GRANT(PI & MEMBERS)

17

PUBLICATIONS

44

INDEXED PUBLICATION

20

TOTAL STUDENTS

H-INDEXED (SCOPUS)

CITATIONS (SCOPUS)

Grant (PI)

NATIONAL GRANTS
2
UNIVERSITY FUND
4
TOTAL

Publications

INDEXED PUBLICATION
20
NON-INDEXED PUBLICATION
3
OTHERS PUBLICATION
21
TOTAL

Supervisions

MASTER
16
PHD
18
TOTAL

Legend : SPONSOR TYPE OF GRANT

Grant Name Year
ENTERPRISE ARCHITECTURE(EA) READINESS MEASUREMENT INSTRUMENT TO SUSTAIN EA INITIATIVES IN PUBLIC SECTORS
RUG OF UTM Tier 1
2015
MULTILAYER REVERSIBLE WATERMARKING IN MEDICAL IMAGES USING NON-UNDERFLOW DIFFERENCE EXPANSION
RUG OF UTM Tier 1
2015
Open Innovation: Leveraging Social Media in Co-creation of Value with the Customers
RUG OF UTM Tier 1
2015
Cryptography Technology For National Defense Industry
QUESTRANS SDN. BHD Business Entity
2015
Novel Computer Forensic Approach for Cloud Computing Environment
MINISTRY OF EDUCATION Fundamental Research Grant Scheme
2015
SECURITY MITIGATION BASED ON A NEW MODIFIED ALGORITHM TO PRESERVE USERS PRIVACY AND ANONYMITY
RUG OF UTM Tier 1
2014
KAJIAN ISU, CABARAN DAN KESAN MEDIA BARU TERHADAP SOSIO-EKONOMI DAN BUDAYA PENDUDUK KAMPONG BHARU 1900 - SEMARAK KASIH
RUG OF UTM Flagship
2014
Developing a Hybrid Model by Integrating Informative Parameter in Information Security Risk Analysis
MINISTRY OF EDUCATION Networking Grant
2014
INTEGRATED PRIVACY MODEL FOR PERSONAL MEDICAL INFORMATION IN HOSPITAL INFORMATION SYSTEM
RUG OF UTM Tier 1
2011
MODELLING e-PORTFOLIO AS AN ACADEMIC SERVICE INNOVATION IN A RESEARCH UNIVERSITY
RUG OF UTM Tier 2
2011
A New Digital Forensic Assessor Certification Framework Model
MINISTRY OF EDUCATION Fundamental Research Grant Scheme
2010
An Information Security Policy Framework for Malaysian Higher-Learning Institution
MINISTRY OF ENERGY, SCIENCE, TECHNOLOGY, ENVIRONEMNT AND CLIMATE CHANGE (MESTECC) Sciencefund
2008
Security Control and Analysis System
MINISTRY OF ENERGY, SCIENCE, TECHNOLOGY, ENVIRONEMNT AND CLIMATE CHANGE (MESTECC) Sciencefund
1992
The Study on Need of Management Audit Templates.
Short Term
1991
Developing of Function System as Needed by Management.
Short Term
1990
Pembangunan perisian Am Audit Komputer
Short Term
1990

