Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Fiza Abdul Rahim is active.

Publication


Featured researches published by Fiza Abdul Rahim.


international conference on research and innovation in information systems | 2013

Information privacy concerns in electronic healthcare records: A systematic literature review

Fiza Abdul Rahim; Zuraini Ismail; Ganthan Narayana Samy

The concerns in healthcare services is needed to deal with privacy and data security risks in handling electronic healthcare records (EHR). With the limitation of the existing literature dealing with number of factors that influence information privacy concerns in EHR, the main objective of this study is to review recent studies on information privacy concerns in EHR and then also to categorize the related factors. A total of 199 articles were extracted using a predefined search string. A quality criterion was applied on this set of articles, a total of 18 articles were determined for further analysis. Nine factors were found to influence information privacy concerns. However, two factors, namely information dissemination and computer literacy were commonly revealed as factors attributing to information privacy concerns in the healthcare domain. The unit of analysis was further examined from two perspectives; healthcare practitioners and patients.


Archive | 2019

Smart Verification Algorithm for IoT Applications using QR Tag

Abbas M. Al-Ghaili; Hairoladenan Kasim; Fiza Abdul Rahim; Zul-Azri Ibrahim; Marini Othman; Zainuddin Hassan

A Smart Verification Algorithm (SVA) used with Internet of Things (IoT) applications is proposed performing a verification procedure to enable authorized requests by user to access a smart system with help of Quick Response (QR) tag. It uses encrypted QR-tag values to compare them to original values. Three-layers have been proposed for this verification procedure to attain security objectives. The first layer implements a comparison to preserve the system integrated. In the second layer, original values are stored in offline database storage to disable any access caused by threats; to preserve it available. The third one frequently generates an authenticated QR tag using 1-session private key to prevent both information leakage and an unauthorized access if the key was deduced; to keep it confidential. The SVA aims to increase the system privacy. It is evaluated in terms of security factors. Results confirm that it is faster than other competitive techniques. Additionally, results have discussed SVA’s robustness against unauthorized access’s attempts and brute force attack.


International Conference of Reliable Information and Communication Technology | 2018

Factors Influencing Information Security Awareness of Phishing Attacks from Bank Customers’ Perspective: A Preliminary Investigation

Ayman Asfoor; Fiza Abdul Rahim; Salman Yussof

Phishing is the act of sending e-mails pretending to be from genuine financial organizations and requesting private info such as username and password. Information security awareness of phishing attacks becomes the first line of data protection defence. Human factors are recognized as the main factors in addressing the issue of information security in online banking. Thus, identifying the issues and factors that influence information security awareness of phishing attacks are important. A preliminary investigation involving nine (9) professionals and academics using online banking has been conducted to obtain better understanding of the critical factors that may influence the information security awareness of phishing attacks. In-depth interview method is selected in this study. Thematic coding was conducted to characterise the themes and assess the factors found to be most influential. Results from the in-depth interviews with customers experienced in online banking showed that there are six (6) main themes may influence the degree to which information security may be learned. Security concerns, security attentiveness, user competency, computer knowledge, gender as well as the number of years of PC usage are the themes addressed by the key informants. These factors influence information security awareness of phishing attacks from the perspective of bank customers. In this investigation, we expect that the rate of phishing depends on six (6) principal factors likely to be prey to malicious phishers. This can be considered as the correlation between the background of the bank customers and their understanding in deploying online banking safety.


Advanced Science Letters | 2014

Information privacy concerns in the use of social media among healthcare practitioners: A systematic literature review

Fiza Abdul Rahim; Zuraini Ismail; Ganthan Narayana Samy


International journal of security and its applications | 2018

A Qualitative Analysis of Information Privacy Concerns among Healthcare Employees

Fiza Abdul Rahim; Gopinath Muruti; Zuraini Ismail; Ganthan Narayana Samy


Advanced Science Letters | 2018

Developing an Information Privacy Concerns Model for Protecting Consumers’ Personal Data in Energy Sector

Fiza Abdul Rahim; Asmidar Abu Bakar; Ramona Ramli


Advanced Science Letters | 2018

Efficient Cryptographic-Based Technique for Privacy Preservation in Industries Practising Big Data

Asmidar Abu Bakar; Ramona Ramli; Fiza Abdul Rahim


Advanced Science Letters | 2018

Privacy Preserving Technique for Smart Metering Data: A Preliminary Result

Fiza Abdul Rahim; Asmidar Abu Bakar; Salman Yussof; Ramona Ramli; Roslan Ismail; Busyra Mohamad Yusof


Advanced Science Letters | 2018

Motion Activated Security Camera Using Raspberry Pi: An IoT Solution for Room Security

Gopinath Muruti; Fiza Abdul Rahim; Md. Nabil Ahmad Zawawi


Advanced Science Letters | 2018

A Review of Big Data Digital Forensic Analysis in Advanced Metering Infrastructure

Zul-Azri Ibrahim; Fiza Abdul Rahim; Roslan Ismail; Asmidar Abu Bakar

Collaboration


Dive into the Fiza Abdul Rahim's collaboration.

Top Co-Authors

Avatar

Zuraini Ismail

Universiti Teknologi Malaysia

View shared research outputs
Top Co-Authors

Avatar

Asmidar Abu Bakar

Universiti Tenaga Nasional

View shared research outputs
Top Co-Authors

Avatar

Ganthan Narayana Samy

Universiti Teknologi Malaysia

View shared research outputs
Top Co-Authors

Avatar

Ramona Ramli

Universiti Tenaga Nasional

View shared research outputs
Top Co-Authors

Avatar

Gopinath Muruti

Universiti Tenaga Nasional

View shared research outputs
Top Co-Authors

Avatar

Salman Yussof

Universiti Tenaga Nasional

View shared research outputs
Top Co-Authors

Avatar

Zul-Azri Ibrahim

Universiti Tenaga Nasional

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge