Nik Nor Farah Annysa Husin, N. Zakaria, Halina Mohamed Dahlan
{"title":"Factors Influencing Open Data Adoption in Malaysia Based on Users Perspective","authors":"Nik Nor Farah Annysa Husin, N. Zakaria, Halina Mohamed Dahlan","doi":"10.1109/ICRIIS48246.2019.9073396","DOIUrl":"https://doi.org/10.1109/ICRIIS48246.2019.9073396","url":null,"abstract":"Open Data (OD) has become a necessity in developing countries as it can beneficial to all kinds of organizations; either government agencies or public sectors. OD consist all sorts of data like education, health, environment, transport, and agriculture with free access to the public However, the usage of OD is found to be low among users in Malaysia. In order to gain benefits of OD, this paper aims to identify the factors that influence OD adoption among users in Malaysia. Therefore, the paper begins by identifying the factors related to the adoption of OD from previous researches. Next, the frequency for each factor is examined. The findings indicated that Social Influence, Facilitating Condition, Perceived Ease of Use, Trust, Performance Expectancy, Effort Expectancy and Voluntariness of Use, which has the highest frequency, are selected as the factors that can influence OD adoption in Malaysia. Based on the identified factors, an OD adoption model for Malaysia will be developed. This study will assist Malaysian government to increase OD adoption among users, to be eventually bettered for future use by the users.","PeriodicalId":294556,"journal":{"name":"2019 6th International Conference on Research and Innovation in Information Systems (ICRIIS)","volume":"116 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132720541","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Siti Zubaidah Mohd Zain, Ab Razak Che Hussin, Md. Hafiz Selamat
{"title":"Derivation of Hashtag (#) Factors for Hashtag Marketing Model (HASHMAM) in Social Media Platform","authors":"Siti Zubaidah Mohd Zain, Ab Razak Che Hussin, Md. Hafiz Selamat","doi":"10.1109/ICRIIS48246.2019.9073657","DOIUrl":"https://doi.org/10.1109/ICRIIS48246.2019.9073657","url":null,"abstract":"Online marketing recently is close to social media platforms because from the past few years the phenomenon of social media had appeared and done conquer users all around the world such as the story of Facebook. This situation had brought the opportunity to the marketing field by getting involved in promoting any existing business on social media platforms. This is referred to as the issues of social media marketing. Unfortunately, the lacks of guidelines make the social media marketing approach still have gaps to be filling up. The main problem exists when the marketer has less of followers or friends on social media. Even though the status mode already on public view, but if the marketers are not well known then only a few social media users going to view their marketing status. To solve this problem, the guideline which can improve and increase the level of spreading the marketing status on social media as effectively is significantly needed. This is where the Hashtag can play an important role. This paper is the aim on how to develop a Hashtag marketing model which contains the Hashtag factors for social media marketing as the main components. Those factors were been figured out by the analysis of systematic literature reviews method and later be significantly implement for the enhancement of knowledge regarding a new contribution on online marketing field for social media platforms which becomes the phenomenon evolution recently.","PeriodicalId":294556,"journal":{"name":"2019 6th International Conference on Research and Innovation in Information Systems (ICRIIS)","volume":"231 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131737641","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Y. Y. Jusoh, Salfarina Abdullah, I. M. Ali, Mohamad Hazim Mat Noh, Muhammad Sirajuddin Mazlan, Cheikh Sad Bouh, Tan Zhong Sheng
{"title":"Adoption of Agile Software Methodology Among the SMEs Developing an IOT Applications","authors":"Y. Y. Jusoh, Salfarina Abdullah, I. M. Ali, Mohamad Hazim Mat Noh, Muhammad Sirajuddin Mazlan, Cheikh Sad Bouh, Tan Zhong Sheng","doi":"10.1109/ICRIIS48246.2019.9073678","DOIUrl":"https://doi.org/10.1109/ICRIIS48246.2019.9073678","url":null,"abstract":"Agile software methodology framework has been used frequently in the software development industry especially among the small medium (SME) companies. In this paper, we conducted a case study among the four selected SME companies that have been developing the Internet of Things application (IoT) as their business core. The results found that all the companies under study are using extreme programming (XP), Dynamic System Development Methodology (DSDM), Feature Driven Development (FDD) and Lean as chosen development methodology. However, the most used agile methodology framework is the Scrum techniques. The study shows that companies applied Agile SDM. This is because, the Agile SDM help the software developer teams to organize their task efficaciously, and able to make frequent delivery to their stakeholders and users.","PeriodicalId":294556,"journal":{"name":"2019 6th International Conference on Research and Innovation in Information Systems (ICRIIS)","volume":"190 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133032316","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Nursahirul Kadir, H. Sarkan, A. Azmi, O. Yusop, M. Kama
