{"title":"Predictive Analytics on Scheduled Surgery Cases in Forecasting the Operating Theatre Utilisation","authors":"Nurul Atiekah Ab Rashid, Suraya Ya'acob","doi":"10.11113/oiji2021.9n1.20","DOIUrl":"https://doi.org/10.11113/oiji2021.9n1.20","url":null,"abstract":"The scheduled surgery cases, allocation of clinical provider, machine, equipment, preparation time, surgery performance, and patient recovery give the big impact on OT utilization. Low OT utilization due to no show patient and scheduling bottleneck interrupt patient flow in clinical process. It also decreases the admission to the OT and wastage of resources. In order to improve the capacity of OT, the logical solution need to be carried out is utilization audit. The trend of scheduled surgery cases has identified, and element affect the OT capacity have used to predict the OT optimization for future planning. The purpose of this study is to investigate efficiency of operating theatre (OT) utilization in healthcare institution and the application predictive analytics on its daily operational data. OT contribute to the revenue for the hospital and workload. This project use machine learning in identify which model can use to predict the decision of admission to which facility after the surgery. The model has been going through a few mathematical reasoning to getting the usage efficiency on the dataset. The result shows that Support Vector Machine (SVM) got the highest accuracy in test data rather than Logistic Regression (LR) and Random Forest Classifier. SVM used to predict the admission decision, which contribute to the surgery scheduling in OT. This project can be extended to the admission decision with the factor or severity of patient condition to undergo any intervention in outpatient.","PeriodicalId":379468,"journal":{"name":"Open International Journal of Informatics","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122081076","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Muhammad Farhan Shahrom, N. Maarop, Ganthan Narayana Samy, N. H. Hassan, Fiza Abdul Rahim, Pritheega Magalingam, N. Kamaruddin
{"title":"A Pilot Analysis of Factors Affecting Defense Against Social Engineering Attacks in the Armed Forces Environment","authors":"Muhammad Farhan Shahrom, N. Maarop, Ganthan Narayana Samy, N. H. Hassan, Fiza Abdul Rahim, Pritheega Magalingam, N. Kamaruddin","doi":"10.11113/oiji2021.9n1.28","DOIUrl":"https://doi.org/10.11113/oiji2021.9n1.28","url":null,"abstract":"Social engineering is a technique of deceiving people into giving away confidential information that could be useful to gain unauthorized access to an information system. Even to the most secured system, social engineering is a formidable threat. It is one of the most devastating threats to organizations and businesses. Unlike traditional hacking, social engineering is less or non-technological. It manipulates characteristics of human nature, exploiting people’s desire to be kind and helpful. The psychology leverage makes social engineering hard to defend against. This paper presents the identification of factors related to social engineering in the context of armed forces through a review of related literature. Prior works from previous studies are discussed, and factors have been identified based on certain criterion. This study executed a pilot analysis on 30 samples of respondents among Malaysian armed forces personnel. As a result, nine factors are identified that may affect defense against social engineering in the armed forces: Authority, Reciprocation, Commitment and Consistency, Diffusion of Responsibility, Scarcity, Friendliness and Liking, Awareness, Social Proof, and Trust.","PeriodicalId":379468,"journal":{"name":"Open International Journal of Informatics","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117332764","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Abduurrahim H El Hejjaji, Suriani Mohd Sam, Norliza Mohamed, K. Kamardin, N. Ahmad, Y. Md Yusof
{"title":"Energy consumption in wireless IoT- A Review","authors":"Abduurrahim H El Hejjaji, Suriani Mohd Sam, Norliza Mohamed, K. Kamardin, N. Ahmad, Y. Md Yusof","doi":"10.11113/oiji2021.9n1.2","DOIUrl":"https://doi.org/10.11113/oiji2021.9n1.2","url":null,"abstract":"The Internet of Things (IoT) is a rising innovation, including a wide range of uses identified with modern control, savvy metering, home mechanization, horticulture, health, etc. For these applications to run independent the IoT gadgets are required to make do for a considerable length of time and years under severe vitality imperatives. When growing such applications, it is significant for the application to think about its own energy consumption. In this work, we propose and assess an energy consumption estimation approach for occasional detecting applications running on the IoT gadgets. Our methodology depends on three stages. In the main stage, we distinguish the unmistakable exercises, for example, rest, transmit, detect and process in a detecting cycle. In the subsequent stage, we measure the power consumption of these exercises before the IoT gadget has been conveyed in the arrange. The third stage happens at run-time once the IoT gadget has been sent, to convey the energy consumption of a detecting cycle. The energy consumption is determined by utilizing the exercises control and their spans acquired at run-time. The proposed methodology is basic and conventional on the grounds that it doesn’t include