Journal of Telecommunication, Electronic and Computer Engineering, 2017
The many promised benefits of SOA adoption have attracted numerous organizations to adopt SOA. Th... more The many promised benefits of SOA adoption have attracted numerous organizations to adopt SOA. These SOA adoption benefits have been identified by the previous researchers and can be distinguished into IT and business benefits. However, this study found that there is a lack of work that provide a method on how to construct the matrix for evaluating the SOA adoption focuses on both IT and business benefits. Therefore, this study aims to provide a method that can be used to construct a cross evaluation matrix focuses on SOA adoption IT and business benefits. This study first determines the IT and business benefits characteristics and sub-characteristics in order to provide the evaluation criteria for evaluating the SOA adoption. Then this study adapted Kano Model in order to construct the cross evaluation matrix between IT and business benefits. The findings implies that Kano Model is appropriate to be used as the underlying structure to construct the cross evaluation matrix in this s...
Kajian ini bertujuan mengkaji tahap pendidikan dan penggunaan komputer di sekolah menengah di Neg... more Kajian ini bertujuan mengkaji tahap pendidikan dan penggunaan komputer di sekolah menengah di Negeri Kedah Darul Aman.Sejumlah 78 buah sekolah (94.0%) telah mempunyai peralatan komputer dan 61 buah sekolah (76.3%) telah menubuhkan kelab komputer.Hanya 4.8% sekolah di luar bandar yang belum mempunyai peralatan komputer.Didapati guru yang terlibat dengan kelab komputer adalah kurang daripada 15.0%.Penasihat kelab merupakan bidang tugas yang paling ramai (52.6%) disandang oleh guru berbanding dengan bidang tugas sebagai tenaga pengajar (29.0%) dan AJK kelab komputer ( 1 8.4%).Sepanjang penglibatan guru dalam kelab komputer, ada guru yang tidak pernah mengikuti sebarang kursus komputer.Majoriti guru (89.0%) yang pernah mengikuti kursus komputer merasakan kursus yang diikuti tidak mencukupi.Secara keseluruhannya guru kelab komputer sederhana mahir mengendalikan perisian grafik dan kurang mahir menggunakan perisian pemprosesan perkataan, lembaran kerja dan pangkalan data.
Journal of Telecommunication, Electronic and Computer Engineering, 2016
Problem-based learning (PBL) is a powerful learning approach that leads to enhance and sustain le... more Problem-based learning (PBL) is a powerful learning approach that leads to enhance and sustain learning towards student centered, problem focused, self-reflective learning, and self-directed learning. This may improve student ability in problem solving, critical thinking, work as a teamwork, and leadership. All these soft skills are important to IT students as a preparation for their future career development. Unfortunately, there is no statistical evidence to support the effectiveness of the PBL implementation as claim by many researchers. Therefore, the top management of Higher Education Institution (HEI) is really concerned with the effectiveness of the Problem-based Learning (PBL) implementation of certain courses in the university. The effectiveness of the PBL implementation is actually depends on the best practices of the PBL implementation of the IT courses. Thus, this study aims to identify the factors and the relationship among factors that influence the best practices of P...
Journal of Telecommunication, Electronic and Computer Engineering, 2016
A number of projects have failed in software industry due to exceeding budget and schedule. The m... more A number of projects have failed in software industry due to exceeding budget and schedule. The main reason for most project failure is poor performance of their development team, in which the team performance is affected by a number of factors. The main objective of this study is to identify the factors that have significant effect on the performance of the software development team. A set of questionnaire has been distributed to a sample of software developers in telecommunication industries in Iraq and Kurdistan Region Government (KRG) using stratified sampling technique. The analysis of the data was carried out using Structural Equation Modeling (SEM) to examine the relationship between the identified factors and the performance on software development team. The results prove that coordination of expertise; communication and mutual support positively affect the performance of software development team.
