Zam Safie

Zam Safie
Verified
Zam verified their affiliation via an institutional email.
Verified
Zam verified their affiliation via an institutional email.
  • Ph.D.
  • Professor (Full) at National University of Malaysia

About

89
Publications
91,218
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
2,471
Citations
Current institution
National University of Malaysia
Current position
  • Professor (Full)
Additional affiliations
June 2014 - May 2016
University of Technology Malaysia
Position
  • Professor (Associate)
January 2016 - present
National University of Malaysia
Position
  • Professor (Associate)
November 2010 - June 2014
United Nations University (UNU)
Position
  • Research Associate
Education
January 2018 - April 2019
Anglia Ruskin University
Field of study
  • Business Administration
December 2003 - June 2010
International Islamic University Malaysia
Field of study
  • Management Information System
July 1997 - March 1999
National University of Malaysia
Field of study
  • Information Technology

Publications

Publications (89)
Article
Self-awareness and self-management in diabetes are critical as they enhance patient well-being, decrease financial burden, and alleviate strain on healthcare systems by mitigating complications and promoting healthier life expectancy. Incomplete understanding persists regarding the synergistic effects of diet and exercise on diabetes management, as...
Chapter
This research focuses on developing an anomaly detection system using machine learning to mitigate Distributed Denial of Service (DDoS) attacks in IoT networks. The study utilizes a diverse dataset from IoT environments to train and evaluate machine learning algorithms for DDoS detection. The dataset includes various IoT device types, communication...
Article
Full-text available
Diabetic retinopathy, often resulting from conditions like diabetes and hypertension, is a leading cause of blindness globally. With diabetes affecting millions worldwide and anticipated to rise significantly, early detection becomes paramount. The survey scrutinizes existing literature, revealing a noticeable absence of consideration for computati...
Article
Organizations rely on high quality master data as a critical component in achieving their operational and strategic performance. To accomplish high quality master data, they need to be managed properly through a systematic and holistic framework. However, prevalent master data quality management frameworks lack in providing comprehensive management...
Article
Full-text available
The rise of smart grid, the versatile application and execution of electricity generation to consumer sides through advanced metering infrastructure merged information and communication technology with cyber-physical systems and the Internet of Things to enable reliable, secure, and comfortable operation in a smart grid environment. From the electr...
Article
Full-text available
The Internet of Things (IoT) in deploying robotic sprayers for pandemic‐associated disinfection and monitoring has garnered significant attention in recent research. The authors introduce a novel architectural framework designed to interconnect smart monitoring robotic devices within healthcare facilities using narrowband Internet of Things (NB‐IoT...
Article
Full-text available
The 5 G networks are effectively deployed worldwide, and academia and industries have begun looking at 6 G network communication technology for consumer electronics applications. 6 G will be built on pervasive artificial intelligence (AI) to enable data-driven Machine Learning (ML) applications in massively scalable and heterogeneous networks. Conv...
Article
Full-text available
The Internet of Things (IoT) represents a dynamic infrastructure, leveraging sensing and network communication technology to establish ubiquitous connectivity among people, machines, and objects. Due to its end devices’ limited computing resources and storage space, it is not feasible to merely transpose traditional internet security technologies d...
Article
Full-text available
During the years 2018-2024, considerable advancements have been achieved in the use of deep learning for side channel attacks. The security of cryptographic algorithm implementations is put at risk by this. The aim is to conceptually keep an eye out for specific types of information loss, like power usage, on a chip that is doing encryption. Next,...
Article
Full-text available
Artificial Intelligence (AI) has witnessed exponential growth in recent years fueled by advancements in software, hardware, and application development across diverse domains. This research utilizes a thorough analytical methodology to investigate the multifaceted concept of AI implementation in Malaysia’s public sector. It underscores the transfor...
Chapter
Full-text available
The pervasiveness of artificial intelligence (AI) within contemporary organisations is an undeniable phenomenon. The primary objective of this chapter is to undertake a meticulous bibliometric analysis of the scholarly literature that investigates the interconnected exploration of the utilisation and ramifications of artificial intelligence (AI) wi...
Article
Full-text available
