ARTICLE IN ACADEMIC JOURNALS
NO | DETAILS OF ARTICLE IN ACADEMIC JOURNALS |
---|---|
1. |
Machine learning approach for detecting and combating bring your own device (BYOD) security threats and attacks: a systematic mapping review
2023
Author(s) : Azah Anir Binti Norman Source :
ARTIFICIAL INTELLIGENCE REVIEW
DOI :
10.1007/s10462-022-10382-3
|
2. |
Employees’ BYOD Security Policy Compliance in the Public Sector
2023
Author(s) : Azah Anir Binti Norman Source :
Journal of Computer Information Systems
DOI :
10.1080/08874417.2023.2178038
|
3. |
Employees' BYOD Security Policy Compliance in the Public Sector
2023
Author(s) : Miss Laiha Binti Mat Kiah, Azah Anir Binti Norman Source :
JOURNAL OF COMPUTER INFORMATION SYSTEMS
DOI :
10.1080/08874417.2023.2178038
|
4. |
Characteristics of Blockchain and Its Relationship With Trust
2023
Author(s) : Azah Anir Binti Norman, Saaidal Razalli Bin Azzuhri Source :
IEEE Access
DOI :
10.1109/ACCESS.2023.3243700
|
5. |
Technology Dependency and Impact during COVID-19: A Systematic Literature Review and Open Challenges
2023
Author(s) : Norjihan Binti Abdul Ghani, Sri Devi A/p Ravana, Suraya Binti Hamid, Azah Anir Binti Norman Source :
IEEE Access
DOI :
10.1109/ACCESS.2023.3250770
|
6. |
An Empirical Examination of Formation of Trust in Blockchain
2023
Author(s) : Azah Anir Binti Norman, Saaidal Razalli Bin Azzuhri Source :
IEEE Access
DOI :
10.1109/ACCESS.2023.3321838
|
7. |
Technology Dependency and Impact During COVID-19: A Systematic Literature Review and Open Challenges
2023
Author(s) : Norjihan Binti Abdul Ghani, Sri Devi A/p Ravana, Suraya Binti Hamid, Azah Anir Binti Norman Source :
IEEE ACCESS
DOI :
10.1109/ACCESS.2023.3250770
|
8. |
Preliminary Study for Identifying Personnel for Innovative Software Engineering Project
2023
Author(s) : Rodina Binti Ahmad, Nazean Binti Jomhari, Mohd Yamani Idna Bin Idris, Azah Anir Binti Norman, Saaidal Razalli Bin Azzuhri, Unaizah Hanum Binti Obaidellah, Hazrina Binti Sofian Source :
IEEE Global Engineering Education Conference, EDUCON
DOI :
10.1109/EDUCON54358.2023.10125110
|
9. |
Characteristics of Blockchain and Its Relationship With Trust
2023
Author(s) : Azah Anir Binti Norman, Saaidal Razalli Bin Azzuhri Source :
IEEE ACCESS
DOI :
10.1109/ACCESS.2023.3243700
|
10. |
Machine learning approach for detecting and combating bring your own device (BYOD) security threats and attacks: a systematic mapping review
2023
Author(s) : Azah Anir Binti Norman Source :
Artificial Intelligence Review
DOI :
10.1007/s10462-022-10382-3
|
11. |
An Empirical Examination of Formation of Trust in Blockchain
2023
Author(s) : Azah Anir Binti Norman Source :
IEEE ACCESS
DOI :
10.1109/ACCESS.2023.3321838
|
12. |
Systematic Literature Review of Security Control Assessment Challenges
2022
Author(s) : Azah Anir Binti Norman Source :
ICCSCE 2022 - Proceedings: 2022 12th IEEE International Conference on Control System, Computing and Engineering
DOI :
10.1109/ICCSCE54767.2022.9935661
|
13. |
Motivating Factors to Self-Disclosure on Social Media: A Systematic Mapping
2022
Author(s) : Norjihan Binti Abdul Ghani, Azah Anir Binti Norman Source :
IEEE TRANSACTIONS ON PROFESSIONAL COMMUNICATION
DOI :
10.1109/TPC.2022.3184428
|
14. |
An Intelligent Gamification Tool to Boost Young Kids Cybersecurity Knowledge on FB Messenger
2022
Author(s) : Suraya Binti Hamid, Azah Anir Binti Norman Source :
Proceedings of the 2022 16th International Conference on Ubiquitous Information Management and Communication, IMCOM 2022
DOI :
10.1109/IMCOM53663.2022.9721733
|
15. |