Journal of Telecommunication, Electronic and Computer Engineering, 2016
Team roles play significant impact in determining the project success. In order to ensure that te... more Team roles play significant impact in determining the project success. In order to ensure that team can work together, it is essential to ensure that the team members are assigned to the right role with the right characteristics. One of the prevalent team roles is Belbin team role. The team role can guide project manager to form effective team. However, assigning the correct team role is very challenging. Thus, this study demonstrates the use of fuzzy technique to form a software team based on Belbin team role. By using this technique, it can help decision maker to form effective team that have balance characteristics. In order to validate the proposed technique, future works will be carried out by using empirical data in industrial setting
Customer Relationship Management (CRM) System is very important to enhance healthcare services, i... more Customer Relationship Management (CRM) System is very important to enhance healthcare services, improve cost-effectiveness, and accessibility of the healthcare.Therefore, study of the adoption of the CRM in healthcare at organizational level is necessary to identify factors that influence the CRM adoption.Hence, this study aims at proposing an extended adoption model of CRM systems in Malaysian private hospitals. Finding from previous studies show that the adoption factors may be influenced by innovation, organizational, and environmental factors to the perception, adoption, and implementation of CRM system. The theoretical foundations of the model is based on Innovation Diffusion Theory (IDT) and Model of Information System Innovation (ISI). Survey and interview techniques were utilized to validate the proposed extended adoption model of CRM systems. The data collected were analyzed using Structural Equation Model(SEM).The model is beneficial to the healthcare at organizational lev...
Service-oriented architecture (SOA) maturity model is a model that can be used to guide the SOA a... more Service-oriented architecture (SOA) maturity model is a model that can be used to guide the SOA adoption.There are several SOA maturity models that have been constructed by the previous researchers.However, most of the existing models are focused on what to evaluate rather than how to perform the evaluation.Therefore, the aim of this study is to propose a conceptual model for SOA adoption maturity evaluation.This study reviewed and investigated the existing models in order to identify the issues and current implementation of the SOA maturity model.The findings implied that there is a lack of SOA maturity models that evaluated on the SOA adoption and focused specifically on both IT and business benefits.Furthermore, the existing models also do not provide any details on how to evaluate the maturity of SOA adoption. As a result, this study proposed a conceptual model for SOA adoption maturity evaluation that also consist of a tool to assess the maturity of SOA adoption.
The implementation of Electronic Medical Record (EMR) in Jordan public hospitals has started sinc... more The implementation of Electronic Medical Record (EMR) in Jordan public hospitals has started since 2009.The motivation of doing this study is to observe doctors’ acceptance of EMR in Jordanian public hospitals.This study aims at constructing doctors’ acceptance model of EMR using Technology Acceptance Model (TAM) based on individual capabilities.The model will apply TAM as the basic theory and extending Self-Efficacy (SE) and Perceived Behavioral Control (PBC) as two factors of individual characteristics. Initial findings show that the main factors of the model should compose of Perceived Usefulness, Perceived Ease of Use, Behavioral Intention to Use, Self-Efficacy, and Perceived Behavioral Control.The result of the pilot test shows that all factors are reliable with Cronbach Alpa 0.838.The recommendation to the top management of healthcare organization, in order to increase doctors’ acceptance of EMR, that the new deployment of EMR should focus on delivering awareness and continuou...
The implementation of CRM systems has become very necessary for organizations in order to effecti... more The implementation of CRM systems has become very necessary for organizations in order to effectively manage their relationships with the customers.Unfortunately, it has faced various failures in different industries. Besides, the existence of implementation methodologies or frameworks that guide the successful implementation of CRM systems are still lacking. In response to that, this paper aims to critically review the methodologies of the existing implementation of CRM system and to comprehensively suggest a set of principles and guidelines for the successful implementation plan of CRM systems.In accordance, this paper compares three most famous CRM implementation methodologies; CRM-iris methodology, CRM-six sigma methodology, and Jun-Wu methodology. As a result, a set of implementation principles and guidelines are suggested to be taken into consideration in the implementation of CRM systems.These principles and guidelines could be tested empirically in the future for the general...
E-procurement or Internet-based procurement system is the system that let buyers combine catalogs... more E-procurement or Internet-based procurement system is the system that let buyers combine catalogs from several suppliers, check the availability of items, place and track orders and initiate payment via the Internet.At present, most Internet-based procurement systems are still in a very early stage and most importantly, there is no system available to implement e-procurement system especially tailored toward the requirements of small government departments.In order to support the procurement activities through the Internet, this paper provides a reference model for e-procurement system aimed specially at the requirements of small government departments.Development of the reference model is important so that it can provide guidelines and serve as a good starting point to understand user’s and system’s requirements and assist system development in a particular industry.
Tendering process is utilized by principal to invited capable tenderer to participate in competit... more Tendering process is utilized by principal to invited capable tenderer to participate in competitive bid for winning a large project. Due to advent of IT infrastructure, E-tendering is introduced and adopted in many countries. Yet, an electronic environment did not promise curbing collusion between principal and certain tenderers. Other than common threats to system like security breaches by malicious parties, security issue related to ethical issue like fraud and repudiation issue where no evidence existed to denied it. In this paper, common threats for etendering process altogether with security countermeasure are described. This three interrelated attribute (consist of tender phase, threat and security countermeasure) are illustrated in misuse case for better understanding of the risk that may occurs in particular tender phase. Furthermore, it sought to ease the system developer for designing and constructing a secure e-tendering system. Keyword: e-Tendering, Security threats and...
The aim of this study was to identify the factors that might influence perception about the benef... more The aim of this study was to identify the factors that might influence perception about the benefits of a Customer Relationship Management (CRM) system, and the direction of this influence in private hospitals in Malaysia.Three factors (innovation, organizational, and environmental factors) were identified as influencing perception about the benefits of a CRM system.The study deployed a quantitative research approach, using a questionnaire to collect data.Private hospitals in the northern part of Malaysia were selected using the area sampling method and convenience sampling, and the management of the hospitals became the target respondents.For the survey, the research questionnaire was distributed to the sample of the study and each respondent was given a month to complete the questionnaire.The collected data was analyzed using Backward Multiple Regression Analysis.The results revealed that innovation and environmental factors had a positive significant relationship on perception, w...
Even though the Electronic Medical Record(EMR) projects have been going on for many years, with m... more Even though the Electronic Medical Record(EMR) projects have been going on for many years, with many groups of stakeholders involved, it was found that there was no clear guidelines in terms of the stak eholders’ role in the EMR projects.This paper attempts to fill in the gap in the existing implementation plan by introducing the pre-implementation framework for the EMR projects.This framework focuses on the role and responsibilities of all the stakeholders that have been identified from the literature. Six stakeholders are involved in the EMR projects:- 1) the Government, 2)the healthcare organization, 3) the IT personnel, 4) the end-users, 5) the healthcare application developer, and 6) the suppliers. The pre-implementation framework for the ERM project was constructed by using the Activity Diagram with the Unified Modeling Language (UML) notation to show the clear roles of all stakeholders. This paper also describes four elements involved in the pre-implementation framework:- 1)P...
Journal of Telecommunication, Electronic and Computer Engineering, 2016
Rapid growths of computers, mobile phones and Internet technology have created ways for irrespons... more Rapid growths of computers, mobile phones and Internet technology have created ways for irresponsible people to undertake computer crimes. Millions of users across the globe have fallen as victims to computer crimes, including Malaysia. It is due to current software environment which is more complex, distributed, keeps confidential data and easily exposed to malicious attacks. Consequently, secure software process is increasingly gaining much importance among software practitioners and researchers. However, even though its importance has been revealed, only few studies were conducted regarding its current practice in the software industry, especially in Malaysia. Thus, an exploratory study is conducted among software practitioners in Malaysia to study their experiences and practices on the secure software process in the real-world projects. This paper discusses the findings from the study, which involved 93 software practitioners. Structured questionnaire is utilized for data collec...
The purpose of this study is to construct doctors’ acceptance model of Electronic Medical Records... more The purpose of this study is to construct doctors’ acceptance model of Electronic Medical Records (EMR) in private hospitals.The model extends the Technology Acceptance Model (TAM) with two factors of Individual Capabilities; Self-Efficacy (SE) and Perceived Behavioral Control (PBC).The initial findings proposes additional factors over the original factors in TAM making Perceived Usefulness (PU), Perceived Ease Of Use (PEOU), Behavioral Intention to use (BI), SE, and PBC working in incorporation.A cross-sectional survey was used in which data were gathered by a personal administered questionnaire as the instrument for data collection.Doctors of public hospitals were involved in this study which proves that all factors are reliable.
Journal of Telecommunication, Electronic and Computer Engineering, 2017
Software testing is a necessary and essential part of the software quality process and plays a ma... more Software testing is a necessary and essential part of the software quality process and plays a major role in detecting errors in systems. To improve the effectiveness of test case generation during software testing, and with the growing adoption of UML by software developers and researchers, many studies have focused on the automation of test case generation from UML diagrams. One of these diagrams is the UML state chart diagram. These test cases are generally generated to achieve certain coverage criteria. However, combinations of multiple criteria are required to achieve better coverage. Different studies use various number and type of coverage criteria in their methods and approaches. This paper reviews previous studies to present the most practical coverage criteria combinations for UML state chart diagram, including all-states, all-transitions, all-transition-pairs and all-loop-free-paths coverage. A special calculation is necessary to determine the coverage percentage of the p...
Many mobile health (m-health) applications have been developed in recent years. However, only few... more Many mobile health (m-health) applications have been developed in recent years. However, only few statistical evidences on the acceptability and usability issues have been discussed by previous studies. In addition, the requirements for the chronic disease applications are often overlooked. Failure to include the requirements has led to the rejection of the m-health applications. The existing usability evaluation models consist only the general dimensions for evaluating mobile applications, which are unable to capture the complexities of different categories of mobile applications. Such categories require different functional and nonfunctional requirements; thus, customized usability evaluation models are required. The main objective of this paper is to provide usability dimensions and measurement to evaluate the chronic disease mhealth applications users’ requirements. The related data were gathered by interviewing selected users and analyzed using Nvivo. The Systematics Literature...
As far as the development of youth community is concerned, the implementation of a dedicated deci... more As far as the development of youth community is concerned, the implementation of a dedicated decision aid is believed to have ample potentials in building their skills in making decisions.The absence of proper guidance in making crucial decisions could cause irreversible effects to youth’s future and consequently to the development plan of the country.Accordingly, this study focuses on the development of a computerized personal decision aid for youth named as Youth Personal Decision Aid (YouthPDA).The aid manifests the integration of Personality Traits (PT) and Multiple Intelligence (MI) data in a contextual aware recommender system.The system uses Rule Based Reasoning (RBR) that will display the recommendations based on set of programmed rules. This paper also discusses findings from helpfulness evaluation of YouthPDA, which comprises of four dimensions; reliability, decision-making effort, confidence, and decision process awareness. The mean value for each dimension (which is >...
Service-oriented Architecture (SOA) maturity model is a benchmark for evaluating and assessing th... more Service-oriented Architecture (SOA) maturity model is a benchmark for evaluating and assessing the maturity of SOA adoption. Several of SOA maturity models have been constructed by the academia and industry. However, these models contradict with each other in determining “what” need to be assessed in SOA adoption. Therefore, the aims of this study is to review and compare the existing SOA maturity models that were commonly referred such as SOAMM, SIMM, CSOAMM, Inaganti’s Model, iSOAMM, Welke’s Model and SOASMM in order to determine which model should be enhanced to reflect the true definition of SOA. The findings implies that the existing models have their own strengths and weaknesses and based on these findings, this study identify that Welke’s model is the most suitable model that should be enhanced. This study has successfully analyze the existing models and identify an issue that deserve future investigation such as the need to provide two dimensional evaluations for both IT ben...
The use of high quality test cases enable the detection of software defect which eventually helps... more The use of high quality test cases enable the detection of software defect which eventually helps in ensuring the quality of software before being released to end users. Unfortunately, at the moment, the criteria of good test cases are still vague without any specific model to measure the quality of the test cases. Therefore, this study aims to identify the criteria of good test cases based on the findings from studies conducted within the years 2010 to 2018. The Systematic Literature Review (SLR) by Kitchenham approach was adapted in order to comprehensively identify the related criteria. From the review, a total of 310 related articles were found from the IEEE Xplore, ACM Digital Library, and Science Direct databases. The search was then narrowed down using specific key-words and as a result the number relevant articles ended up to 14.From the review of these articles, 30 quality factors of the test cases were identified. These quality factors were further examined, categorized an...
