Papers by Rosita Mohamed Othman
Journal of Advanced Research in Applied Sciences and Engineering Technology, Jan 24, 2024
Bookmarks Related papers MentionsView impact
2022 International Conference on Green Energy, Computing and Sustainable Technology (GECOST)
Bookmarks Related papers MentionsView impact
Journal of Telecommunication, Electronic and Computer Engineering, 2017
In recent years, Information and Communication Technologies or widely known as ICT has rapidly ac... more In recent years, Information and Communication Technologies or widely known as ICT has rapidly acquired a place in society. ICT facilitates communities in terms of providing the latest information updates on various fields such as business, education, sports and many more. Various ICT applications have been developed to cater these arising needs. In ensuring the developed ICT applications achieving its purposes, user requirements must be fulfilled. Thus, gathering requirements from communities during system development is an important phase. A suitable elicitation technique is needed as this will determine the quality and accuracy of the requirements gathered which ensures success of the developed system. The same applies when developing systems for minority communities. Hence, this paper explores the existing requirement elicitation techniques to gain insight for constructing a suitable requirement elicitation technique for minority communities. As a result, a proposed framework fo...
Bookmarks Related papers MentionsView impact
Journal of Telecommunication, Electronic and Computer Engineering, 2017
Creating a machine-readable dictionary for an indigenous language is not an easy process and thus... more Creating a machine-readable dictionary for an indigenous language is not an easy process and thus, transforming an existing indigenous dictionary into a machinereadable dictionary is one approach to speed up the process. This paper presents the sequential transformation of two bilingual Sarawak indigenous dictionaries, Melanau-MukahMalay and Iban-Malay dictionaries, from their initial semistructured form into their structured representation. The transformation makes use of an OCR to convert the original PDF format of the dictionaries into HTML files, which is then analysed by the Python HTMLParser to extract only the content of the dictionaries. The extracted content is saved in plain text file. To understand the original structure of each dictionary, the textual units in the plain text file are converted into generic symbols. The observation of the collocations of the generic symbols yields to the writing of regular expressions that can delimit each dictionary element. The result i...
Bookmarks Related papers MentionsView impact
2008 3rd International Conference on Information and Communication Technologies: From Theory to Applications, 2008
Bookmarks Related papers MentionsView impact
2013 IEEE Symposium on Computers & Informatics (ISCI), 2013
Bookmarks Related papers MentionsView impact
iracst.org
Abstract—The increasing use of E-Government Services applications has created a lot of opportunit... more Abstract—The increasing use of E-Government Services applications has created a lot of opportunities by fraudsters to commit E-Fraud crimes from remote locations. The rise of E-Commerce frauds has significant impact over E-Government services applications. ...
Bookmarks Related papers MentionsView impact
Abstract-The increasing use of E-Government Services applications has created a lot of opportunit... more Abstract-The increasing use of E-Government Services applications has created a lot of opportunities by fraudsters to commit E-Fraud crimes from remote locations. The rise of ECommerce frauds has significant impact over E-Government services applications. Maintaining community confidence and developing trust to its citizen are seen as the key challenges by government agencies in order to sustain its credibility and competitive advantage. Therefore, E-Fraud and perpetrator platforms employed by fraudsters are explored to review techniques/methods used by them. The security problem including E-Fraud cannot be solved using a linear approach (narrow approach) because E-fraud is a complex and requires concurrent interaction from other components. In this study, E-Fraud prevention for government agency is proposed and classified into three components first, the formal component, second is the technical component and third is informal component.
Bookmarks Related papers MentionsView impact
ABSTRACT
Bookmarks Related papers MentionsView impact
ABSTRACT
Bookmarks Related papers MentionsView impact
Journal of Computer Science
Bookmarks Related papers MentionsView impact
Bookmarks Related papers MentionsView impact
Uploads
Papers by Rosita Mohamed Othman