Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Haslina Mohd is active.

Publication


Featured researches published by Haslina Mohd.


PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON APPLIED SCIENCE AND TECHNOLOGY 2016 (ICAST’16) | 2016

Usability factors of mobile health application for chronic diseases

Fatima Zahra; Azham Hussain; Haslina Mohd

M-health has changed the conventional delivery system of health-care, permitting continuous, pervasive Health-care anywhere, anytime. Chronic disease apps are increasing, as many health workers, patients and clinicians already embracing smartphones in their comprehensive and diverse practices. There are lots of challenges and requirements that need to be addressed for mobile health applications to prevent or eliminate design problems and minimize potential threats for users, the proposed factors for chronic disease mobile applications can be used as a guide for app developers While, the usability testing, and evaluations of chronic disease apps have not yet touched the accuracy level of other web based applications. This study is being conducted to learn about challenges of m-health apps and to identify the factors that affect the usability of such applications.


Archive | 2018

Regression testing – A protocol for systematic literature review

Bakr Ba-Quttayyan; Haslina Mohd; Fauziah Baharom

Regression testing is a costly but important maintenance activity which performed to revalidate modified software to make sure that changes did not adversely affect software behavior. Several studies have been carried out regarding regression testing domain in the literature. However, these studies need to be classified, summarized and ordered in a systematic manner to spot on the current state of the art of regression testing field. Therefore, this paper will carry out a systematic literature review (SLR) protocol to illustrate the process of preparation and undertaking a systematic review later. In this protocol, a manual search has been conducted to obtain related studies from four various sources where those studies were classified under journal, conference proceeding, and book chapter categories within specific criteria. Consequently, the initial search resulted in 1261 unfiltered studies, which then decreased according to certain predefined criteria up to 246 selected relevant studies. As a result, this protocol will behave as a guideline towards conducting SLR in the near future.


THE 2ND INTERNATIONAL CONFERENCE ON APPLIED SCIENCE AND TECHNOLOGY 2017 (ICAST’17) | 2017

Coverage criteria for test case generation using UML state chart diagram

Yasir Dawood Salman; Nor Laily Hashim; Mawarny Rejab; Rohaida Romli; Haslina Mohd

To improve the effectiveness of test data generation during the software test, many studies have focused on the automation of test data generation from UML diagrams. One of these diagrams is the UML state chart diagram. Test cases are generally evaluated according to coverage criteria. However, combinations of multiple criteria are required to achieve better coverage. Different studies used various number and types of coverage criteria in their methods and approaches. The objective of this paper to propose suitable coverage criteria for test case generation using UML state chart diagram especially in handling loops. In order to achieve this objective, this work reviewed previous studies to present the most practical coverage criteria combinations, including all-states, all-transitions, all-transition-pairs, and all-loop-free-paths coverage. Calculation to determine the coverage percentage of the proposed coverage criteria were presented together with an example has they are applied on a UML state chart di...


THE 2ND INTERNATIONAL CONFERENCE ON APPLIED SCIENCE AND TECHNOLOGY 2017 (ICAST’17) | 2017

Usability evaluation of mobile applications; where do we stand?

Fatima Zahra; Azham Hussain; Haslina Mohd

The range and availability of mobile applications is expanding rapidly. With the increased processing power available on portable devices, developers are increasing the range of services by embracing smartphones in their extensive and diverse practices. While usability testing and evaluations of mobile applications have not yet touched the accuracy level of other web based applications. The existing usability models do not adequately capture the complexities of interacting with applications on a mobile platform. Therefore, this study aims to presents review on existing usability models for mobile applications. These models are in their infancy but with time and more research they may eventually be adopted. Moreover, different categories of mobile apps (medical, entertainment, education) possess different functional and non-functional requirements thus customized models are required for diverse mobile applications.


THE 2ND INTERNATIONAL CONFERENCE ON APPLIED SCIENCE AND TECHNOLOGY 2017 (ICAST’17) | 2017

Constructing service-oriented architecture adoption maturity matrix using Kano model

Mohd Hamdi Irwan Hamzah; Fauziah Baharom; Haslina Mohd

Commonly, organizations adopted Service-Oriented Architecture (SOA) because it can provide a flexible reconfiguration and can reduce the development time and cost. In order to guide the SOA adoption, previous industry and academia have constructed SOA maturity model. However, there is a limited number of works on how to construct the matrix in the previous SOA maturity model. Therefore, this study is going to provide a method that can be used in order to construct the matrix in the SOA maturity model. This study adapts Kano Model to construct the cross evaluation matrix focused on SOA adoption IT and business benefits. This study found that Kano Model can provide a suitable and appropriate method for constructing the cross evaluation matrix in SOA maturity model. Kano model also can be used to plot, organize and better represent the evaluation dimension for evaluating the SOA adoption.Commonly, organizations adopted Service-Oriented Architecture (SOA) because it can provide a flexible reconfiguration and can reduce the development time and cost. In order to guide the SOA adoption, previous industry and academia have constructed SOA maturity model. However, there is a limited number of works on how to construct the matrix in the previous SOA maturity model. Therefore, this study is going to provide a method that can be used in order to construct the matrix in the SOA maturity model. This study adapts Kano Model to construct the cross evaluation matrix focused on SOA adoption IT and business benefits. This study found that Kano Model can provide a suitable and appropriate method for constructing the cross evaluation matrix in SOA maturity model. Kano model also can be used to plot, organize and better represent the evaluation dimension for evaluating the SOA adoption.


PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON APPLIED SCIENCE AND TECHNOLOGY 2016 (ICAST’16) | 2016

Adapting Rational Unified Process (RUP) approach in designing a secure e-Tendering model

Haslina Mohd; Muhammad Afdhal Muhammad Robie; Fauziah Baharom; Norida Muhd Darus; Mohamed Ali Saip; Azman Yasin

e-Tendering is an electronic processing of the tender document via internet and allow tenderer to publish, communicate, access, receive and submit all tender related information and documentation via internet. This study aims to design the e-Tendering system using Rational Unified Process approach. RUP provides a disciplined approach on how to assign tasks and responsibilities within the software development process. RUP has four phases that can assist researchers to adjust the requirements of various projects with different scope, problem and the size of projects. RUP is characterized as a use case driven, architecture centered, iterative and incremental process model. However the scope of this study only focusing on Inception and Elaboration phases as step to develop the model and perform only three of nine workflows (business modeling, requirements, analysis and design). RUP has a strong focus on documents and the activities in the inception and elaboration phases mainly concern the creation of diagram...


PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON APPLIED SCIENCE AND TECHNOLOGY 2016 (ICAST’16) | 2016

Secure software practices among Malaysian software practitioners: An exploratory study

Shafinah Farvin Packeer Mohamed; Fauziah Baharom; Aziz Deraman; Jamaiah Yahya; Haslina Mohd

Secure software practices is increasingly gaining much importance among software practitioners and researchers due to the rise of computer crimes in the software industry. It has become as one of the determinant factors for producing high quality software. Even though its importance has been revealed, its current practice in the software industry is still scarce, particularly in Malaysia. Thus, an exploratory study is conducted among software practitioners in Malaysia to study their experiences and practices in the real-world projects. This paper discusses the findings from the study, which involved 93 software practitioners. Structured questionnaire is utilized for data collection purpose whilst statistical methods such as frequency, mean, and cross tabulation are used for data analysis. Outcomes from this study reveal that software practitioners are becoming increasingly aware on the importance of secure software practices, however, they lack of appropriate implementation, which could affect the quality of produced software.


PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON APPLIED SCIENCE AND TECHNOLOGY 2016 (ICAST’16) | 2016

A secured e-tendering modeling using misuse case approach

Haslina Mohd; Muhammad Afdhal Muhammad Robie; Fauziah Baharom; Norida Muhd Darus; Mohamed Ali Saip; Azman Yasin

Major risk factors relating to electronic transactions may lead to destructive impacts on trust and transparency in the process of tendering. Currently, electronic tendering (e-tendering) systems still remain uncertain in issues relating to legal and security compliance and most importantly it has an unclear security framework. Particularly, the available systems are lacking in addressing integrity, confidentiality, authentication, and non-repudiation in e-tendering requirements. Thus, one of the challenges in developing an e-tendering system is to ensure the system requirements include the function for secured and trusted environment. Therefore, this paper aims to model a secured e-tendering system using misuse case approach. The modeling process begins with identifying the e-tendering process, which is based on the Australian Standard Code of Tendering (AS 4120-1994). It is followed by identifying security threats and their countermeasure. Then, the e-tendering was modelled using misuse case approach. T...


PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON APPLIED SCIENCE AND TECHNOLOGY 2016 (ICAST’16) | 2016

Towards a balanced software team formation based on Belbin team role using fuzzy technique

Mazni Omar; Bikhtiyar Hasan; Mazida Ahmad; Azman Yasin; Fauziah Baharom; Haslina Mohd; Norida Muhd Darus

In software engineering (SE), team roles play significant impact in determining the project success. To ensure the optimal outcome of the project the team is working on, it is essential to ensure that the team members are assigned to the right role with the right characteristics. One of the prevalent team roles is Belbin team role. A successful team must have a balance of team roles. Thus, this study demonstrates steps taken to determine balance of software team formation based on Belbin team role using fuzzy technique. Fuzzy technique was chosen because it allows analyzing of imprecise data and classifying selected criteria. In this study, two roles in Belbin team role, which are Shaper (Sh) and Plant (Pl) were chosen to assign the specific role in software team. Results show that the technique is able to be used for determining the balance of team roles. Future works will focus on the validation of the proposed method by using empirical data in industrial setting.


PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON APPLIED SCIENCE AND TECHNOLOGY 2016 (ICAST’16) | 2016

Factors influencing a problem-based learning implementation: A case study of IT courses

Norida Muhd Darus; Haslina Mohd; Fauziah Baharom; Mohamed Ali Saip; Nurnasran Puteh; Mohd Zabidin Husain; Azman Yasin

IT students must be trained to work efficiently as teamwork. One of the techniques that can be used to train them is through Problem-Based Learning (PBL) approach. The PBL implementation can be influenced by various factors depending on the ultimate goal of the study. This study is focusing on the IT students’ perception of the PBL implementation. The student’s perception is important to ensure the successfulness of the PBL implementation. Therefore, it is important to identify the factors that might influence the implementation of PBL of IT courses. This study aims to identify some catalyst factors that may influence the PBL implementation of IT courses. The study involved three (3) main phases: identifying PBL implementation factors, constructing a PBL model, and PBL model validation using statistical analysis. Four main factors are identified: PBL Characteristics, PBL Course Assessment, PBL Practices, and PBL Perception. Based on these four factors, a PBL model is constructed. Then, based on the propos...

Collaboration


Dive into the Haslina Mohd's collaboration.

Top Co-Authors

Avatar

Fauziah Baharom

Universiti Utara Malaysia

View shared research outputs
Top Co-Authors

Avatar

Azman Yasin

Universiti Utara Malaysia

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Huda Ibrahim

Universiti Utara Malaysia

View shared research outputs
Top Co-Authors

Avatar

Mazni Omar

Universiti Utara Malaysia

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Mazida Ahmad

Universiti Utara Malaysia

View shared research outputs
Top Co-Authors

Avatar

Mohd Hamdi Irwan Hamzah

Universiti Tun Hussein Onn Malaysia

View shared research outputs
Top Co-Authors

Avatar

Azham Hussain

Universiti Utara Malaysia

View shared research outputs
Researchain Logo
Decentralizing Knowledge