Journal of Telecommunication, Electronic and Computer Engineering, 2017
The many promised benefits of SOA adoption have attracted numerous organizations to adopt SOA. Th... more The many promised benefits of SOA adoption have attracted numerous organizations to adopt SOA. These SOA adoption benefits have been identified by the previous researchers and can be distinguished into IT and business benefits. However, this study found that there is a lack of work that provide a method on how to construct the matrix for evaluating the SOA adoption focuses on both IT and business benefits. Therefore, this study aims to provide a method that can be used to construct a cross evaluation matrix focuses on SOA adoption IT and business benefits. This study first determines the IT and business benefits characteristics and sub-characteristics in order to provide the evaluation criteria for evaluating the SOA adoption. Then this study adapted Kano Model in order to construct the cross evaluation matrix between IT and business benefits. The findings implies that Kano Model is appropriate to be used as the underlying structure to construct the cross evaluation matrix in this s...
Kajian ini bertujuan mengkaji tahap pendidikan dan penggunaan komputer di sekolah menengah di Neg... more Kajian ini bertujuan mengkaji tahap pendidikan dan penggunaan komputer di sekolah menengah di Negeri Kedah Darul Aman.Sejumlah 78 buah sekolah (94.0%) telah mempunyai peralatan komputer dan 61 buah sekolah (76.3%) telah menubuhkan kelab komputer.Hanya 4.8% sekolah di luar bandar yang belum mempunyai peralatan komputer.Didapati guru yang terlibat dengan kelab komputer adalah kurang daripada 15.0%.Penasihat kelab merupakan bidang tugas yang paling ramai (52.6%) disandang oleh guru berbanding dengan bidang tugas sebagai tenaga pengajar (29.0%) dan AJK kelab komputer ( 1 8.4%).Sepanjang penglibatan guru dalam kelab komputer, ada guru yang tidak pernah mengikuti sebarang kursus komputer.Majoriti guru (89.0%) yang pernah mengikuti kursus komputer merasakan kursus yang diikuti tidak mencukupi.Secara keseluruhannya guru kelab komputer sederhana mahir mengendalikan perisian grafik dan kurang mahir menggunakan perisian pemprosesan perkataan, lembaran kerja dan pangkalan data.
Journal of Telecommunication, Electronic and Computer Engineering, 2016
Problem-based learning (PBL) is a powerful learning approach that leads to enhance and sustain le... more Problem-based learning (PBL) is a powerful learning approach that leads to enhance and sustain learning towards student centered, problem focused, self-reflective learning, and self-directed learning. This may improve student ability in problem solving, critical thinking, work as a teamwork, and leadership. All these soft skills are important to IT students as a preparation for their future career development. Unfortunately, there is no statistical evidence to support the effectiveness of the PBL implementation as claim by many researchers. Therefore, the top management of Higher Education Institution (HEI) is really concerned with the effectiveness of the Problem-based Learning (PBL) implementation of certain courses in the university. The effectiveness of the PBL implementation is actually depends on the best practices of the PBL implementation of the IT courses. Thus, this study aims to identify the factors and the relationship among factors that influence the best practices of P...
Journal of Telecommunication, Electronic and Computer Engineering, 2016
A number of projects have failed in software industry due to exceeding budget and schedule. The m... more A number of projects have failed in software industry due to exceeding budget and schedule. The main reason for most project failure is poor performance of their development team, in which the team performance is affected by a number of factors. The main objective of this study is to identify the factors that have significant effect on the performance of the software development team. A set of questionnaire has been distributed to a sample of software developers in telecommunication industries in Iraq and Kurdistan Region Government (KRG) using stratified sampling technique. The analysis of the data was carried out using Structural Equation Modeling (SEM) to examine the relationship between the identified factors and the performance on software development team. The results prove that coordination of expertise; communication and mutual support positively affect the performance of software development team.
Journal of Telecommunication, Electronic and Computer Engineering, 2016
Team roles play significant impact in determining the project success. In order to ensure that te... more Team roles play significant impact in determining the project success. In order to ensure that team can work together, it is essential to ensure that the team members are assigned to the right role with the right characteristics. One of the prevalent team roles is Belbin team role. The team role can guide project manager to form effective team. However, assigning the correct team role is very challenging. Thus, this study demonstrates the use of fuzzy technique to form a software team based on Belbin team role. By using this technique, it can help decision maker to form effective team that have balance characteristics. In order to validate the proposed technique, future works will be carried out by using empirical data in industrial setting
Customer Relationship Management (CRM) System is very important to enhance healthcare services, i... more Customer Relationship Management (CRM) System is very important to enhance healthcare services, improve cost-effectiveness, and accessibility of the healthcare.Therefore, study of the adoption of the CRM in healthcare at organizational level is necessary to identify factors that influence the CRM adoption.Hence, this study aims at proposing an extended adoption model of CRM systems in Malaysian private hospitals. Finding from previous studies show that the adoption factors may be influenced by innovation, organizational, and environmental factors to the perception, adoption, and implementation of CRM system. The theoretical foundations of the model is based on Innovation Diffusion Theory (IDT) and Model of Information System Innovation (ISI). Survey and interview techniques were utilized to validate the proposed extended adoption model of CRM systems. The data collected were analyzed using Structural Equation Model(SEM).The model is beneficial to the healthcare at organizational lev...
Service-oriented architecture (SOA) maturity model is a model that can be used to guide the SOA a... more Service-oriented architecture (SOA) maturity model is a model that can be used to guide the SOA adoption.There are several SOA maturity models that have been constructed by the previous researchers.However, most of the existing models are focused on what to evaluate rather than how to perform the evaluation.Therefore, the aim of this study is to propose a conceptual model for SOA adoption maturity evaluation.This study reviewed and investigated the existing models in order to identify the issues and current implementation of the SOA maturity model.The findings implied that there is a lack of SOA maturity models that evaluated on the SOA adoption and focused specifically on both IT and business benefits.Furthermore, the existing models also do not provide any details on how to evaluate the maturity of SOA adoption. As a result, this study proposed a conceptual model for SOA adoption maturity evaluation that also consist of a tool to assess the maturity of SOA adoption.
The implementation of Electronic Medical Record (EMR) in Jordan public hospitals has started sinc... more The implementation of Electronic Medical Record (EMR) in Jordan public hospitals has started since 2009.The motivation of doing this study is to observe doctors’ acceptance of EMR in Jordanian public hospitals.This study aims at constructing doctors’ acceptance model of EMR using Technology Acceptance Model (TAM) based on individual capabilities.The model will apply TAM as the basic theory and extending Self-Efficacy (SE) and Perceived Behavioral Control (PBC) as two factors of individual characteristics. Initial findings show that the main factors of the model should compose of Perceived Usefulness, Perceived Ease of Use, Behavioral Intention to Use, Self-Efficacy, and Perceived Behavioral Control.The result of the pilot test shows that all factors are reliable with Cronbach Alpa 0.838.The recommendation to the top management of healthcare organization, in order to increase doctors’ acceptance of EMR, that the new deployment of EMR should focus on delivering awareness and continuou...
The implementation of CRM systems has become very necessary for organizations in order to effecti... more The implementation of CRM systems has become very necessary for organizations in order to effectively manage their relationships with the customers.Unfortunately, it has faced various failures in different industries. Besides, the existence of implementation methodologies or frameworks that guide the successful implementation of CRM systems are still lacking. In response to that, this paper aims to critically review the methodologies of the existing implementation of CRM system and to comprehensively suggest a set of principles and guidelines for the successful implementation plan of CRM systems.In accordance, this paper compares three most famous CRM implementation methodologies; CRM-iris methodology, CRM-six sigma methodology, and Jun-Wu methodology. As a result, a set of implementation principles and guidelines are suggested to be taken into consideration in the implementation of CRM systems.These principles and guidelines could be tested empirically in the future for the general...
E-procurement or Internet-based procurement system is the system that let buyers combine catalogs... more E-procurement or Internet-based procurement system is the system that let buyers combine catalogs from several suppliers, check the availability of items, place and track orders and initiate payment via the Internet.At present, most Internet-based procurement systems are still in a very early stage and most importantly, there is no system available to implement e-procurement system especially tailored toward the requirements of small government departments.In order to support the procurement activities through the Internet, this paper provides a reference model for e-procurement system aimed specially at the requirements of small government departments.Development of the reference model is important so that it can provide guidelines and serve as a good starting point to understand user’s and system’s requirements and assist system development in a particular industry.
Tendering process is utilized by principal to invited capable tenderer to participate in competit... more Tendering process is utilized by principal to invited capable tenderer to participate in competitive bid for winning a large project. Due to advent of IT infrastructure, E-tendering is introduced and adopted in many countries. Yet, an electronic environment did not promise curbing collusion between principal and certain tenderers. Other than common threats to system like security breaches by malicious parties, security issue related to ethical issue like fraud and repudiation issue where no evidence existed to denied it. In this paper, common threats for etendering process altogether with security countermeasure are described. This three interrelated attribute (consist of tender phase, threat and security countermeasure) are illustrated in misuse case for better understanding of the risk that may occurs in particular tender phase. Furthermore, it sought to ease the system developer for designing and constructing a secure e-tendering system. Keyword: e-Tendering, Security threats and...
The aim of this study was to identify the factors that might influence perception about the benef... more The aim of this study was to identify the factors that might influence perception about the benefits of a Customer Relationship Management (CRM) system, and the direction of this influence in private hospitals in Malaysia.Three factors (innovation, organizational, and environmental factors) were identified as influencing perception about the benefits of a CRM system.The study deployed a quantitative research approach, using a questionnaire to collect data.Private hospitals in the northern part of Malaysia were selected using the area sampling method and convenience sampling, and the management of the hospitals became the target respondents.For the survey, the research questionnaire was distributed to the sample of the study and each respondent was given a month to complete the questionnaire.The collected data was analyzed using Backward Multiple Regression Analysis.The results revealed that innovation and environmental factors had a positive significant relationship on perception, w...
Even though the Electronic Medical Record(EMR) projects have been going on for many years, with m... more Even though the Electronic Medical Record(EMR) projects have been going on for many years, with many groups of stakeholders involved, it was found that there was no clear guidelines in terms of the stak eholders’ role in the EMR projects.This paper attempts to fill in the gap in the existing implementation plan by introducing the pre-implementation framework for the EMR projects.This framework focuses on the role and responsibilities of all the stakeholders that have been identified from the literature. Six stakeholders are involved in the EMR projects:- 1) the Government, 2)the healthcare organization, 3) the IT personnel, 4) the end-users, 5) the healthcare application developer, and 6) the suppliers. The pre-implementation framework for the ERM project was constructed by using the Activity Diagram with the Unified Modeling Language (UML) notation to show the clear roles of all stakeholders. This paper also describes four elements involved in the pre-implementation framework:- 1)P...
Journal of Telecommunication, Electronic and Computer Engineering, 2016
Rapid growths of computers, mobile phones and Internet technology have created ways for irrespons... more Rapid growths of computers, mobile phones and Internet technology have created ways for irresponsible people to undertake computer crimes. Millions of users across the globe have fallen as victims to computer crimes, including Malaysia. It is due to current software environment which is more complex, distributed, keeps confidential data and easily exposed to malicious attacks. Consequently, secure software process is increasingly gaining much importance among software practitioners and researchers. However, even though its importance has been revealed, only few studies were conducted regarding its current practice in the software industry, especially in Malaysia. Thus, an exploratory study is conducted among software practitioners in Malaysia to study their experiences and practices on the secure software process in the real-world projects. This paper discusses the findings from the study, which involved 93 software practitioners. Structured questionnaire is utilized for data collec...
The purpose of this study is to construct doctors’ acceptance model of Electronic Medical Records... more The purpose of this study is to construct doctors’ acceptance model of Electronic Medical Records (EMR) in private hospitals.The model extends the Technology Acceptance Model (TAM) with two factors of Individual Capabilities; Self-Efficacy (SE) and Perceived Behavioral Control (PBC).The initial findings proposes additional factors over the original factors in TAM making Perceived Usefulness (PU), Perceived Ease Of Use (PEOU), Behavioral Intention to use (BI), SE, and PBC working in incorporation.A cross-sectional survey was used in which data were gathered by a personal administered questionnaire as the instrument for data collection.Doctors of public hospitals were involved in this study which proves that all factors are reliable.