Legend : PUBLICATION CATEGORY TYPE OF AUTHORS

Publication Name Year
Healthcare Employees' Perception On Information Privacy Concerns
5TH INTERNATIONAL CONFERENCE ON RESEARCH AND INNOVATION IN INFORMATION SYSTEMS, ICRIIS 2017
Publication In Scopus CO-AUTHOR
2017
A Qualitative Analysis Of Information Privacy Concerns Among Healthcare Employees
THE 7TH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY & MULTIMEDIA (ICIMU 2017)
Conference Paper CO-AUTHOR
2017
Towards Designing An Ea Readiness Instrument: A Systematic Review
4TH IEEE INTERNATIONAL COLLOQUIUM ON INFORMATION SCIENCE AND TECHNOLOGY, CIST 2016
Publication In Scopus UTM FIRST AUTHOR
2017
Technology Ethics Attributes In Handling Confidential Infpormation For The Armed Forces
JOURNALOF ADVANCED RESEARCH IN SOCIAL AND BEHAVIOURAL SCIENCES
Journal Article Non Citation-Indexed UTM FIRST AUTHOR
2016
A Systematic Literature Review On Safe Health Information Technology Use Behaviour
JURNAL TEKNOLOGI
Publication In Scopus UTM FIRST AUTHOR
2016
Safety And Privacy Issues Of Electronic Medical Records
INDIAN JOURNAL OF SCIENCE AND TECHNOLOGY
Publication In Scopus UTM FIRST AUTHOR
2016
Open Innovation And Social Media Use Towards Informatics Reporting: A Systematic Literature Review
JURNAL TEKNOLOGI
Publication In Web Of Science UTM FIRST AUTHOR
2016
Day Of The Year-Based Prediction Of Horizontal Global Solar Radiation By A Neural Network Auto-Regressive Model
THEORETICAL AND APPLIED CLIMATOLOGY
Publication In Web Of Science UTM FIRST AUTHOR
2016
The Adoption Of Open Innovation And Co-Creation In Malaysian Telecommunication Industry
ADVANCED SCIENCE LETTERS
Publication In Scopus UTM FIRST AUTHOR
2016
Ea Innovations In Managing Public Sectors: Issues & Challenges
27TH INTERNATIONAL BUSINESS INFORMATION MANAGEMENT ASSOCIATION 2016
Publication In Scopus UTM FIRST AUTHOR
2016
Classification Of Antecedents Towards Safety Use Of Health Information Technology: A Systematic Review
INTERNATIONAL JOURNAL OF MEDICAL INFORMATICS
Publication In Web Of Science UTM FIRST AUTHOR
2015
Information Security Culture:A Systematic Literature Review
PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON COMPUTING & INFORMATICS
Publication In Web Of Science CORRESPONDING AUTHOR
2015
Adapting Survival Analysis Approach In Risk Management Process
ISSUES IN ADVANCED INFORMATICS 1
Book Chapter CO-AUTHOR
2015
Safety Use Of Hospital Information Systems: A Preliminary Investigation
KNOWLEDGE MANAGEMENT IN ORGANIZATIONS
Book Chapter UTM FIRST AUTHOR
2015
Augmented Reality Story Books For Children
ISSUES IN ADVANCED INFORMATICS 2
Book Chapter CO-AUTHOR
2015
Social Media Appropriation In Informatics Reporting-A Systematic Literature Review
ADVANCED SCIENCE LETTERS
Publication In Scopus UTM FIRST AUTHOR
2015
Botnet Evolution : Network Traffic Indicators
2014 INTERNATIONAL SYMPOSIUM ON BIOMETICS AND SECUIRTY TECHNOLOGIES
Publication In Scopus UTM FIRST AUTHOR
2015
Awareness Of Multimedia Content Protection From Users Perspective
ISSUES IN ADVANCED INFORMATICS1
Book Chapter CORRESPONDING AUTHOR
2015
Understanding Relationship Between Security Culture And Knowledge Management
KNOWLEDGE MANAGEMENT INORGANIZATIONS LECTURE NOTES IN BUSINESS INFORMATION PROCESSING
Book Chapter CORRESPONDING AUTHOR
2014
Information Privacy Concerns In Electronic Medical Records: A Preliminary Investigation
KNOWLEDGE MANAGEMENT IN ORGANIZATIONS LECTURE NOTES IN BUSINESS INFORMATION PROCESSING
Book Chapter CORRESPONDING AUTHOR
2014
Enhanced Web Log Cleaning Algorithm For Intrusion Detection
RECENT ADVANCES IN INFORMATION & COMMUNICATION TECHNOLOGY
Book Chapter CORRESPONDING AUTHOR
2014
Knowledge Management Practice And Case Study
The 8th International Conference on Knowledge Management in Organizations: Social and Big Data Computing for Knowledge Management
Book Chapter UTM FIRST AUTHOR
2014
Investigation Of Key Resistance Factors In Knowledge Sharing For Promoting Information Security Culture In Healthcare Organization
8TH INTERNATIONAL CONFERENCE KNOWLEDGE MANAGEMENT IN ORGANIZATION 2014. SOCIAL & BIG DATA COMPUTING FOR KNOWLEDGE MANAGEMENT
Book Chapter UTM FIRST AUTHOR
2014
Calculating Trust Value In Information Propagation For Online Social Network Sites
INTERNATIONAL JOURNAL OF ENGINEERING AND TECHNICAL RESEARCH
Journal Article Non Citation-Indexed CO-AUTHOR
2014
Privacy Challenges In Electronic Medical Records: A Systematic Review
PROCEEDING OF KNOWLEDGE MANAGEMENT INTERNATIONAL CONFERENCE (KMICE) 2014
Proceedings CORRESPONDING AUTHOR
2014
Antecedents For Safety In Health It: An Exploratory Investigation
2014 INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY AND MULTIMEDIA
Proceedings CORRESPONDING AUTHOR
2014
Factors Affecting Security Perception In Online Purchase Intention
ADVANCED SCIENCE LETTERS
Publication In Scopus CORRESPONDING AUTHOR
2014
Information Privacy Concerns In The Use Of Social Media Among Healthcare Practitioners: A Systematic Review
ADVANCED SCIENCE LETTERS
Publication In Scopus CORRESPONDING AUTHOR
2014
A Review On Barriers In Adopting Healthcare Informatio Systems
ADVANCED SCIENCE LETTERS
Publication In Scopus CORRESPONDING AUTHOR
2014
Constructing An Adoption Model For E-Government Services
JURNAL TEKNOLOGI (SCIENCES AND ENGINEERING)
Publication In Scopus UTM FIRST AUTHOR
2014
Security Culture And Security Awareness As The Basic Factors For Security Effectiveness In Health Information Systems
JURNAL TEKNOLOGI (SCIENCES AND ENGINEERING)
Publication In Scopus UTM FIRST AUTHOR
2013
Development Of Malaysian'S Digital Forensics Investigation Training/Education Programs Quality Assurance And Accreditation
2012 INTERNATIONAL CONFERENCE ON E-LEARNING AND E-TECHNOLOGIES IN EDUCATION (ICEEE)
Publication In Web Of Science CO-AUTHOR
2012
Security Effectiveness In Health Information System: Through Improving The Human Factors By Education And Training
AUSTRALIAN JOURNAL OF BASIC AND APPLIED SCIENCES
Publication In Scopus UTM FIRST AUTHOR
2012
Trainees' Competency Based-Assessment Methods In Cyber Forensics Education Or Training Programmes - A Review
THE SECOND INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING AND COMPUTER SYSTEM (ICSESC2011)
Publication In Scopus CO-AUTHOR
2011
Cyber Forensics Competency-Based Framework : A Review
INTERNATIONAL JOURNAL ON NEW COMPUTER ARCHITECTURES AND THEIR APPLICATIONS (IJNCAA)
Journal Article Non Citation-Indexed CO-AUTHOR
2011
Analysing The Quality Assurance Of Trainees' Competency Assessment And Accreditation Of Cyber Forensic Education Or Training Programs
THE THIRD INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND COMPUTING (ICMLC2011)
Proceedings CO-AUTHOR
2011
A Framework For Level Of Service Delivery Of Outsourced It Projects: Providers' Perspective
IT Outsourcing Success Framework: Malaysia's Insight
Book Chapter INDIVIDUAL AUTHOR
2008
Post Hoc Analysis: Partnership Quality In It Outsourcing
IT Outsourcing Success Framework: Malaysia's Insight
Book Chapter INDIVIDUAL AUTHOR
2008
Examining The Influence Of Demographic Factors On Ethical Awareness: Computer Use And Security
The Tenth Ethicomp International
Conference Paper INDIVIDUAL AUTHOR
2008
Examining The Influence Of Demographic Factors On Ethical Awareness: Computer Use And Security
The Tenth Ethicomp International
Conference Paper INDIVIDUAL AUTHOR
2008
Examining It Outsourcing Success Constructs
IT Outsourcing Success Framework: Malaysia's Insight
Book Chapter INDIVIDUAL AUTHOR
2008
Likely Antecedents Of It Outsourcing Success
IT Outsourcing Success Framework: Malaysia's Insight
Book Chapter INDIVIDUAL AUTHOR
2008
Information Technology Outsourcing Practices Among Malaysian Organizations
IT Outsourcing Success Framework: Malaysia's Insight
Book Chapter INDIVIDUAL AUTHOR
2008
Paradigma Shift: Oursourcing Decision Bandwagon
IT Outsourcing Success Framework: Malaysia's Insight
Book Chapter INDIVIDUAL AUTHOR
2008

