Fiza Abdul Rahim
Universiti Tenaga Nasional
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Fiza Abdul Rahim.
international conference on research and innovation in information systems | 2013
Fiza Abdul Rahim; Zuraini Ismail; Ganthan Narayana Samy
The concerns in healthcare services is needed to deal with privacy and data security risks in handling electronic healthcare records (EHR). With the limitation of the existing literature dealing with number of factors that influence information privacy concerns in EHR, the main objective of this study is to review recent studies on information privacy concerns in EHR and then also to categorize the related factors. A total of 199 articles were extracted using a predefined search string. A quality criterion was applied on this set of articles, a total of 18 articles were determined for further analysis. Nine factors were found to influence information privacy concerns. However, two factors, namely information dissemination and computer literacy were commonly revealed as factors attributing to information privacy concerns in the healthcare domain. The unit of analysis was further examined from two perspectives; healthcare practitioners and patients.
Archive | 2019
Abbas M. Al-Ghaili; Hairoladenan Kasim; Fiza Abdul Rahim; Zul-Azri Ibrahim; Marini Othman; Zainuddin Hassan
A Smart Verification Algorithm (SVA) used with Internet of Things (IoT) applications is proposed performing a verification procedure to enable authorized requests by user to access a smart system with help of Quick Response (QR) tag. It uses encrypted QR-tag values to compare them to original values. Three-layers have been proposed for this verification procedure to attain security objectives. The first layer implements a comparison to preserve the system integrated. In the second layer, original values are stored in offline database storage to disable any access caused by threats; to preserve it available. The third one frequently generates an authenticated QR tag using 1-session private key to prevent both information leakage and an unauthorized access if the key was deduced; to keep it confidential. The SVA aims to increase the system privacy. It is evaluated in terms of security factors. Results confirm that it is faster than other competitive techniques. Additionally, results have discussed SVA’s robustness against unauthorized access’s attempts and brute force attack.
International Conference of Reliable Information and Communication Technology | 2018
Ayman Asfoor; Fiza Abdul Rahim; Salman Yussof
Phishing is the act of sending e-mails pretending to be from genuine financial organizations and requesting private info such as username and password. Information security awareness of phishing attacks becomes the first line of data protection defence. Human factors are recognized as the main factors in addressing the issue of information security in online banking. Thus, identifying the issues and factors that influence information security awareness of phishing attacks are important. A preliminary investigation involving nine (9) professionals and academics using online banking has been conducted to obtain better understanding of the critical factors that may influence the information security awareness of phishing attacks. In-depth interview method is selected in this study. Thematic coding was conducted to characterise the themes and assess the factors found to be most influential. Results from the in-depth interviews with customers experienced in online banking showed that there are six (6) main themes may influence the degree to which information security may be learned. Security concerns, security attentiveness, user competency, computer knowledge, gender as well as the number of years of PC usage are the themes addressed by the key informants. These factors influence information security awareness of phishing attacks from the perspective of bank customers. In this investigation, we expect that the rate of phishing depends on six (6) principal factors likely to be prey to malicious phishers. This can be considered as the correlation between the background of the bank customers and their understanding in deploying online banking safety.
Advanced Science Letters | 2014
Fiza Abdul Rahim; Zuraini Ismail; Ganthan Narayana Samy
International journal of security and its applications | 2018
Fiza Abdul Rahim; Gopinath Muruti; Zuraini Ismail; Ganthan Narayana Samy
Advanced Science Letters | 2018
Fiza Abdul Rahim; Asmidar Abu Bakar; Ramona Ramli
Advanced Science Letters | 2018
Asmidar Abu Bakar; Ramona Ramli; Fiza Abdul Rahim
Advanced Science Letters | 2018
Fiza Abdul Rahim; Asmidar Abu Bakar; Salman Yussof; Ramona Ramli; Roslan Ismail; Busyra Mohamad Yusof
Advanced Science Letters | 2018
Gopinath Muruti; Fiza Abdul Rahim; Md. Nabil Ahmad Zawawi
Advanced Science Letters | 2018
Zul-Azri Ibrahim; Fiza Abdul Rahim; Roslan Ismail; Asmidar Abu Bakar