Social entrepreneurship in higher education: challenges and opportunities
2022
Source :
Asia Pacific Journal of Education
DOI :
10.1080/02188791.2020.1859354
|
16. |
Motivating Factors to Self-Disclosure on Social Media: A Systematic Mapping
2022
Author(s) : Norjihan Binti Abdul Ghani, Azah Anir Binti Norman Source :
IEEE Transactions on Professional Communication
DOI :
10.1109/TPC.2022.3184428
|
17. |
BYOD Policy Compliance: Risks and Strategies in Organizations
2022
Author(s) : Azah Anir Binti Norman Source :
Journal of Computer Information Systems
DOI :
10.1080/08874417.2019.1703225
|
18. |
Multi-feature fusion framework for sarcasm identification on twitter data: A machine learning based approach
2021
Author(s) : Azah Anir Binti Norman, Nor Liyana Bt Mohd Shuib Source :
PLOS ONE
DOI :
10.1371/journal.pone.0252918
|
19. |
BYOD Security Risks and Mitigation Strategies: Insights from IT Security Experts
2021
Author(s) : Miss Laiha Binti Mat Kiah, Azah Anir Binti Norman Source :
JOURNAL OF ORGANIZATIONAL COMPUTING AND ELECTRONIC COMMERCE
DOI :
10.1080/10919392.2022.2028530
|
20. |
Intention to Share: The relationship of Cyber-Security Behavior amongst Social Netizens in Sharing Specific-Content in Facebook
2021
Author(s) : Suraya Binti Hamid, Azah Anir Binti Norman Source :
Information Research
DOI :
https://doi.org/10.47989/irpaper894
|
21. |
Social Entrepreneurship in Higher Education: Challenges and Opportunities
2021
Source :
Asia Pacific Journal of Education
DOI :
10.1080/02188791.2020.1859354
|
22. |
Intention to share: The relationship between cybersecurity behaviour and sharing specific content in facebook
2021
Author(s) : Azah Anir Binti Norman Source :
Information Research
DOI :
10.47989/IRPAPER894
|
23. |
Context-Based Feature Technique for Sarcasm Identification in Benchmark Datasets Using Deep Learning and BERT Model
2021
Author(s) : Azah Anir Binti Norman Source :
IEEE Access
DOI :
10.1109/ACCESS.2021.3068323
|
24. |
Intention to share: the relationship between cybersecurity behaviour and sharing specific content in Facebook
2021
Author(s) : Azah Anir Binti Norman Source :
INFORMATION RESEARCH-AN INTERNATIONAL ELECTRONIC JOURNAL
|
25. |
Intention to share: the relationship between cybersecurity behaviour and sharing specific content in Facebook
2021
Author(s) : Suraya Binti Hamid, Azah Anir Binti Norman Source :
INFORMATION RESEARCH-AN INTERNATIONAL ELECTRONIC JOURNAL
DOI :
10.47989/irpaper894
|
26. |
Context-Based Feature Technique for Sarcasm Identification in Benchmark Datasets Using Deep Learning and BERT Model
2021
Author(s) : Azah Anir Binti Norman, Nor Liyana Bt Mohd Shuib Source :
IEEE ACCESS
DOI :
10.1109/ACCESS.2021.3068323
|
27. |
Context-Based Feature Technique for Sarcasm Identification in Benchmark Datasets Using Deep Learning and BERT Model
2021
Author(s) : Azah Anir Binti Norman Source :
IEEE ACCESS
|
28. |
Existing Framework and the Use of Emerging Technology in Healthcare and Healthy Lifestyle: A Review
2021
Source :
Proceedings - 2nd International Conference on Computer Science and Engineering: The Effects of the Digital World After Pandemic (EDWAP), IC2SE 2021
DOI :
10.1109/IC2SE52832.2021.9792112
|
29. |
Information System Audit for Mobile Device Security Assessment
2021
Author(s) : Miss Laiha Binti Mat Kiah, Azah Anir Binti Norman Source :
2021 3rd International Cyber Resilience Conference, CRC 2021
DOI :
10.1109/CRC50527.2021.9392468
|
30. |
Compliance with bring your own device security policies in organizations: A systematic literature review
2020
Author(s) : Miss Laiha Binti Mat Kiah, Azah Anir Binti Norman Source :
Computers and Security
DOI :
10.1016/j.cose.2020.101998
|
31. |
Sarcasm identification in textual data: systematic review, research challenges and open directions
2020
Author(s) : Azah Anir Binti Norman Source :
Artificial Intelligence Review
|
32. |
Robots as Assistive Technology Tools to Enhance Cognitive Abilities and Foster Valuable Learning Experiences among Young Children With Autism Spectrum Disorder
2020
Author(s) : Azah Anir Binti Norman Source :
IEEE ACCESS
DOI :
10.1109/ACCESS.2020.3001629
|
33. |
Socio-Technical Mitigation Effort to Combat Cyber Propaganda: A Systematic Literature Mapping
2020
Author(s) : Azah Anir Binti Norman Source :
IEEE ACCESS
|
34. |
Socio-Technical Mitigation Effort to Combat Cyber Propaganda: A Systematic Literature Mapping
2020
Author(s) : Azah Anir Binti Norman Source :
IEEE ACCESS
DOI :
10.1109/ACCESS.2020.2994658
|
35. |
Sarcasm identification in textual data: systematic review, research challenges and open directions
2020
Author(s) : Azah Anir Binti Norman Source :
ARTIFICIAL INTELLIGENCE REVIEW
|
36. |
The effects of applying privacy by design to preserve privacy and personal data protection in mobile cloud computing: An exploratory study
2020
Author(s) : Azah Anir Binti Norman Source :
Symmetry
|
37. |
Compliance with bring your own device security policies in organizations: A systematic literature review
2020
Author(s) : Azah Anir Binti Norman Source :
Computers and Security
|
38. |
Psychological motives of cyberbullying among Malaysian young adults
2020
Author(s) : Azah Anir Binti Norman Source :
ASIA PACIFIC JOURNAL OF SOCIAL WORK AND DEVELOPMENT
|
39. |
Socio-Technical Mitigation Effort to Combat Cyber Propaganda: A Systematic Literature Mapping
2020
Author(s) : Azah Anir Binti Norman Source :
IEEE Access
|
40. |
Robots as Assistive Technology Tools to Enhance Cognitive Abilities and Foster Valuable Learning Experiences among Young Children with Autism Spectrum Disorder
2020
Author(s) : Azah Anir Binti Norman Source :
IEEE Access
DOI :
10.1109/ACCESS.2020.3001629
|
41. |
Privacy and data protection in mobile cloud computing: A systematic mapping study
2020
Author(s) : Azah Anir Binti Norman Source :
PLOS ONE
|
42. |
The Effects of Applying Privacy by Design to Preserve Privacy and Personal Data Protection in Mobile Cloud Computing: An Exploratory Study
2020
Author(s) : Azah Anir Binti Norman Source :
SYMMETRY-BASEL
DOI :
10.3390/sym12122039
|
43. |
Sarcasm identification in textual data: systematic review, research challenges and open directions
2020
Author(s) : Azah Anir Binti Norman Source :
Artificial Intelligence Review
DOI :
10.1007/s10462-019-09791-8
|
44. |
Psychological motives of cyberbullying among Malaysian young adults
2020
Author(s) : Azah Anir Binti Norman Source :
Asia Pacific Journal of Social Work and Development
DOI :
10.1080/02185385.2020.1772101
|
45. |
Robots as Assistive Technology Tools to Enhance Cognitive Abilities and Foster Valuable Learning Experiences among Young Children with Autism Spectrum Disorder
2020
Author(s) : Azah Anir Binti Norman Source :
IEEE Access
|
46. |
The Effects of Applying Privacy by Design to Preserve Privacy and Personal Data Protection in Mobile Cloud Computing: An Exploratory Study
2020
Author(s) : Azah Anir Binti Norman Source :
Symmetry
DOI :
https://doi.org/10.3390/sym12122039
|
47. |
Privacy and data protection in mobile cloud computing: A systematic mapping study
2020
Author(s) : Azah Anir Binti Norman Source :
PloS one
|
48. |