Legend : IP CATEGORY IP LEVEL

Intellectual Property Name Grant Register No. IP Level IP Category
DAMA FRAMEWORK FOR INFORMATION SECURITY AND ETHICS IN EDUCATIONAL CONTEXT NATIONAL PATENT
DESIGN OF BLACK HORN FOR ULTRASONIC TENSION TEST SURAT MAKLUMAN KPD INVENTOR - 153 (76) - 5/4/2021 MY-182569-A NATIONAL PATENT
AN EXAMINATION OF SMART CARD ACCEPTANCE : SECURITY, TECHNOLOGY AND USAGE NATIONAL PATENT
MODELING COMPUTER USE ETHICS IN ACADEMIC SETTING USING THE SCENARIO METHOD NATIONAL PATENT
A MODEL OF ETHICAL AWARENESS FOR COMPUTER USE AND SECURITY NATIONAL PATENT
AN INTEGRATIVE MODEL WITH MEDIATING IMPACT ON IT OUTSOURCING SUCCES NATIONAL PATENT
DESIGN INTEGRATED MODEL FOR SAFE USE OF HOSPITAL INFORMATION SYSTEMS HIS BASED ON SOCIOTECHNICAL PERSPECTIVE LY2016003905 NATIONAL COPYRIGHT
SOAL KAJI SELIDIK UNTUK PROJEK KAJIAN ISU, CABARAN DAN KESAN MEDIA BARU TERHADAP SOSIO-EKONOMI DAN BUDAYA PENDUDUK KAMPONG BHARU 1900-SEMARAK KASIH - NATIONAL COPYRIGHT
INSTRUMENT MEASURING NON TECHNICAL APPROACH TO MULTI LAYERED NETWORK SECURITY AGAINTS MALWARE NATIONAL COPYRIGHT
INSTRUMENT FOR INFORMATION SECURITY POLICY FRAMEWORK PRACTICES FOR MALAYSIAN HIGHER LEARNING INSTITUTION (HLI) NATIONAL COPYRIGHT
DEVELOPMENT OF IT -BASED INSTRUMENTS FOR MEASURING THE EFFECTIVENESS ACTIVE LEARNING AND QUALITY OF STUDENT LEARNING - NATIONAL COPYRIGHT
AN ETHICAL ASSESSMENT OF COMPUTER ETHICS: SCENARIO METHOD NATIONAL COPYRIGHT
COMPUTER SECURITY AND COMPUTER ETHICS AWARENESS: A COMPONENT OF MANAGEMENT INFORMATION SYSTEM NATIONAL COPYRIGHT
INSTRUMENT FOR MEASURING USERS PERCEPTION ON INFORMATION SECURITY POLICY AT INSTITUTE OF HIGHER LEARNING NATIONAL COPYRIGHT