Objective Since unexpected COVID-19 has been causing massive losses worldwide, preventive measures have been emergency provided to curb the expansion of the epidemic and cut off transmission routes. However, there is a lack of studies that comprehensively address COVID-19 infection prevention measures. This aims to provide a comprehensive evaluatio...
Preprint
Full-text available
This research focuses on developing an anomaly detection system using machine learning to mitigate Distributed Denial of Service (DDoS) attacks in IoT networks. The study utilizes a diverse dataset from IoT environments to train and evaluate machine learning algorithms for DDoS detection. The dataset includes various IoT device types, communication...
Article
The rapid progression of technology has led to web-based e-Health systems migrating to mobile device systems known as m-Health apps. Past researchers gave guidelines on the general e-Health, but the usability guidelines for m-Health apps were lacking. General guidelines are challenging to refer to when developing mobile apps with specific domains a...
Article
Full-text available
The sixth generation (6G) mobile communication system is expected to meet the different service needs of modern communication scenarios. Heterogeneous networks (HetNets) have received a lot of attention in recent years due to their potential as a novel structure for evolutionary networks. When compared to homogeneous networks, HetNets provide more...
Article
Full-text available
The process of integrating building information modeling (BIM) and Internet of Things (IoT)-based data sources is a recent development. As a generalization, BIM and IoT data provide complementary perspectives on the project that complement each other’s constraints. Applying the concept of BIM-IoT in the construction industries which has been termed...
Article
Full-text available
Building Information Modeling (BIM) has emerged as a prospective technology used to advance the practices of construction projects. Also, Internet of Things (IoT), as a technology that connects sensing devices to share information across platforms, has become essential in building and construction environment. The integration of BIM-IoT in the cons...
Article
Full-text available
Due to polymorphic nature of malware attack, a signature-based analysis is no longer sufficient to solve polymorphic and stealth nature of malware attacks. On the other hand, state-of-the-art methods like deep learning require labelled dataset as a target to train a supervised model. This is unlikely to be the case in production network as the data...
Article
Full-text available
Fifth-generation (5G) technology is now being established globally and is a central topic of discussion for future generations. The building sector is at risk because the internet of things (IoT) is one of the central components of building 4.0. Building products from IBM, Amazon, Intel, Google, and Apple have demonstrated the sector’s future direc...
Article
Full-text available
ePHR (Electronic Personal Health Record) is not a new concept in the era of electronic health information. The advantages of ePHR in improving health outcomes through patient empowerment have been recognized globally and almost all countries that implement electronic health records (EHR) have created ePHR. This study identifies the components of th...
Article
Full-text available
An ample of studies have recently been conducted to explore and analyze the predictors of students' e-learning satisfaction (ELS) during the COVID 19 pandemic lockdown. However, research is scarce on investigating mediating roles of key aspects, such as students' learning stress (SLS) and students' willingness to learn (SWL). This research intends...
Article
Full-text available
A systematic literature review has been conducted on the exiting E-CRM system and found that 70% of E-CRM projects do not meet their ultimate goals. Furthermore, more than 77% of E-CRM projects do not succeed in the company's objectives. Many telecommunication companies reported that the existing E-CRM systems face severe challenges, which hinder t...
Article
Full-text available
Organizations in various industries have widely developed the artificial intelligence (AI) maturity model as a systematic approach. This study aims to review state-of-the-art studies related to AI maturity models systematically. It allows a deeper understanding of the methodological issues relevant to maturity models, especially in terms of the obj...
Article
Full-text available
Employee satisfaction is key to electronic–customer relationship management (E-CRM) systems in telecommunication companies. The purpose of this study is to investigate the direct and indirect effect of technological factors, individual factors, and organizational factors on employees' level of satisfaction. For this study, data was collected from 3...
Article
Full-text available
The importance of perceived need in the health sector, specifically its influence on health workers’ behaviour towards the adoption of an information system (IS), needs to be better understood. Therefore, the purpose of the present study was to investigate the extent to which a perceived need factor influences physicians’ and nurses’ behaviour to a...
Article
Full-text available
