM) in for commercial buildings. Property Management is the process of taking care of properties so as to meet the interest of all people having interest in the property. The extent of damage to the environment from current unsustainable living today has driven building users and op...
Conference Paper
Full-text available
Mobile phones have become quite important tools in the modern world. The forensics field heavily relies on knowledge as an important resource. Due to the ongoing changes in digital technology, the power of knowledge enables innovation and assists in establishing proper standards and procedures. As such, it is necessary to establish a relationship b...
Article
Security of information systems is becomes a major concern for many organizations nowadays as security risks may have a serious impact on the organization's information assets. Information Security Management (ISM) describes controls that an organization needs to implement to ensure that it is sensibly managing the risks of loss, misuse, disclosure...
Article
Threats which come from database insiders or database outsiders have formed a big challenge to the protection of integrity and confidentiality in many database systems. To overcome this situation a new domain called a Database Forensic (DBF) has been introduced to specifically investigate these dynamic threats which have posed many problems in Data...
Article
Full-text available
House Price (HP) valuation involves highly complex decision making. This requires collaborating with other parties to plan and organize activities and gathering knowledge from various sources that are distributed across time, space and people. In other words, not all situational knowledge is immediately available and no one person is positioned to...
Conference Paper
Full-text available
Academic quality assurance system in Malaysia has evolved and improved into a positive direction. However, many challenges and issues have been highlighted from previous researches and audit findings to ensure the academic quality of the system. These studies explore the pertinent issues, challenges and practices that have been implemented in unive...
Chapter
A metamodel is a model that has the ability to create the languages of many domain models. Domain models are conceptual models of a domain under study and contain all the entities, attributes, relationships, and constraints of the domain. As the artifact of a metamodeling technique, a metamodel could generalize most of the concepts used in existing...
Conference Paper
Full-text available
Physical security is a type of domain in the information security controls which has many interacting activities involved in the domain. Some of the activities are such the use of locks, security guards, access control, lighting, badges, alarms, ventilation, barriers, and other similar measures to control access to computers, its related equipment...
Chapter
Full-text available
metamodel is a model that has the ability to create the languages of many domain models. Domain models are conceptual models of a domain under study and contain all the entities, attributes, relationships, and constraints of the domain. As the artifact of a metamodeling technique, a metamodel could generalize most of the concepts used in existing d...