Legend : SESSION LEVEL OF STUDY STATUS SUPERVISION LEVEL

Supervision List
GANTHAN A/L NARAYANA SAMY
ANALYSING INFORMATION SECURITY THREATS IN HEALTHCARE INFORMATION SYSTEMS USING SURVIVAL ANALYSIS METHOD
PHD GRADUATED CO-SUPERVISOR 2011
ELFADIL SABEIL MOHAMED ALI
DIGITAL FORENSICS PROFESSIONALS COMPETENCY-BASED CURRICULUM'S PROCEDURES
PHD GRADUATED CO-SUPERVISOR 2012
MAZIAR SHAJARI
ADOPTION MODEL FOR IRAN E-GOVERNMENT SERVICES FROM THE EMPLOYEES' PERSPECTIVES
PHD GRADUATED SUPERVISOR 2012
SUHAILA BINTI SAMSURI
THE PRIVACY MODEL FOR PERSONAL MEDICAL IN HOSPITAL INFORMATION SYSTEM
PHD GRADUATED SUPERVISOR 2013
AHMAD BAKHTIYARI SHAHRI
A SECURITY EFFECTIVENESS MODEL FOR HEALTH INFORMATION SYSTEMS IN IRANIAN HOSPITALS BASED ON USER BEHAVIOURS
PHD GRADUATED SUPERVISOR 2014
FATEMEH MESKARAN
THE EFFECT OF PERCEIVED TRUST, PERCEIVED SECURITY AND ATTITUDE ON ONLINE PURCHASE INTENTION IN MALAYSIAN PUBLIC UNIVERSITIES
PHD GRADUATED SUPERVISOR 2015
MUNIRUL ULA
ENHANCED APPROACH FOR EVALUATING INFORMATION SECURITY GOVERNANCE IMPLEMENTATION IN INDONESIAN BANKING ENVIRONMENT
PHD GRADUATED CO-SUPERVISOR 2015
LIZAWATI BINTI SALAHUDDIN
ANTECEDENTS OF SAFE USE OF HOSPITAL INFORMATION SYSTEMS BASED ON SOCIOTECHNICAL PERSPECTIVE
PHD GRADUATED SUPERVISOR 2016
NOOR HAFIZAH BINTI HASSAN
FACTORS INFLUENCING INFORMATION SECURITY CULTURE AMONG HEALTHCARE PROFESSIONAL
PHD GRADUATED SUPERVISOR 2016
FIZA BINTI ABDUL RAHIM
INFORMATION PRIVACY CONCERNS IN THE USE OF ELECTRONIC MEDICAL RECORDS
PHD GRADUATED SUPERVISOR 2016
JAMALUDDIN BIN JASMIS
TRACEABILITY APPROACH FOR CONFLICT DISSOLUTION IN HANDLING REQUIREMENTS CROSSCUTTING
PHD GRADUATED CO-SUPERVISOR 2016
SANAZ KAVIANPOUR
ENHANCING PRIVACY ON SOCIAL NETWORK SITES USING CLASSIFICATION AND ANONYMISATION
PHD GRADUATED SUPERVISOR 2017
SOHRAB KHAN
ANTECEDENTS OF TRUST USING EXTENDED TECHNOLOGY ACCEPTANCE MODEL FOR GOVERNMENT SOCIAL MEDIA SERVICES
PHD GRADUATED CO-SUPERVISOR 2019
SURYA SUMARNI BINTI HUSSEIN
READINESS ASSESSMENT MODEL IN SUPPORTING ENTERPRISE ARCHITECTURE ESTABLISHMENT FOR MALAYSIAN PUBLIC SECTOR
PHD GRADUATED CO-SUPERVISOR 2020
MOHAMMAD REZA ROSTAMI
BEHAVIOUR-BASED ANALYSIS AND DETECTION OF BOTNETS BY COMMAND AND CONTROL CHANNELS THROUGH NETWORK TRAFFIC AGGREGATION
PHD GRADUATED CO-SUPERVISOR 2020
MARLITA MAT YUSOF
OPEN INNOVATION THROUGH CUSTOMER CO-CREATION USING SOCIAL MEDIA IN TELECOMMUNICATION FROM INTERNAL CUSTOMER PERSPECTIVE
PHD GRADUATED CO-SUPERVISOR 2024
SALIMA OMAR M. HAMAD
ANOMALY BASED IDS FOR UNLABEL DATA
MASTER GRADUATED SUPERVISOR 2007
ELFADIL SABEIL MOHAMED ALI

MASTER GRADUATED CO-SUPERVISOR 2009
MALAHAT POURAN SAFAR

MASTER GRADUATED CO-SUPERVISOR 2012
MOHD ZAIRUSHAM BIN ZAINAL
FACTORS INFLUENCING SECURITY MEASURES IN IT OUTSOURCING
MASTER GRADUATED SUPERVISOR 2013
NOR FAZLINDA BINTI MOHD PUAD

MASTER GRADUATED SUPERVISOR 2014
NURUL AIN BINTI BASRI

MASTER GRADUATED SUPERVISOR 2014
ABDULLAHI MOHAMED ALI

MASTER GRADUATED SUPERVISOR 2014
MOHAMAD ROSHIDI BIN ROZALI

MASTER GRADUATED SUPERVISOR 2014
ABDULQADER ABDULELAH AHMED BA HAMID

MASTER GRADUATED SUPERVISOR 2015
IBRAHIM NAAIF

MASTER GRADUATED SUPERVISOR 2015
YAT GUO QUAN

MASTER GRADUATED SUPERVISOR 2015
NOR AZREEN BINTI ZAKARIA

MASTER GRADUATED SUPERVISOR 2015
NAZARUDDIN BIN AHMAD

MASTER GRADUATED SUPERVISOR 2016