Journal of Telecommunication, Electronic and Computer Engineering, 2017
Software testing is a necessary and essential part of the software quality process and plays a ma... more Software testing is a necessary and essential part of the software quality process and plays a major role in detecting errors in systems. To improve the effectiveness of test case generation during software testing, and with the growing adoption of UML by software developers and researchers, many studies have focused on the automation of test case generation from UML diagrams. One of these diagrams is the UML state chart diagram. These test cases are generally generated to achieve certain coverage criteria. However, combinations of multiple criteria are required to achieve better coverage. Different studies use various number and type of coverage criteria in their methods and approaches. This paper reviews previous studies to present the most practical coverage criteria combinations for UML state chart diagram, including all-states, all-transitions, all-transition-pairs and all-loop-free-paths coverage. A special calculation is necessary to determine the coverage percentage of the p...
Many mobile health (m-health) applications have been developed in recent years. However, only few... more Many mobile health (m-health) applications have been developed in recent years. However, only few statistical evidences on the acceptability and usability issues have been discussed by previous studies. In addition, the requirements for the chronic disease applications are often overlooked. Failure to include the requirements has led to the rejection of the m-health applications. The existing usability evaluation models consist only the general dimensions for evaluating mobile applications, which are unable to capture the complexities of different categories of mobile applications. Such categories require different functional and nonfunctional requirements; thus, customized usability evaluation models are required. The main objective of this paper is to provide usability dimensions and measurement to evaluate the chronic disease mhealth applications users’ requirements. The related data were gathered by interviewing selected users and analyzed using Nvivo. The Systematics Literature...
As far as the development of youth community is concerned, the implementation of a dedicated deci... more As far as the development of youth community is concerned, the implementation of a dedicated decision aid is believed to have ample potentials in building their skills in making decisions.The absence of proper guidance in making crucial decisions could cause irreversible effects to youth’s future and consequently to the development plan of the country.Accordingly, this study focuses on the development of a computerized personal decision aid for youth named as Youth Personal Decision Aid (YouthPDA).The aid manifests the integration of Personality Traits (PT) and Multiple Intelligence (MI) data in a contextual aware recommender system.The system uses Rule Based Reasoning (RBR) that will display the recommendations based on set of programmed rules. This paper also discusses findings from helpfulness evaluation of YouthPDA, which comprises of four dimensions; reliability, decision-making effort, confidence, and decision process awareness. The mean value for each dimension (which is >...
Service-oriented Architecture (SOA) maturity model is a benchmark for evaluating and assessing th... more Service-oriented Architecture (SOA) maturity model is a benchmark for evaluating and assessing the maturity of SOA adoption. Several of SOA maturity models have been constructed by the academia and industry. However, these models contradict with each other in determining “what” need to be assessed in SOA adoption. Therefore, the aims of this study is to review and compare the existing SOA maturity models that were commonly referred such as SOAMM, SIMM, CSOAMM, Inaganti’s Model, iSOAMM, Welke’s Model and SOASMM in order to determine which model should be enhanced to reflect the true definition of SOA. The findings implies that the existing models have their own strengths and weaknesses and based on these findings, this study identify that Welke’s model is the most suitable model that should be enhanced. This study has successfully analyze the existing models and identify an issue that deserve future investigation such as the need to provide two dimensional evaluations for both IT ben...
The use of high quality test cases enable the detection of software defect which eventually helps... more The use of high quality test cases enable the detection of software defect which eventually helps in ensuring the quality of software before being released to end users. Unfortunately, at the moment, the criteria of good test cases are still vague without any specific model to measure the quality of the test cases. Therefore, this study aims to identify the criteria of good test cases based on the findings from studies conducted within the years 2010 to 2018. The Systematic Literature Review (SLR) by Kitchenham approach was adapted in order to comprehensively identify the related criteria. From the review, a total of 310 related articles were found from the IEEE Xplore, ACM Digital Library, and Science Direct databases. The search was then narrowed down using specific key-words and as a result the number relevant articles ended up to 14.From the review of these articles, 30 quality factors of the test cases were identified. These quality factors were further examined, categorized an...
Uploads
Papers by Haslina Mohd