Skip to main content
Dr Yusri Arshad
  • Faculty of Technology Management and Technopreneurship (FPTT), Universiti Teknikal Malaysia Melaka (UTeM)
Learning from events is a crucial measure to reduce the number of catastrophic incidents on board the oil and gas industry. It is critical to have a better understanding of the root causes behind the incidents. A better understanding of... more
Learning from events is a crucial measure to reduce the number of catastrophic incidents on board the oil and gas industry. It is critical to have a better understanding of the root causes behind the incidents. A better understanding of the incident causal factors can be accomplished by investigating thoroughly previous incident reports and determine the most notable factors in contributing to the incidents. This paper mainly elaborates and analyzes incident reports produced by the International Oil and Gas Producer Association’s (IOGP’s) reports from 2010 until 2018 located in the worldwide operation. The most contributing factors lead to the oil and gas incidents are examined in this paper utilizing Gaussian fuzzy analytic hierarchy process, an improved methodology of fuzzy analytic hierarchy process (FAHP) by embedding Gaussian fuzzy number within the evaluation process. Gaussian fuzzy number is obtained by random simulation corresponding to the Gaussian probability density funct...
The current study investigates factors influencing sustainable software practices due to the growing concern for environmental desolation in software sustenance among software practitioners in the electronic industry. It validates the... more
The current study investigates factors influencing sustainable software practices due to the growing concern for environmental desolation in software sustenance among software practitioners in the electronic industry. It validates the GREEN SOFT Reference Model in the Malaysian context by conducting a study in Selangor, Malaysia, using non-probability sampling techniques. The research involved 250 employees from various software departments. Partial least square via SmartPLS3.3 examined the constructs of governance, software strategy, knowledge accessibility, software practitioners, sustainable environmental practices and sustainable software practices. Empirical results show that the GREEN SOFT Reference Model positively and directly influenced software practices, including software strategy, software practitioners, sustainable environmental practices and knowledge accessibility. However, knowledge accessibility moderated the link between software strategy and sustainable software ...
Accounting is the heart of business. It is the language for business where it provides essential business informationfor making important economic decisions. Theframeworkfor financial reporting is based on the dominant financial reporting... more
Accounting is the heart of business. It is the language for business where it provides essential business informationfor making important economic decisions. Theframeworkfor financial reporting is based on the dominant financial reporting approach. This approach is initially derived from generally acceptable accounting practices. Accounting practitioners form accounting professional bodies which collectively set accounting standards in pursuit of enhancing the quality of accounting information. The development of financial reporting approach is influenced by the evolution ofbusiness entities. When people first trade, they operate as sole entrepreneurs. Therefore, they only need accounting to calculate income or loss. At that time financial accounting approach is based on profit and loss approach where expenses are matched against income in order to determine whether the business is making profit or loss. 14ny accrued expenses and unexpired assets are reported in the balance sheet. In other words, a balance sheet is merely by-product of the profit and loss account. Accounting educators are trained to teach students related accounting concepts such as definitions of income and expenses, matching concept, conservatism and specific methods of calculating and presenting income and expenses. However, businesses grow into larger entities that call for the establishment ofcompanies and group companies, thus, assessing the value of companies are becoming more important. Hence, the emphasis is now shifted to a balance sheet and the financial reporting approach is considered to be more balance sheet based. Now, accounting educators need to ensure students are familiar with identification, classification, measurement and presenting elements of a statement offinancial position, namely, assets and liabilities. This paper provides some empirical evidence of an increasing dominance of a balance sheet based financial reporting approach and its implication on accounting educators.
The aim of this study is to investigate role of QuoteWin software in tendering system in multinational companies. QuoteWin software is designed to make software quote management hassle free and straight forward to the tendering system.... more
The aim of this study is to investigate role of QuoteWin software in tendering system in multinational companies. QuoteWin software is designed to make software quote management hassle free and straight forward to the tendering system. Despite the simplicity of use, the software is sophisticated system based on Microsoft, IBM, iOS and Linux. This robust software provides scalable and flexible solution to manage and respond projects of any complexity level. A framework called Semantic-based Planning Optimization Composition (SPOC) is composed to evaluate the request-for-quote software and observe tender respond. In the study, four phase of SPOC: Discovery, Planning, Quote Execution and Optimization are implements to evaluate the software performance in company tendering system. The study is to investigate QuoteWin software fulfills requirements of company works needs to be leading business software in request-for-quote process. The data collected from Flextronics Technology (Malaysia...