Compliance with bring your own device security policies in organizations: A systematic literature review
2020
Author(s) : Miss Laiha Binti Mat Kiah, Azah Anir Binti Norman Source :
COMPUTERS & SECURITY
DOI :
10.1016/j.cose.2020.101998
|
49. |
The Use of Facebook by International Students for Information-seeking in Malaysia: A Social Network Analysis
2020
Author(s) : Norjihan Binti Abdul Ghani, Sri Devi A/p Ravana, Suraya Binti Hamid, Azah Anir Binti Norman Source :
LIBRI
DOI :
10.1515/libri-2019-0033
|
50. |
Psychological motives of cyberbullying among Malaysian young adults
2020
Author(s) : Azah Anir Binti Norman, Vimala A/p Balakrishnan Source :
ASIA PACIFIC JOURNAL OF SOCIAL WORK AND DEVELOPMENT
DOI :
10.1080/02185385.2020.1772101
|
51. |
Sarcasm identification in textual data: systematic review, research challenges and open directions
2020
Author(s) : Azah Anir Binti Norman, Nor Liyana Bt Mohd Shuib Source :
ARTIFICIAL INTELLIGENCE REVIEW
DOI :
10.1007/s10462-019-09791-8
|
52. |
Psychological motives of cyberbullying among Malaysian young adults
2020
Author(s) : Azah Anir Binti Norman Source :
Asia Pacific Journal of Social Work and Development
|
53. |
Socio-Technical Mitigation Effort to Combat Cyber Propaganda: A Systematic Literature Mapping
2020
Author(s) : Azah Anir Binti Norman Source :
IEEE Access
|
54. |
The use of Facebook by International Students for Information-seeking: A Social Network Analysis
2020
Author(s) : Azah Anir Binti Norman, Sri Devi A/p Ravana Source :
International Journal of Lib and Information Studies
|
55. |
Robots as Assistive Technology Tools to Enhance Cognitive Abilities and Foster Valuable Learning Experiences among Young Children With Autism Spectrum Disorder
2020
Author(s) : Azah Anir Binti Norman Source :
IEEE ACCESS
|
56. |
The Use of Facebook by International Students for Information-seeking in Malaysia: A Social Network Analysis
2020
Author(s) : Azah Anir Binti Norman Source :
LIBRI
|
57. |
The Effects of Applying Privacy by Design to Preserve Privacy and Personal Data Protection in Mobile Cloud Computing: An Exploratory Study
2020
Author(s) : Azah Anir Binti Norman Source :
SYMMETRY-BASEL
|
58. |
Compliance with bring your own device security policies in organizations: A systematic literature review
2020
Author(s) : Azah Anir Binti Norman Source :
COMPUTERS & SECURITY
|
59. |
The use of facebook by international students for information-seeking in Malaysia: A social network analysis
2020
Author(s) : Azah Anir Binti Norman Source :
Libri
|
60. |
Privacy and data protection in mobile cloud computing: A systematic mapping study
2020
Author(s) : Azah Anir Binti Norman Source :
PLOS ONE
DOI :
10.1371/journal.pone.0234312
|
61. |
Privacy and data protection in mobile cloud computing: A systematic mapping study
2020
Author(s) : Azah Anir Binti Norman Source :
PloS one
|
62. |
A Survey of User Profiling: State-of-the-Art, Challenges, and Solutions
2019
Author(s) : Azah Anir Binti Norman Source :
IEEE Access
|
63. |
A Survey of User Profiling: State-of -the-Art, Challenges, and Solutions
2019
Author(s) : Azah Anir Binti Norman Source :
IEEE ACCESS
|
64. |
Sarcasm Identification in Textual Data: Systematic Review, Research Challenges and Open Directions
2019
Author(s) : Nor Liyana Bt Mohd Shuib, Azah Anir Binti Norman Source :
Artificial Intelligence Review
DOI :
10.1007/s10462-019-09791-8
|
65. |
A Survey of User Profiling: State-of-the-Art, Challenges and Solutions
2019
Source :
IEEE Access
|
66. |
BYOD policy compliance: Risks and strategies in organizations.
2019
Source :
Journal of Computer Information Systems
DOI :
https://doi.org/10.1080/08874417.2019.1703225
|
67. |
Social media for environmental sustainability awareness in higher education
2017
Author(s) : Azah Anir Binti Norman Source :
INTERNATIONAL JOURNAL OF SUSTAINABILITY IN HIGHER EDUCATION
|
68. |
Social Media for Environmental Sustainability Awareness in Higher Education
2017
Author(s) : Azah Anir Binti Norman Source :
International Journal of Sustainability in Higher Education
|
69. |
Social media for environmental sustainability awareness in higher education
2017
Author(s) : Azah Anir Binti Norman Source :
International Journal of Sustainability in Higher Education
|
70. |
Social media for environmental sustainability awareness in higher education
2017
Author(s) : Suraya Binti Hamid, Azah Anir Binti Norman Source :
INTERNATIONAL JOURNAL OF SUSTAINABILITY IN HIGHER EDUCATION
|
71. |
Information systems security practices in social software applications A systematic literature review
2017
Author(s) : Suraya Binti Hamid, Azah Anir Binti Norman Source :
ASLIB JOURNAL OF INFORMATION MANAGEMENT
|
72. |
Studies on technology and halal food security: A review
2017
Author(s) : Azah Anir Binti Norman Source :
Pertanika Journal of Social Sciences and Humanities
|
73. |
Information systems security practices in social software applications: a systematic literature review
2017
Author(s) : Azah Anir Binti Norman, Suraya Binti Hamid Source :
ASLIB Journal of Information Management
|
74. |
Information systems security practices in social software applications A systematic literature review
2017
Author(s) : Azah Anir Binti Norman Source :
ASLIB JOURNAL OF INFORMATION MANAGEMENT
|
75. |
Information systems security practices in social software applications: A systematic literature review
2017
Author(s) : Azah Anir Binti Norman Source :
Aslib Journal of Information Management
|
76. |
Cyber-volunteering: Social media affordances in fulfilling NGO social missions
2016
Author(s) : Azah Anir Binti Norman Source :
Computers in Human Behavior
|
77. |
Role of social media in information-seeking behaviour of international students A systematic literature review
2016
Author(s) : Azah Anir Binti Norman Source :
Aslib Journal of Information Management
|
78. |
Role of social media in information-seeking behaviour of international students: A systematic literature review
2016
Author(s) : Azah Anir Binti Norman Source :
Aslib Journal of Information Management
|
79. |
Role of social media in information-seeking behaviour of international students A systematic literature review
2016
Author(s) : Sarah Bukhari, Sri Devi A/p Ravana, Mohamad Taha Ijab, Suraya Binti Hamid, Azah Anir Binti Norman Source :
Aslib Journal of Information Management
DOI :
10.1108/AJIM-03-2016-0031
|
80. |
CYBER-VOLUNTEERING: SOCIAL MEDIA AFFORDANCES IN FULFILLING NGO SOCIAL MISSIONS
2016
Author(s) : Mohd Yakub @ Zulkifli Bin Mohd Yusoff, Siti Soraya Binti Abdul Rahman, Azah Anir Binti Norman, Raja Jamilah Binti Raja Yusof Source :
Computers in Human Behavior
|
81. |
Cyber-volunteering: Social media affordances in fulfilling NGO social missions
2016
Author(s) : Azah Anir Binti Norman Source :
Computers in Human Behavior
|
82. |
Role of social media in information-seeking behaviour of international students A systematic literature review
2016
Source :
Aslib Journal of Information Management
|
83. |
Cyber-volunteering: Social media affordances in fulfilling NGO social missions
2016
Author(s) : Mohd Yakub @ Zulkifli Bin Mohd Yusoff, Raja Jamilah Binti Raja Yusof, Siti Soraya Binti Abdul Rahman, Azah Anir Binti Norman Source :
COMPUTERS IN HUMAN BEHAVIOR
DOI :
10.1016/j.chb.2015.12.029
|
84. |
Application of wasatiyyah Concept in Public Administration Performance Appraisal System in Malaysia
2015
Author(s) : Ilhaamie Binti Abdul Ghani Azmi, Raja Jamilah Binti Raja Yusof, Sharifah Hayaati Binti Syed Ismail, Siti Arni Binti Basir, Azah Anir Binti Norman Source :
Advanced Science Letters
|
85. |
Application of wasatiyyah concept in public administration performance appraisal system in Malaysia
2015
Author(s) : Azah Anir Binti Norman Source :
Advanced Science Letters
|
86. |
Information Systems Security Management (ISSM) Maturity Factors In E-Commerce Malaysia
2013
Author(s) : Azah Anir Binti Norman, Norizan Binti Mohd Yasin |
87. |
An RFID-Based Validation System for Halal Food
2011
Author(s) : Azah Anir Binti Norman Source :
International Arab Journal of Information Technology
|
88. |
An RFID-based validation system for Halal Food
2011
Author(s) : Azah Anir Binti Norman Source :
International Arab Journal of Information Technology
|
89. |
An RFID-Based Validation System for Halal Food
2011
Author(s) : Shukor Sanim Mohd Fauzi, Masliyana Azmi, Mohd Hairul Nizam Bin Md Nasir, Azah Anir Binti Norman Source :
The International Arab Journal of Information Technology
|
90. |
An RFID-Based Validation System for Halal Food
2011
Author(s) : Azah Anir Binti Norman Source :
International Arab Journal of Information Technology
|
91. |
An Analysis of Information Systems Security Management (ISSM): The Hierarchical Organizations vs. Emergent Organization
2010
Author(s) : Azah Anir Binti Norman, Norizan Binti Mohd Yasin Source :
International Journal for Digital Society (IJDS)
|
92. |
A Critical Review of Information Systems Security Management (ISSM) Implementation: Comparison between Stable Organizations and Emergent Organizations.
2010
Author(s) : Azah Anir Binti Norman, Norizan Binti Mohd Yasin Source :
International Journal of Digital Society
|
93. |
Towards a Flexible Tool for Supporting Data
Collection & Analysis in Personal Software
Process(PSP).
2008
Source :
WSEAS TRANSACTIONS ON INFORMATION SCIENCE & APPLICATIONS
|
94. |
The users perceptions and opportunities in Malaysia in introducing RFID system for Halal food tracking
2008
Author(s) : Azah Anir Binti Norman Source :
WSEAS Transactions on Information Science and Applications
|
95. |
Storyboards Based on Instructional Design Principles: A Tool for Creating e-Learning Content
2008
Author(s) : Wan Adli Ridzwan Wan Hassan, Norizan Binti Mohd Yasin, Suraya Binti Hamid, Azah Anir Binti Norman |
96. |
The Users Perceptions and Opportunities in
Malaysia in Introducing RFID System for Halal
Food Tracking
2008
Author(s) : Masliyana Azmi, Azah Anir Binti Norman, Mohd Hairul Nizam Bin Md Nasir Source :
WSEAS Transactions on Information Science & Applications
|
97. |
E-Kalkulator: A Proposed Prototype for Online Self Assessment System in Malaysia
2007
Author(s) : Azah Anir Binti Norman Source :
Cyberscape Journal
|
98. |
Online insurance policies recommender with case-based reasoning (MyINS)
2007
Author(s) : Azah Anir Binti Norman Source :