{"title":"Specification of a Hybrid Effort Estimation System using UML","authors":"Nursahirul Kadir, H. Sarkan, A. Azmi, O. Yusop, M. Kama","doi":"10.1109/ICRIIS48246.2019.9073665","DOIUrl":"https://doi.org/10.1109/ICRIIS48246.2019.9073665","url":null,"abstract":"Software effort estimation (SEE) predicts the amount of effort needed to develop software and this information is important for a project manager to make good decisions when confronted with requirement change requests during the development. However, SEE can predict accurate development effort only if the project data is complete and stable. In real project, this is not the case and becomes a very challenging issue. Inaccurate effort estimation will result in lots of difficulties in managing a software project, hence the project’s failure rate increases. Both algorithmic and nonalgorithmic methods in SEE have their respective advantages and limitation. This paper presents a hybrid approach combining algorithmic and non-algorithmic SEE methods to propose a more accurate decision to the project manager when a requirement change is requested by a stakeholder. This hybrid model is translated into an effort estimation system that allows software estimation experts to intervene in the numerical estimation calculation to propose a more accurate effort estimation to help the project manager make a better decision to accept or not the change request. In this paper Unified Modeling Language (UML) is used to prepare the software specifications of the hybrid system, resulting in the complete documentation of the system’s Software Requirement Specifications (SRS).","PeriodicalId":294556,"journal":{"name":"2019 6th International Conference on Research and Innovation in Information Systems (ICRIIS)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122553389","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Role of ICT in Project-Based Learning: A Literature Review","authors":"Salihu Abdulkadir, S. Miskon, N. S. Abdullah","doi":"10.1109/ICRIIS48246.2019.9073379","DOIUrl":"https://doi.org/10.1109/ICRIIS48246.2019.9073379","url":null,"abstract":"The term project-based learning refers to the involvement of a group of students for completing a project in achieving deep understanding and therefore getting different learning outcomes. One of the major challenges of preparing for PBL is to ensure that students have adequate research resources and are prepared to conduct their research and connect with mentors. ICT is an established acronym for the word Information and Communication Technology used widely as different forms for multi-purposes. It includes several innovations and technological tools used to interact, distribute, store and handle data. Use of ICT in colleges by students and teachers have now become a requirement because it could be used to improve the performance of effective teaching and learning in any tertiary institutions. This paper provides a discussion regarding using Project-based learning in teaching through the application of ICT, and the need for PBL. Finally, this paper proposes some recommendations for the growth of ICT knowledge in the teaching practice of the institution.","PeriodicalId":294556,"journal":{"name":"2019 6th International Conference on Research and Innovation in Information Systems (ICRIIS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125890616","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Enhanced Net Valence Model (NVM) for the Adoption of Autonomous Vehicles (AVs) by Novice Drivers","authors":"Areej Ahmad A. Alshaafee, N. A. Iahad","doi":"10.1109/ICRIIS48246.2019.9073281","DOIUrl":"https://doi.org/10.1109/ICRIIS48246.2019.9073281","url":null,"abstract":"Autonomous Vehicles (AVs, Level 4) can drive themselves from point A to point B without the need for any interaction from the driver because they are able to sense the surrounding environment. The few studies on adopting AVs tend to be narrowly focused on experienced drivers who have held a full license for a long time; there is no research yet on the adoption of AVs by novice drivers. Moreover, none of the previous studies has used the Net Valence Model (NVM) in investigating AV adoption. Realizing this gap, the aim of this study is to investigate factors influencing the adoption by novice drivers of Level 4 AVs. A conceptual model is proposed by extending NVM with three constructs as independent variables: personal innovativeness, alternatives, and social influence. Based on the proposed conceptual model, 16 hypotheses have been formulated which will be tested in the next phase of this research.","PeriodicalId":294556,"journal":{"name":"2019 6th International Conference on Research and Innovation in Information Systems (ICRIIS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130919372","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Tacit Knowledge in Software Testing: A Systematic Review","authors":"Hariaty Mohd Idrus, N. Ali","doi":"10.1109/ICRIIS48246.2019.9073275","DOIUrl":"https://doi.org/10.1109/ICRIIS48246.2019.9073275","url":null,"abstract":"This paper presents a systematic review of tacit knowledge in software testing. The main objectives of conducting this systematic review is to identify and synthesize issues and challenges regarding tacit knowledge in software testing, its influential factors that affect the tacit knowledge creation, sharing, use and transfer among software testers, its impacts on software testing, and the research methods being undertaken by the selected reviewed studies. Systematic Literature Review (SLR) is used for reviewing 14 primary studies that focus specifically on tacit knowledge in software testing. This paper provides significant evidences on the importance of tacit knowledge in software testing that will direct further directions for knowledge management (KM) and software testing practitioners and researchers.","PeriodicalId":294556,"journal":{"name":"2019 6th International Conference on Research and Innovation in Information Systems (ICRIIS)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114201952","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Augmented Reality Mobile Application for Museum: A Technology Acceptance Study","authors":"T. G. Siang, K. A. Aziz, Z. Ahmad, S. Suhaifi","doi":"10.1109/ICRIIS48246.2019.9073457","DOIUrl":"https://doi.org/10.1109/ICRIIS48246.2019.9073457","url":null,"abstract":"The tourism sector in Malaysia is reported for losing its global competitiveness when the nation missed its tourism targets recently. Mirrored at the state level, the tourism performance of Melaka, a heritage city inscribed by the UNESCO, is also experiencing similar downward trend. The museums, which play a pivotal role in showcasing the local culture and history, have seen decreasing number of visitors. Inspired by Tourism 4.0, many museums are now using digital technologies to enrich visitors’ experience, such as augmented reality (AR). This is because the tourists are now becoming more tech-savvy and expecting culture and heritage to be presented lively rather than exhibited in dusty glass boxes. In the “When History Comes Alive” Project, an AR mobile app was developed for the People’s Museum in Melaka. Although tourism studies have widely discussed the managerial implications of AR, user’s acceptance of AR in the tourism context is still in its infancy. Hence, this study aimed to examine the factors affecting museum visitors’ behavioural intention to use the AR mobile app. A survey was conducted among 120 museum visitors. The findings showed that playfulness expectancy, content relevance expectancy, performance expectancy, effort expectancy, and social influence positively affect the respondents’ behavioural intention to use the AR mobile app with a high explanatory power of 61.2%. Significant managerial and practical implications to the developers of AR mobile app, tourism businesses and policy makers are highlighted in this paper. The limitations of the study and suggestions for future studies are also addressed.","PeriodicalId":294556,"journal":{"name":"2019 6th International Conference on Research and Innovation in Information Systems (ICRIIS)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114715012","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Amirul Nurshuhada, Romle Othman Mohd Yusop, Azri Azmi, Saiful Adli Ismail, H. Sarkan, Nazri Kama
{"title":"Enhancing Performance Aspect in Usability Guidelines for Mobile Web Application","authors":"Amirul Nurshuhada, Romle Othman Mohd Yusop, Azri Azmi, Saiful Adli Ismail, H. Sarkan, Nazri Kama","doi":"10.1109/ICRIIS48246.2019.9073617","DOIUrl":"https://doi.org/10.1109/ICRIIS48246.2019.9073617","url":null,"abstract":"The rapid growth of technology has boosted the usage of mobile devices to access a web application. These devices have various specifications such as screen sizes and resolutions. Responsive Web Design (RWD) approach bridges the gap of these differences by adapting the flexibility concept in screen sizes and resolutions, thus ensuring better website usability. Poor performance in website usability resulting in declination in number of users. Therefore several existing Usability Guidelines (UG) were invented mainly for a desktop-based website and unfortunately lesser studies have been carried out for a Mobile Web Application (MWA) especially the performance aspect of it. Henceforth, this paper focuses on enhancing the performance element of an existing UG by analysing, identifying, proposing, implementing, and measuring the new additional performance attributes in UG for MWA. We used First Contentful Paint (FCP), Speed Index (SI), Time to Interactive (TtI), First Meaningful Paint (FMP), First CPU Idle (FCI) and Estimated Input Latency (EIL) to measure the performances of two case studies and the result shows better score at 90-100 (fast-GREEN) with the proposed performance attributes compared to another website without it which averages at 50-S9 (average-ORANGE) range.","PeriodicalId":294556,"journal":{"name":"2019 6th International Conference on Research and Innovation in Information Systems (ICRIIS)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129213290","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Surayahani Hasnul Bhaharin, U. A. Mokhtar, R. Sulaiman, M. Yusof
{"title":"Issues and Trends in Information Security Policy Compliance","authors":"Surayahani Hasnul Bhaharin, U. A. Mokhtar, R. Sulaiman, M. Yusof","doi":"10.1109/ICRIIS48246.2019.9073645","DOIUrl":"https://doi.org/10.1109/ICRIIS48246.2019.9073645","url":null,"abstract":"In the era of Industry 4.0 (IR 4.0), information leakage has become a critical issue for information security. The basic approach to addressing information leakage threats is to implement an information security policy (ISP) that defines the standards, boundaries, and responsibilities of users of information and technology of an organization. ISPs are one of the most commonly used methods for controlling internal user security behaviours, which include, but not limited to, computer usage ethics; organizational system usage policies; Internet and email usage policies; and the use of social media. Human error is the main security threat to information security, resulting from negligence, ignorance, and failure to adhere to organizational information security policies. Information security incidents are a problem related to human behaviour because technology is designed and operated by humans, presenting the opportunities and spaces for human error. In addition to the factor of human error as the main source of information leakage, this study aims to systematically analyse the fundamental issues of information security policy compliance. An analysis of these papers identifies and categories critical factor that effect an employee’s attitude toward compliance with ISP. The human, process, technology element and information governance should be thought as a significant scope for more efficiency of information security policy compliance and in any further extensive studies to improve on information security policy compliance. Therefore, to ensure these are properly understood, further study is needed to identity the information governance that needs to be included in organizations and current best practices for developing an information security policy compliance within organizations.","PeriodicalId":294556,"journal":{"name":"2019 6th International Conference on Research and Innovation in Information Systems (ICRIIS)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116488603","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}