The aim of this study is to investigate the influence of information system (IS) success factors towards the user satisfaction in UTeM. In the last few decade, the process of linking the information system (IS) with user satisfaction has... more
The aim of this study is to investigate the influence of information system (IS) success factors towards the user satisfaction in UTeM. In the last few decade, the process of linking the information system (IS) with user satisfaction has been currently taking concern in IS research. This knowledge is valuable as it can help in the development of better methods for IS in future and evaluating their impacts on the individual and organization. The rapid changes in information technology (IT) and business environment have challenged the Universities capabilities in planning the appropriate information systems strategies for their organizations. The increased number of user population in the Malaysian Public Universities shows a clear need of improvement in the strategic information system planning used. The main objective of this study is 1) the important factors contributing towards Information system success; 2) to determine IS success factors influencing user satisfaction at UTeM; an...
Research Interests:
IIUM E-meeting was first promulgated in 2004 to cater for the increasing needs of the university for an integrated scheduling and managing all meetings held by especially senate boards initially. Previously, all meetings were manually... more
IIUM E-meeting was first promulgated in 2004 to cater for the increasing needs of the university for an integrated scheduling and managing all meetings held by especially senate boards initially. Previously, all meetings were manually organised such as invitation to all relevant stakeholders, sharing of meeting documents, feedbacks and comments and others. The senate board, realising the benefits that can be derived from information technology, had asked the senate committee to work on a proposal to automate a system specifically for use by the senate secretariat, board and stakeholders for the senate meetings purposes.
In the oil and gas processing area, adequate risk control should be prearranged to prevent serious accidents, such as major gas leak, fire, and explosion. Installing gas detectors at appropriate technology is one of indispensable... more
In the oil and gas processing area, adequate risk control should be prearranged to prevent serious accidents, such as major gas leak, fire, and explosion. Installing gas detectors at appropriate technology is one of indispensable conditions for an implementation of risk reduction measures. Open-path infrared and ultrasonic leak gas detector provide wide coverage of gas detection. This capability is advantageous to detect unintentionally gas release in wide coverage and windy-climate processing area. On the other hand, the installation and maintenance cost of those gas detectors are relatively high compared to point infrared and catalytic gas detector. Gaussian fuzzy analytic hierarchy process (Gaussian FAHP) is implemented to evaluate the selection of gas detector technology in terms of benefit, cost and risk criteria. Ten expert panelists from production, safety, and maintenance departments are involved in Delphi Technique to assess the sub-criteria of Gaussian FAHP. The Gaussian F...
Without a doubt, the whole world faces many challenges regarding hacker or cracker exploitation; and spammer in various sector such as Internet security, software privacy, email, etc. While Malaysian government attempted to establish... more
Without a doubt, the whole world faces many challenges regarding hacker or cracker exploitation; and spammer in various sector such as Internet security, software privacy, email, etc. While Malaysian government attempted to establish several cyber laws in order to encounter the problem, mainly as the guidance for technology user’s purpose, the danger in information exploitation still arise. The important factor that supports the successful of these policies implementation resides on how to raise the awareness among community. This process will give significance contribution to the effectiveness of policy implementation by its continuity through the communication chain and regularly information distribution. Government can’t overrule the importance of university policies in building the awareness among student at beginning phase. Therefore, some factors need to be identified first, from which level that might influence positively the awareness in university. It has the function to measure the level of awareness for the improvement and performance purpose. However, the problem will always occur in terms of evolving the human mind in utilizing technology services, which put information security susceptible to attack and there is no standard regulation to ensure that human attitude involved delivering the secure and safety result. So, we can conclude that human error could be as greatest risk if current organization’s policy doesn’t have the capability to control and manage it accordingly and frequently.