WSEAS Transactions on Computers
|
99. |
Siti Soraya Abdul Rahman, Azah Anir Norman, Koh Joe Soon, Online Insurance Policies Recommender with Case-Based Reasoning (MyINS), WSEAS Transactions on Computers, Issue 3, Volume 6, March 2007 ISSN 1109-2750
2006
Author(s) : Azah Anir Binti Norman Source :
WSEAS Transactions On Computers
|
CHAPTER IN BOOK
NO | DETAILS OF CHAPTER IN BOOK |
---|---|
1. |
A review of security awareness approaches: Towards achieving communal awareness. In Cyber Influence and Cognitive Threats
2020
Author(s) : Azah Anir Binti Norman, Norjihan Binti Abdul Ghani |
PROCEEDING
NO | DETAILS OF PROCEEDING |
---|---|
1. |
A Comparative Review of ISMS Implementation Based on ISO 27000 Series in Organizations of Different Business Sectors
2019
Author(s) : Azah Anir Binti Norman |
2. |
A Review of Security Awareness Approach: Ensuring Communal Learning
2018
Author(s) : Azah Anir Binti Norman, Norjihan Binti Abdul Ghani |
3. |
Security Threats and Techniques in Social Networking Sites: A Systematic Literature Review
2017
Author(s) : Azah Anir Binti Norman, Suraya Binti Hamid |
4. |
Information System Security Management for the Holy Quran: An Approach towards Reliability of the Holy Quran Online Applications
2013
Author(s) : Azah Anir Binti Norman |
5. |
Systems Security Management (ISSM) Success Factor: Retrospection from the Scholars
2012
Author(s) : Azah Anir Binti Norman |
6. |
An Analysis of Information Systems Security Management (ISSM): The Hierarchical Organizations vs. Emergent Organization.
2009
Author(s) : Azah Anir Binti Norman |
7. |
RFID Tag for Halal Food Tracking in Malaysia: Users Perceptions and Opportunities
2008
|
8. |
Electronic Payment System Initiatives in Selected Countries in the World: A Brief Comparison
2007
Author(s) : Azah Anir Binti Norman |
9. |
E-tax Payer System: A Proposed Prototype for Online Self-Assessment System in Malaysia
2007
Author(s) : Azah Anir Binti Norman |
10. |
Knowledge Management Adoption and Implementation Readiness: A Case Study of the National Library of Malaysia
2007
Author(s) : Azah Anir Binti Norman |
11. |
Leveraging the Radio Frequency Identification (RFID) Technology in Building Halal Tracking System In Malaysia Food Market.
2007
|
12. |
Leveraging the Radio Frequency Identification (RFID) Technology in Building Halal Tracking System in Malaysia Food Market
2007
Author(s) : Azah Anir Binti Norman |
13. |
Suraya Hamid, Azah Anir Norman, \"Mentoring System For New Academicians in Higher institution: A Framework, Seminar IT di Malaysia 2006, Primula Beach Resort Hotel, Terengganu, organized by UiTM Terengganu, 19-20 August 2006.
2006
Author(s) : Azah Anir Binti Norman |
14. |
Siti Soraya Abdul Rahman, Azah Anir Norman, Koh Joe Soon MyINS: A CBR e-Commerce Application for Insurance Policies, 5th WSEAS International Conference on E-ACTIVITIES Venice Italy, 20-22 November 2006
2006
Author(s) : Azah Anir Binti Norman |
15. |
The Evolution of Threats in E-Commerce: Types of Threats and Countermeasures
2006
Author(s) : Azah Anir Binti Norman |
16. |
Suraya Hamid, Azah Anir bt Norman, \"Implementation of Community of Practices (COPs) in Local Organisations \", The first International Conference on e-Learning 2006. e-Learning: A New Era in Learning and Culture, Crown Plaza Bahrain Conference Center, organized by University of Bahrain 17-19 April 2006.
