Nurazean Maarop
YOU?
Author Swipe
View article: Enhancing Early Detection of Type II Diabetes with Machine Learning: A Performance Evaluation
Enhancing Early Detection of Type II Diabetes with Machine Learning: A Performance Evaluation Open
Type II diabetes is a common issue nowadays and takes a longer time to detect. Detection of diabetes greatly relies on the clinical results from medical professionals, which require a significant amount of time, manpower, and expenses. Mac…
View article: A Pilot Analysis of Factors Affecting Satisfaction of Using Interactive Digital Whiteboard Among University Postgraduate Students
A Pilot Analysis of Factors Affecting Satisfaction of Using Interactive Digital Whiteboard Among University Postgraduate Students Open
The COVID-19 lockdown has sparked educational approach all around the world and transformed the traditional learning to online engaging learning. Even so, this transformation has demonstrated the need to implement interactive e-learning te…
View article: Design and Evaluation of Virtual Reality Application for Building Information Modelling
Design and Evaluation of Virtual Reality Application for Building Information Modelling Open
In the realm of architectural design and construction, the integration of Virtual Reality (VR) with Building Information Modelling (BIM) presents a transformative approach to overcome the inherent limitations of traditional two-dimensional…
View article: Multimodal RAG Analysis of Product Datasheet
Multimodal RAG Analysis of Product Datasheet Open
Large language models such as ChatGPT serves as multipurpose chatbot that can provide information across diverse disciplines. However, in order to generate timely and accurate response, retrieval-augmented generation method has been devise…
View article: Systematic Literature Review of Risk Assessment Techniques, Standard and Guidelines for Railway
Systematic Literature Review of Risk Assessment Techniques, Standard and Guidelines for Railway Open
Railways are a mode of public transportation that can carry large numbers of passengers and commodities and can cover long distances quickly. Based on these advantages, the railway is a mode of transportation that is in great demand by peo…
View article: A Systematic Review on Multi-Factor Authentication Framework
A Systematic Review on Multi-Factor Authentication Framework Open
In the new era of technology, where information can be accessed and gained at the push of a button, security concerns are raised about protecting the system and data privacy and confidentiality. Traditional ways of user authentication are …
View article: Proposed Research Model for Mobile Digital Wallet Adoption Among Consumer In Malaysia
Proposed Research Model for Mobile Digital Wallet Adoption Among Consumer In Malaysia Open
Digital wallets are considered as a game changer because they allow digital financial inclusion among various levels of society. However, the use of digital wallet among Malaysians is low compared to other countries. A pre-liminary study w…
View article: A Bibliometric Review Of Academic Collaboration In The Governance, Risk And Compliance Of Artificial Intelligence
A Bibliometric Review Of Academic Collaboration In The Governance, Risk And Compliance Of Artificial Intelligence Open
As Artificial Intelligence becomes increasingly pervasive in its application, research efforts have shifted from the discourse on ethical principles to the mechanism of implementation that would eventually bring benefits to the world’s pop…
View article: Literature Review on Metadata Governance
Literature Review on Metadata Governance Open
The framework of metadata governance is a subset of the primary data governance framework implementation within an enterprise. Metadata management helps identify data provenance and destination systems, explain the categories of data in th…
View article: Counter-Narrative Cyber Security Model to Address the Issues of Cyber Terrorism
Counter-Narrative Cyber Security Model to Address the Issues of Cyber Terrorism Open
Terrorism is the imminent threat that Malaysia and the entire world are facing nowadays. This has become a severe threat to Malaysia’s national security as extremist groups such as ISIS and DAESH are leveraging cyberspace to gain more supp…
View article: Implementation of Formative Assessment in Teaching Infographics
Implementation of Formative Assessment in Teaching Infographics Open
Designing learning instruction or pedagogical activities is one of the elements in constructive alignment. Constructive alignment is needed to assess students’ learning on the concept of infographics. In teaching the concept of infographic…
View article: Predicting the Carbon Dioxide Emissions Using Machine Learning
Predicting the Carbon Dioxide Emissions Using Machine Learning Open
There are severe impacts and consequences to humans, societies, and the environment due to global warming. Though there are various activities that contributes to global warming, the major contributor is carbon dioxide (CO2) emissions. Hum…
View article: Students' Educational Game Acceptance in Higher Education in Saudi Arabia
Students' Educational Game Acceptance in Higher Education in Saudi Arabia Open
Studies on educational games (EG) have shown growing interest among researchers due to the potential and preferences of the younger generation. Games technology is among the most popular forms of technology nowadays with billions of transa…
View article: Cultivation of Islamic Philanthropy Concept through High Impact Educational Practices (HIEPs) in Universiti Teknologi MARA
Cultivation of Islamic Philanthropy Concept through High Impact Educational Practices (HIEPs) in Universiti Teknologi MARA Open
: Satisfaction is an important usability attribute in developing a courseware which involves end users. Measuring satisfaction among hearing-impaired students is different than measuring it among common students because they learn using si…
View article: Measuring Satisfaction on Augmented Reality Courseware for Hearing-ImpAaired Students: Adjustment Formula form System Usability ScaleAAA
Measuring Satisfaction on Augmented Reality Courseware for Hearing-ImpAaired Students: Adjustment Formula form System Usability ScaleAAA Open
: Satisfaction is an important usability attribute in developing a courseware which involves end users. Measuring satisfaction among hearing-impaired students is different than measuring it among common students because they learn using si…
View article: Measuring Satisfaction on Augmented Reality Courseware for Hearing-Impaired Students: Adjustment Formula form SUS