Risk is a common terminology adopted in every field including IT/IS. IT risk nature depends largely on types of assets or projects. Each IT hardware, software, system or project has its own inherent and incidental risk associated to it.... more
Risk is a common terminology adopted in every field including IT/IS. IT risk nature depends largely on types of assets or projects. Each IT hardware, software, system or project has its own inherent and incidental risk associated to it. We classify IT risk into three types, namely: 1) technical and operational risk; 2) data and information security risk; and 3) organisation, project and human risk. Enterprise risk management enables management to effectively deal with uncertainty and associated risk and opportunity, enhancing the capacity to build value. The study adopts interviews and survey as methods od data collections. Based on the field findings and literature, IT risk management in Malaysia IHLs has been implemented to some extent depending on each organisation’s ICT policies and governance. While many developed IT risk management frameworks are available, each organisation is unique and need to customize its own model. In addition, this study provides the theoretical foundat...
Research Interests:
Malaysia IT outsourcing (ITO) practices have been around after the Kodak effect but was not widely publicized until massive public sector computerization projects and automation of financial systems after Asian financial crisis in 1997.... more
Malaysia IT outsourcing (ITO) practices have been around after the Kodak effect but was not widely publicized until massive public sector computerization projects and automation of financial systems after Asian financial crisis in 1997. Thus, many service providers, including world-class firms, providing ITO business models can be found in
operating in Malaysia. ITO models evolve from traditional to innovation phase in 2010 onwards. One of the innovative models in Malaysia is the global offshore service delivery model which is based on four pillars, namely: Experienced Leadership; Global Best Practice; Human Capital; Domain Knowledge. To be able to compete globally, Malaysia has
equipped its companies with higher capabilities and competencies via international certifications and continuous skills developments. Several advantages proposed by Malaysia include: economic stability, political stability, multi-lingual, world-class infrastructure, affordable lifestyle, value propositions and many others. In this paper, we present the detailed views of a senior executive management on two open-ended in-depth interviews and one CEO roundtable discussion.
Research Interests:
Research Interests:
Research Interests:
Research Interests:
Risk is a common terminology adopted in every field including IT/IS. IT risk nature depends largely on types of assets or projects. Each IT hardware, software, system or project has its own inherent and incidental risk associated to it.... more
Risk is a common terminology adopted in every field including IT/IS. IT risk nature depends largely on types of assets or projects. Each IT hardware, software, system or project has its own inherent and incidental risk associated to it. We classify IT risk into three types, namely: 1) technical and operational risk; 2) data and information security risk; and 3) organisation, project and human risk. Enterprise risk management enables management to effectively deal with uncertainty and associated risk and opportunity, enhancing the capacity to build value. The study adopts interviews and survey as methods od data collections. Based on the field findings and literature, IT risk management in Malaysia IHLs has been implemented to some extent depending on each organisation’s ICT policies and governance. While many developed IT risk management frameworks are available, each organisation is unique and need to customize its own model. In addition, this study provides the theoretical foundat...
Research Interests:
IT changes very quickly and influences business, industry and the public in an enormous manner. The issue of IT outsourcing (ITO) impact on IT workforce has been discussed widely in many developed countries so much so that the concerns... more
IT changes very quickly and influences business, industry and the public in an enormous manner. The issue of IT outsourcing (ITO) impact on IT workforce has been discussed widely in many developed countries so much so that the concerns have been tense in that more ...
Most early studies in information technology or system (IT/IS) predominantly apply quantitative techniques. However, application of qualitative methods is increasing in IT/IS researches and become a new trend among the researchers in the... more
Most early studies in information technology or system (IT/IS) predominantly apply quantitative techniques. However, application of qualitative methods is increasing in IT/IS researches and become a new trend among the researchers in the past twenty years. Using case studies are the most common methods to explore the research subjects. Recently, grounded theory method is becoming popular among doctoral candidates in their theses and also by researchers in
reputable journals. In this research, the authors applied Simon’s model to investigate IT outsourcing case studies using both grounded theory and case study researches approaches. The authors, then, describe and discuss on grounded theory and case study methods and how they can be combined in an IT/IS study. The accounts of IT outsourcing study in Malaysia public healthcare agencies are chosen as an example. The study shows that application of both methods adds to rigorous,
novelty and reliable theory building approach. Grounded theory and case study research did provide synergies in IS research particularly in providing rigorous and reliable iterative data collection and analysis to generate themes and an emerging theory. Moreover, there is a synergistically combination between case study research and grounded theory, demonstrating that qualitative approach is vibrant and flexible. We recommend future doctoral candidates to apply these
two qualitative methods hand in hand.