The research investigates effect of IT characteristics factors on students' e-learning satisfaction during the period of COVID 19 pandemic lockdown. Selected factors of IT characteristics are IT complexity, IT pace change and IT presenteeism. The study also investigates mediating role of perceived value as a second order construct comprising of per...
Article
Full-text available
Of recent, Building Information Modelling (BIM) has become an influential paradigm for the development of better project delivery practices to improve construction and operational efficiencies. In the last 6 years, a significant number of studies have been published on the integration of BIM in Internet of Things (IoT). This paper aims to examine t...
Article
Full-text available
Frauds in managing ERP system have been widely reported in Malaysia. The management should initiate a series of anti-fraud measures, as a leverage of cost control, while offsetting an existing resource. Fraud involves a significant financial risk that may threaten profit, as well as the image of the business entity. In this situation, where the dev...
Article
Full-text available
Electronic Customer Relationship Management (E-CRM) is a moderately new field of researches. There are some issues facing telecommunication companies about the use of E-CRM systems. In this study, the researchers suggest a model of a relationship in that a quantitative research design selected to validate the proposed factors and to build relations...
Article
Full-text available
Purpose: This research investigates the impact of technology adoption on organisation productivity. The framework has three independent variables viz. technological change, information technology (IT) infrastructure, and IT knowledge management and one dependent variable as organisational productivity. Research design, data and methodology: An expl...
Conference Paper
Full-text available
Cloud computing (CC) has created a paradigm shift in using technology. Prior literature focused on the adoption of this technology among business organization while studies that are related to educational institutions are few. The aim of this study is to investigate the factors that affect the cloud based e-learning (CBEL) adoption among students i...
Article
Full-text available
Schema matching is the process of determining the similarities among multiple schemas of databases or websites structure. Several matching approaches have been depicted in the literature. Yet, the most adequate and accurate approach was related to the textual analysis in which the schemas are being examined in terms of its text information. Various...
Conference Paper
Full-text available
Hard-of-hearing (HoH) and hearing loss or hearing-impaired individuals describe “those who cannot hear or do not hear well” due to being born deaf or who may have lost some or all of their hearing ability at some time in their life. Some of the hearing-impaired people use sign language to communicate with other similarly-affected individuals as wel...
Article
Full-text available
Banking, a demand-driven industry is vastly growing to date by consistently expanding its client network via internet banking. The rendered service quality by banks has nevertheless been the essential tool for attracting prospective customers. Although, impact of service quality on satisfaction and patronage is well researched, investigating the sa...
Article
Full-text available
This research will provide an overview of the predominant cybersecurity issues in ASEAN countries, current measures adopted by ASEAN countries in tackling cyber security issues and identify challenges that are being faced by ASEAN countries. However, in recent years, cybersecurity has become a critical problem globally, which led ASEAN to step up a...
Chapter
Full-text available
This article presents an exhaustive review of these studies and suggests a direction for future studies in the IS domain. Research Methodology Trending in Enterprise Architecture (EA), Information Technology Shared Services (ITSS) and Enterprise Resource Planning System (ERP) fields from 2014 until early 2019 was identified applied from the three r...
Article
Full-text available
The quickly propelling Voice over Internet Protocol (VoIP) innovation, is picking up customer fascination in the business today. Its uses, including IP communication frameworks, includes the transmission of voice as information bundles which after achieving the getting side, reassembles and deciphers according to necessity. This encourages open jus...
Article
Full-text available
The IT shared services initiatives support the 4th Industrial Revolution. The services are also measured to determine the e-government ranking. Sharing services is one of the strategic management options for reducing redundancy in operations, which can be very effective for organizations in the public or private sector. The organization unit or dep...
Article
Full-text available
The specific application of the ad-hoc network is a form of the wireless sensor network, that participates to achieve "smart sensing work" where the nodes are "smart sensors". This modern technology has been used innovatively in many sensing applications and observations in various domains-medical, banking security, and industry. MANET, referred to...
Article
Full-text available
E-Commerce tools have become a human need everywhere and important not only to customers but to industry players. The intention to use E-Commerce tools among practitioners, especially in the Malaysian retail sector is not comprehensive as there are still many businesses choosing to use expensive traditional marketing. The research applies academic...
Article
Full-text available
As a result of digital technology revolution and massive growth of smart phone usage, over 66% of world's population (4.92 billion) is using mobile phones and over half of them are using social media. Mobile social networking (MSN) becomes one of the key communication tool, new trend, necessity and lifestyle. With information transparency, consumer...
Article
Full-text available
Enterprise architecture is very important to the public sector's IT systems that are developed, organized, scaled up, maintained and strategized. Despite an extensive literature, the research of enterprise architecture is still at the early stage in public the sector and the reason to explain the acceptance, as well as the understanding of the impl...
Article
Full-text available
Hard of hearing and hearing loss are examples of disabilities that affect some individuals. Some of the deaf people use sign language to communicate among themselves as well as the normal people. This language is known as the sign language. The sign language for people with hearing loss depends on the movements of the hand, which simultaneously com...
Conference Paper
Abstract— Moodle is an open-source Learning Management System (LMS) that is used widely around the world. Moodle is the most popular and most used learning management system because of its flexibility and open source. There are more than 68 millions Moodle users and more than 55, 000 Moodle systems are used with different purposes around the world....
Article
Full-text available
In last few years, we have been hearing about the word ‘Agile’ in the project delivery workspace. Often, project managers have constructive debates and interesting discussions among colleagues on the challenges of the Agile project. General concerns were lack of ownership of the team, unclear signal from management, ineffective cost management and...
Article
Full-text available
E-learning is a helpful tool that has facilitated education for normal individuals and the disabilities in the worldwide. In particular, there is a need to make e-learning accessible to hard of hearing and deaf individuals. This could demonstrated pedagogically beneficial for both instructors of hard of hearing and hearing loss students. A prelimin...
Article
Full-text available
Educational institutions around the world provide ERP related courses to empower students. Many universities around the world follow training models and methods provided by ERP vendors to facilitate the learning, Despite the benefits of using vendor training tools, models and methods, they tend to present the business process from the perspective o...
Conference Paper
Full-text available
The main goal of paper is to analyze the user’s perception and opinion of the ERP training needs and reliability to the business process improvement by participate to the training program frequently. To achieve this purpose, we have developed a set of questionnaires and tested to prove its reliability and validity. The variables were designed from...
Research
Full-text available
In creating undertaking engineering, it needs to get or build up an EA system for big business design. There are an assortment of systems that can be used for the advancement of big business engineering. Suitable utilize and choice of the correct EA system will quicken and encourage the advancement of engineering, guaranteeing that the entire scope...
Article
Full-text available
The implementation of context awareness in smartphones is getting broader. Through embedded sensors in smartphones, they are able to detect the device’s location and communicate through radio frequency. By communicating through Near Field Communication (NFC), smartphones are able to read NFC tags in short distances to understand the context of the...
Article
Full-text available
Nowadays, the technology utilization and adoption considered as one of the trend researches in different contexts. In order to achieve successful utilization, a number of factors may be taken into consideration from different perspectives depending on the real needs in the context of usage. Healthcare context still needing the utilization of new tr...
Article
Full-text available
ERP can be called as one of the most significant contributions of computer science and particularly information systems for the business environment which can support all complicated business process of an organisation including sale, purchase, warehouse and manufacturing into a single database. For such complex system like ERP, implementation invo...
Article
Full-text available
Blood is undeniably essential to save lives. The high demand for blood cannot compete with the amount collected through blood donation. In order to cater to the issue, researchers tend to focus more on the donors’ side. Meanwhile, the other party which is the blood bank continues to play its role to increase the blood supply. The blood bank process...
Article
Full-text available
Electronic customer relationship management (E-CRM) is a modern tool to secure and maintain competitive advantage that focuses on customers. Telecommunication companies nowadays are attentive to the employees, in their effort to enhance job satisfaction through the development of E-CRM. This study aims to integrate theories for a development model...
Article
Full-text available
It is commonly perceived that the value of healthcare services constantly increases in developing and developed countries to which healthcare providers are currently becoming more challenging. Consequently, taking on advanced health information systems to reduce healthcare cost and improve overall health quality is imminent in countries that are st...
Article
Full-text available
Integrating the new technologies to improve the healthcare services can be seen as one of the research trends nowadays, as earlier studies have recommended the potential of emerging technologies in enhancing healthcare service practices by means of providing more opportunities to carry out activities essential for prevention, diagnosis, monitoring,...
Article
Full-text available
Despite the importance of the information culture, little is known about the influence of information culture on the adoption of information systems (IS) among employees in public health sector of developing countries. This research explores the influence of information culture factors on employees' behavioural intention to adopt IS. Information cu...
Article
Full-text available
Cloud computing is a new paradigm shift in information technology. Most of the studies in the cloud are business related while the studies in cloud based e-learning are few. The field is still in its infancy and researchers have used several adoption theories to discover the dimensions of this field. The purpose of this paper is to review and integ...
Article
Full-text available
Cloud computing is a new paradigm shift. Researchers attempts to find the factors that affect the adoption of cloud computing. However, few studies were conducted in educational institutons and there is ambiguity regarding the sitaution of the adotion of cloud based learning. The purpose of this study is to review, analyse and integrate the literat...
Article
Full-text available
The objective of the paper is to represent an international pilot project to teach development of free and open source hospital Information systems at the national level using a live pre installed Enterprise Resource Planning (ERP) System. We have developed live image with pre installed free and open source ERP framework -Tryton® (A fork of openERP...
Article
Full-text available
This paper presents a methodology to design an information flow telehealth model with an initial model designed based on standard of Laboratory Information System (LIS) in Malaysia. Ministry of Health (MoH) Malaysia's vision is to have an integrated telehealth system for telehealth services within Malaysia. The idea of telehealth integration has be...
Article
Full-text available
This study aims to explicate the strategic utilisation of e-learning is of upmost significance as e-learning plays a pivotal role in the improvement of healthcare learning and knowledge transfer, especially in developing countries and in pursuing of Millennium Development Goals (MDGs). Rapid technology changes in the learning and knowledge transfer...
Article
Full-text available
The study reviews and attempts to identify the Information Culture factors that impact the users' attitudes toward the adoption of Health Information System (HIS) in developing counties. It is based on a review and a critical analysis of previous research related to the adoption of HIS, especially in developing countries. The study discovered Infor...
Article
Full-text available
Culture has attracted the attention of many e-learning researchers who suggest it to be a very important factor in e-learning design development. Barber et al. (1998) suggest that, for a successful system interface, it is necessary that the design should consider cultural values. They combine culture and usability into "culturability" and add that...
Article
Full-text available
The objective of the research is to investigate the effectiveness usages of Short Messaging System (SMS) as a supplementary learning tool in Open University Malaysia (OUM). The focus is on the project called mySMS, a service provide to the learners in the coming 2004 August Semester. This pilot project will involve 50 learners. Learners who are reg...
Article
Full-text available
The paper will share the experience of using the Open Source Software (OSS) in teaching and learning multimedia technology in an open and distance learning environment. OSS has been introduced because of costing, technology and legal implication factors in which these aspects assists in reducing the digital divide gap among learners particularly in...

Questions

Questions (3)
Question
Dear students, pls reply to the generic questions above. TQ
Question
I need your answers for the above question, an open ended question

Network

Cited By