Measuring Satisfaction on Augmented Reality Courseware for Hearing-Impaired Students: Adjustment Formula form SUS Open
Satisfaction is an important usability attribute in developing a courseware which involves end users. Measuring satisfaction among hearing-impaired students is different than measuring it among common students because they learn using sign…
View article: Information security threats encountered by Malaysian public sector data centers
Information security threats encountered by Malaysian public sector data centers Open
Data centers are primarily the main targets of cybercriminals and security threats as they host various critical information and communication technology (ICT) services. Identifying the threats and managing …
View article: Critical Implementation Factors for Cloud-Based Enterprise Resources planning in the Nigerian Maritime Transport and Supply Chain
Critical Implementation Factors for Cloud-Based Enterprise Resources planning in the Nigerian Maritime Transport and Supply Chain Open
Technology has deeply impacted the practice of shipping in the maritime industry worldwide, this explains the way and manner big organizations have engaged modern technology like Cloud-based Enterprise Resources Planning, to manage the key…
View article: An Enhanced Process of Digital Forensic to Support E-Crime Investigations Focusing on Evidence Handling in Malaysian Armed Forces
An Enhanced Process of Digital Forensic to Support E-Crime Investigations Focusing on Evidence Handling in Malaysian Armed Forces Open
Digital Forensics Lab (DFL) in Malaysian Armed Forces (MAF) has been in operation since 2018, providing digital forensic services. The lab is in its maturing phase where the people and the process are still adjusting to the day-to-day oper…
View article: Examining factors that effect on the acceptance of mobile commerce in Malaysia based on revised UTAUT
Examining factors that effect on the acceptance of mobile commerce in Malaysia based on revised UTAUT Open
This study presents an amended unified theory of acceptance and use of technology (UTAUT) which explores key factors affecting Malaysian consumers ' willingness to accept mobile-commerce. A questionnaire survey has been used to colle…
View article: Systematic Literature Review of Information Security Compliance Behaviour Theories
Systematic Literature Review of Information Security Compliance Behaviour Theories Open
The paper aims to identify behavioural theories that influence information security policies compliance behaviour. A systematic review of empirical studies from eleven online databases (ACM digital library, Emerald Insight, IEEE Xplore dig…
View article: Graph Analysis Study of a City Bus Transit Network
Graph Analysis Study of a City Bus Transit Network Open
Graph analysis approach was used to analyze a city bus network. The bus trip data were segregated into 4 smaller bus datasets (weekday-peak-hour, weekday-off-peak-hour, weekend-peak-hour, and weekend-off-peak-hour) with the main goal of st…
View article: Identification of Information Security Threats Using Data Mining Approach in Campus Network
Identification of Information Security Threats Using Data Mining Approach in Campus Network Open
Comprehensive risk assessment implementation in an organization is crucial in order to safeguard valuable organization assets and to minimize information security threats. Thus, inadequate information security risk assessment may result in…
View article: Development and Validation of Enterprise Architecture (EA) Readiness Assessment Model
Development and Validation of Enterprise Architecture (EA) Readiness Assessment Model Open
Enterprise architecture (EA) proves to be a holistic strategy in aligning business and information technology. An increasing number of organizations, especially in the public sector, have adopted EA in order to take advantage of the opport…
View article: Mobile Application Dictionary for Hearing Impaired Students
Mobile Application Dictionary for Hearing Impaired Students Open
Mobile applications have been acknowledged by societies as a support tool that can be accessed everywhere via smartphone or any handheld device. The use of technology nowadays is not only limited to normal people; it can also be used by th…
View article: Density Functional Theory Calculations of Structure-Antioxidant Activity of Selected Phenolic Acids and Flavonoids Found in Malaysian Honey
Density Functional Theory Calculations of Structure-Antioxidant Activity of Selected Phenolic Acids and Flavonoids Found in Malaysian Honey Open
Phenolic acids and flavonoids exist naturally in Malaysian honey and contribute significantly to antioxidant contents. Antioxidants plays an important role in scavenging free radicals and prevent health deterioration. Total antioxidant con…
View article: Content Validation of an Enterprise Architecture (EA) Readiness Assessment Instrument
Content Validation of an Enterprise Architecture (EA) Readiness Assessment Instrument Open
Although Enterprise Architecture (EA) is becoming an important agenda to align business with information technology plan, not many organisations, especially in the public sector, are ready to implement it. Therefore, there is a need to ide…
View article: Towards a Conceptual Model to Evaluate usability of Digital Government Services in Malaysia
Towards a Conceptual Model to Evaluate usability of Digital Government Services in Malaysia Open
The Malaysian government is committed to provide comprehensive digital government services and it is reflected in some policies and strategic plans such as 11th Malaysia Plan 2016-2020 (RMKe-11) for digital government transformation. Howev…
View article: Understanding Factors that Affect Information Technology Outsourcing of Government Shared Services
Understanding Factors that Affect Information Technology Outsourcing of Government Shared Services Open
One of the Public Sector Information Communication Technology Strategic Directions for 2016 – 2020 is to optimize shared services through a centralized and structured initiative. Due to some identified problems and challenges in managing…
View article: A Model on Multiple Perspectives of Citizens’ Trust in using Social Media for E-Government Services
A Model on Multiple Perspectives of Citizens’ Trust in using Social Media for E-Government Services Open
The lack of trust has a critical role in discouraging citizens to use social media for e-government services. Therefore, developing trust is an essential need for making citizens’ comfortable to participate in government social media ser…