any intricate equipment for runtime control estimation. Besides, this methodology likewise consolidates the dynamic idea of detecting applications by run-time estimation of energy consumption.","PeriodicalId":379468,"journal":{"name":"Open International Journal of Informatics","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127605342","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Systematic Literature Review of Crime Prevention Through Environmental Design Principles Against Banks ATM Physical Security Effectiveness","authors":"H. Tan, H. Abas, N. Shafie","doi":"10.11113/oiji2021.9n1.19","DOIUrl":"https://doi.org/10.11113/oiji2021.9n1.19","url":null,"abstract":" \u0000Technology development never sleeps, humans creating more high-tech devices for society to use. Swift movement of technology growth has changed the conceptual design of the physical security control, location landscape, human behaviors factor, and perimeter controls are the factors to determine the security posture of the location. Hence, the rise of the new financial digital banking ecosystem has raised significant new concerns to bank consumers. In order to study the control measurement of current banking industry effectiveness by using the systematic literature review (SLR) to conduct the research that published in the digital library through world wide web. In short, maintaining the principle, policy guideline, and standard framework shall continue review periodically to identify the control measurement effectiveness. \u0000 ","PeriodicalId":379468,"journal":{"name":"Open International Journal of Informatics","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127167817","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Roslinda Mohamed, H. Abas, N. H. Hassan, Saiful Adli Ismail
{"title":"Systematic Literature Review: Factor For Physical Security And Access Control in Maximun Security Protection","authors":"Roslinda Mohamed, H. Abas, N. H. Hassan, Saiful Adli Ismail","doi":"10.11113/oiji2021.9n1.5","DOIUrl":"https://doi.org/10.11113/oiji2021.9n1.5","url":null,"abstract":"Physical security and access control as one of the installations should be upgraded to confirm the security and readiness of the asset belong to the group to continue safely. As the quick development in technology offers a boundless defence level for physical security and access control in the office, every organization must offer a passable budget pertinent to the transformation of the world today. Through a very humane approach of natural surveillance, access control, maintenance, and reinforcements of territory, this strategy will contribute to the field of physical security as a whole. The purpose of this paper is to recognize the features that regulate taking for perimeter protection and access control in maximum were identified and analysed. The findings have revealed that five categories of features can be used to study the taking for perimeter protection and access control in maximum security protection: physical security; access control; security standard and policy; security awareness program and security training and security protection. A Systematic Literature Review (SLR) was accepted since it uses a more rigorous and well-defined method to swotting the study indication pertinent to the study. Initially, 62 papers were retrieved by a manual search in six databases and 17 primary studies were finally included. Consequently, 5 factors education.\u0000 ","PeriodicalId":379468,"journal":{"name":"Open International Journal of Informatics","volume":"13 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133700488","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
N. A. Abu Bakar, Mardiana Abu Hassan, N. H. Hassan
{"title":"IoT in Banking: The trends, threats, and solution","authors":"N. A. Abu Bakar, Mardiana Abu Hassan, N. H. Hassan","doi":"10.11113/oiji2021.9n1.25","DOIUrl":"https://doi.org/10.11113/oiji2021.9n1.25","url":null,"abstract":"The Internet of Things is the next step of the digital revolution that will change consumers' lives. The Internet of Things promises to be a worthy representative of an open course in technology, economics, and culture. IoT, without a doubt, has a promising future. The modern consumer actions and uses represent inescapable digital transformations for banking institutions. Emerging digital world developments guide all banking services' digital transformation. However, the security threats of using IoT in banking are increasing. Cybercriminals such as hacking, corruption, and financial violence, data breaches, and financial expenditure risks will continue to trouble the use of IoT in banking. Therefore, this research aims to study the banking industry's existing IoT uses, issues, and challenges in adopting the IoT in the banking industry. IoT threats are highlighted in this paper. This article sets out a model dimension of the process monitoring framework for IoT security risk management. Other than that, this paper also studies the existing security risk management model of IoT in banking. Moreover, preventive IoT protection initiatives and approaches to enhance IoT protection by implementing blockchain technology and Control Model Information Structure are addressed in this article","PeriodicalId":379468,"journal":{"name":"Open International Journal of Informatics","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129705127","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}