2006
Author(s) : Azah Anir Binti Norman |
17. |
Leveraging Radio Frequency Identification (RFID) for Halal Tracking Tag
2005
Author(s) : Azah Anir Binti Norman |
RESEARCH PROJECT
GRANT | PROGRESS | STATUS |
---|---|---|
Bingkas: E-marketplace For Subsidised Goods For The B40
Researcher(s) : Dr. Roziana Binti Ramli |
|
on going |
Reconstructing Personal Data Protection And Information Security Of Wearable Healthcare Devices Under The Concept Of Free Flow Of Data
Researcher(s) : Wan-ju Yeh |
|
end |
Organizational Performance Framework In The Use Of Halal Food Management System
Researcher(s) : Associate Prof. Dr. Suraya Binti Hamid, Abulwafa Muhammad |
|
end |
A Socio-cognitive Framework On Technology Usage For Sustainable Health And Well-being Throughout The Covid 19 Pandemic
Researcher(s) : Associate Prof. Dr. Suraya Binti Hamid, Noreen Izza Binti Arshad |
|
end |
Bring Your Own Device (byod) Security Policy Compliance Framework For The Malaysia Public Sector
Researcher(s) : Prof. Ts. Dr. Miss Laiha Binti Mat Kiah |
|
end |
Social Enterprise Security Governance: Developing An Information Security Maturity Framework For The Social Entrepreneurs
Researcher(s) : Associate Prof. Dr. Norjihan Binti Abdul Ghani, Associate Prof. Dr. Ezlika Binti Mohd Ghazali, Nurul Nuha Abdul Molok, Shuhaili Talib |
|
end |
Cyberbullying in Social Media: Prevention using Cyber Security Awareness Framework integrated with Islamic Perspectives
Researcher(s) : - |
|
end |
Cyber-propaganda : A Netnographic Study To Define The Ripple Effect Of Content Specific Information Sharing In The Social Media
|
|
end |
The Impacts of Security of Social Media in NGO Activities
Researcher(s) : - |
|
end |
Information System Security Management For The Holy Quran : An Approach Towards Online Applications
|
|
end |
RESEARCH COLLABORATOR
GRANT | PROGRESS | STATUS |
---|---|---|
Theory-Driven Design Framework for an Orthodonitic Mobile Application to Support Patient'S Compliance
|
|
on going |
Poverty Ageing And Loneliness (pre-research)
|
|
end |
We Think Digital Ambassador Program
|
|
end |
An Emerging Technology Framework For The Healthy Lifstyle Of Middle-aged Persons
|
|
end |
Model Kesolehan Digital Dalam Interaksi Sosial Kalangan Pengguna Di Era Ir 4.0
Researcher(s) : Prof. Dr. Che Zarrina Binti Sa'ari, Associate Prof. Dr. Azah Anir Binti Norman, Mohd Anuar Bin Mamat, Associate Prof. Dr. Mohd Anuar Bin Ramli |
|
end |
Equiping Science Teachers With Autrhentic Technology-enhanced Classroom Based Assessment (cba) Tool For Assessing Young Stem Learners
|
|
end |
Profiling Foreign Students Using Social Network Analysis For Security Surveillance
Researcher(s) : Prof. Dr. Abdullah Bin Gani, Associate Prof. Dr. Norjihan Binti Abdul Ghani, Mohamad Taha Bin Ijab, Prof. Ts. Dr. Rafidah Binti Md Noor, Ibrahim Abaker Targio Hashem, Associate Prof. Dr. Azah Anir Binti Norman |
|
end |
Social Entrepreneurship Learning Model On University Graduates
Researcher(s) : Associate Prof. Dr. Azah Anir Binti Norman, Associate Prof. Dr. Farrah Dina Binti Yusop, Assoc. Prof. Dr Shanton Chang , Assoc. Prof. Dr. Wan Fauzi @ Wan Fauziah Binti Wan Yusoff, Mohamad Taha Bin Ijab |
|
end |
Uncovering The Drivers Of Social Entrepreneurial Intent Of Millenials
|
|
end |
Walking As A Green Transportation Mode In University Of Malaya Campus
|
|
end |
Wasatiyyah Sebagai Suatu Alat Pengukuran Penilaian Prestasi Dalam Pentadbiran Awam Di Malaysia
|
|
end |
Information Seeking Behaviour Using Social Technologies : The Perspective Of International Students In Higher Education
|
|
end |
Access Control Policy Specification for Web commerce
Researcher(s) : Associate Prof. Dr. Azah Anir Binti Norman |
|
end |