Research Interests:
IIUM E-meeting was first promulgated in 2004 to cater for the increasing needs of the university for an integrated scheduling and managing all meetings held by especially senate boards initially. Previously, all meetings were manually... more
IIUM E-meeting was first promulgated in 2004 to cater for the increasing needs of the university for an integrated scheduling and managing all meetings held by especially senate boards initially. Previously, all meetings were manually organised such as invitation to all relevant stakeholders, sharing of meeting documents, feedbacks and comments and others. The senate board, realising the benefits that can be derived from information technology, had asked the senate committee to work on a proposal to automate a system specifically for use by the senate secretariat, board and stakeholders for the senate meetings purposes. The E-Meeting covers most common and critical aspects of meeting management that includes preparation of a meeting, content uploading during a meeting and updates on status after a meeting. All members will be constantly updated through the built-in email reminder in the system. The system provides the platform for them to collaborate and share information securely a...
ABSTRACT Decision support systems (DSS) can be helpful tools in university’s planning and management. Decision support systems can contribute to efficient exchange of information between experts, stakeholders, decision makers and... more
ABSTRACT Decision support systems (DSS) can be helpful tools in university’s planning and management. Decision support systems can contribute to efficient exchange of information between experts, stakeholders, decision makers and laypeople. However, intelligent Information technology (IT) governance decision support system for public universities is yet to be thoroughly investigated. This is because IT governance (ITG) is just evolving as a new paradigm to take care the stakeholders’ expectations in leveraging IT with business goals. This study explores issues of IT governance and the suggestion for ITG Intelligent decision making support system (IDMSS) in a public university in Malaysia. The interviews and documents were analysed to generate themes. The findings show the need for effective IT governance in the university. This will enable optimal usage of IT resources, which are expected to have an impact on the university’s performance. The findings is aligned to Control Objectives for Information and related Technology (COBIT) framework and then several proposals from extant researches on IDMSS are described to form a basis for an intelligent ITG DMSS framework suitable for adoption in the context of public Institutes of Higher learning in Malaysia.
As IT Outsourcing (ITO) grows in complexity, there is a call for effective management of ITO relationship to reduce risks. ITO relationship receives a lot of attention from researchers recently. Many studies, however, are conceptual or... more
As IT Outsourcing (ITO) grows in complexity, there is a call for effective management of ITO relationship to reduce risks. ITO relationship receives a lot of attention from researchers recently. Many studies, however, are conceptual or hyphotesis-testing in nature. In addition, no one study focuses on full and comprehensive ITO decisions and implementations using Simon's stage model as a framework of inquiry. Thus, this study adopts case study research and grounded theory to investigate in detailed the ITO decisions and implementations of a pilot case in Malaysia public sector. In addition, we perform literature review, websites, documents, news as well as interviews. Our findings indicate that Malaysia practice is not much difference from developed countries except for the Asian cultural values still a dominant factor in local service providers. The research finds that public sector lacks IT resources competences and capabilities while relationship exchange varies from one case to another. Many working relationship factors are generated from iterative data reduction processes. Hence, this study contributes to literature as well as Malaysian ITO practical reference for business managers.
Research Interests:
Thin client systems have advanced recently with new innovative design extensions such as virtualisation and cloud computing. Client-server architecture is the basis for thin client system to connect remote multi-workstations to... more
Thin client systems have advanced recently with new innovative design extensions such as virtualisation and cloud computing. Client-server architecture is the basis for thin client system to connect remote multi-workstations to administrative servers located in headquarters or data center. This paper first presents a literature review on thin client concept and virtualization. In the next section, we describe the Wyse Technology and Linux thin client for windows-based and open source solution respectively. We then proceed with description of proposed conceptual architecture design and implementation for primary and secondary schools in Malaysia taking into account International Telecommunication Union and other International standards or benchmarks for high quality of service (QoS) delivery. Finally, our recommendation is that each system design and implementation is unique and thus requires different sets of decision-making criteria before designing an architecture. Networked-schools across a country like Malaysia with heavy users requirements pose high specification in architecture and system design planning to IT divisions.

And 22 more

Research Interests: