Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Kamsuriah Ahmad is active.

Publication


Featured researches published by Kamsuriah Ahmad.


Information Development | 2012

Knowledge sharing in the public sector in Malaysia a proposed holistic model

Zawiyah Mohammad Yusof; Mohd Bakhari Ismail; Kamsuriah Ahmad; Maryati Mohd Yusof

Organizations are becoming increasingly aware of the importance of knowledge sharing to survive and remain competitive. Current knowledge sharing models have been found to be lacking as they only focus on the relationships between factors that influence knowledge sharing. An integrated approach that is capable of a simultaneous investigation of the various factors that affect knowledge sharing initiatives, quality of knowledge management and its impact on organizational performance has not been widely attempted. This study aims to develop a holistic knowledge sharing model for the public sector in Malaysia that is based on an integrated approach, which combines factors that influence knowledge management (input), knowledge sharing quality (process) and workers’ performance as well as service delivery (output) that encompasses the individual, organization and technology. This study will firstly present a review of the literature of current models in knowledge sharing, which will then form the take-off point for the development of the proposed holistic model. Such a holistic model is deemed appropriate and necessary to steer knowledge sharing initiatives in tandem with forming the base for policy-making of such initiatives.


EJISDC: The Electronic Journal on Information Systems in Developing Countries | 2000

Gender Differences in Computer Literacy Level Among Undergraduate Students in Universiti Kebangsaan Malaysia

Nor Azan Mat Zin; Halimah Badioze Zaman; Hairulliza Mohd Judi; Norhayati Abdul Mukti; Hazilah Mohd Amin; Shahnorbanun Sahran; Kamsuriah Ahmad; Masri Ayob; Salwani Abdullah; Zuraidah Abdullah

This study was conducted to assess gender differences in computer literacy levels of undergraduate students in UKM. Responses from 2,591 students were analyzed. Students were surveyed on software and application use, self‐perceived control and programming skills. There is a significant difference in computer literacy level between male and female students; overall mean score for male was 2.62 (N = 734, SD = 0.71) while female score was 2.34 (N = 1570, SD = 0.58). Male students had greater computer experience and use computer more frequently. They also reported a higher computer ability and slightly higher percentage of them own a computer. Males had greater self‐perceived control and higher programming skills and better ability in computer repair and maintenance than females. Other factors such as computer experience, and computer ownership also affect computer literacy level as was shown by the interaction effect existed among gender, computer experience, and computer ownership. Implication from this study indicates that increasing the computer experience and encouraging students to own a computer will give more opportunity to female students to achieve a higher level of computer literacy.


business information systems | 2012

A hybrid information system model for trust in e-government initiative adoption in public sector organisation

Mohannad Moufeed Ayyash; Kamsuriah Ahmad; Dalbir Singh

The purpose of this study is to identify information system factors affecting user trust of e-government adoption and to propose a hybrid information system model for trusting e-government in public sector organisations. The proposed model was built based on: information system success model, technology acceptance model, and security and privacy from literature. Based on these theories, this paper identifies information system factors affecting user trust of e-government initiative adoption.


international conference on software engineering and computer systems | 2011

Achieving Effective Communication during Requirements Elicitation - A Conceptual Framework

Fares Anwar; Rozilawati Razali; Kamsuriah Ahmad

Requirements elicitation is one of the most important and critical phase in software development. It is the moment in which the users’ needs of a software system are captured, understood and validated. This is achieved through two-way communications between users and requirement analysts. The process however is not so straightforward to accomplish. The problem of poor communication among requirement analysts and users exists since both parties are different in many ways besides the environment in which the process happens. They face significant challenges to achieve common understandings and agreements on requirements. This paper discusses the contributing factors that affect communications between both parties during requirements elicitation phase. The factors were identified through reviews of related work. The data were analysed through content analysis. The collated factors form a conceptual framework of effective communication activity for requirements elicitation process. The aim of the framework is to ensure the produced requirements are comprehensible and thus leads to the production of a software system that satisfies its intended users.


international symposium on information technology | 2008

Functional dependencies and inference rules for XML

Kamsuriah Ahmad; Hamidah Ibrahim

The concept of functional dependency plays a fundamental role in relational databases where they are used in integrity enforcement and in database design. Similarly, these constraints will play fundamental role in XML as well. Recently XML functional dependencies (XFDs) have been intensively studied than other constraints for XML data. Since key is a special case of XFD, a formal definition of XFD that is able to specify keys and DTD (Data Type Definition) cardinality constraints is defined. A method for reasoning about these constraints and a set of inference rules for XFDs is proposed and proof correct.


international conference on electrical engineering and informatics | 2011

Managing Data Source quality for data warehouse in manufacturing services

Norizam Idris; Kamsuriah Ahmad

Data quality and Data Source Management is one of the key success factors for data warehouse project. Many data warehouse projects fail due to poor quality of the data. It is believed that the problems can be fixed later and because of that, a lot of time will be spent to fix the error. If low quality data fed into the data warehouse system, the result will be not accurate if these data are used in the decision making. Many data warehouse and business intelligence projects failure are due to wrong or low quality data. Therefore this paper will underpins several aspects such as Total Data Quality Management (TDQM), ISO 9001:2008 and Quality Management System (QMS) in order to address data quality problems in the early stage and find out the best procedure to manage the data sources. To find a standard procedure in managing data source base on ISO 9001:2008 standard, process in managing data source is identified and a compared to the ISO 9001:2008 Quality Management System (QMS) requirements. As a result, this process is viewed as a kind of production process and relate to the concepts of quality management known from the manufacturing and service domain. More precisely, a high quality management system in managing data source is proposed. This system is based on ISO 9001:2008 standard and hopes it can help organizations in implementing and operating quality management system. By using ISO 9001:2008 framework to the process of managing data source, this approach will be similar to the manufacturing concept that has an added advantage when compared to traditional approaches in managing data source.


asian conference on intelligent information and database systems | 2011

A comparative analysis of managing XML data in relational database

Kamsuriah Ahmad

The eXtensible Markup Language (XML) has recently emerged as a standard for data representation and interchange on the web. Based on its popularity used in most application, the critical issues are to store and to query XML data to exploit the full power of this technology. Since relational database is widely used technology for storing and querying, therefore replacing it with pure XML database is not a good choice and very expensive process. It is thus crucial to map XML data into relational data and this process is one that occurs frequently. Many existing methods exist in the literature, and defining what the best mapping method is explicitly important. The intention of this paper is to the existing mapping methods in terms of generating good relational schema. At the end a new mapping method is developed to overcome the limitations the limitations and shows that it is efficient in terms of removing relation redundancy.


international conference on electrical engineering and informatics | 2015

A study on improvement of internet traffic measurement and analysis using Hadoop system

Lena T. Ibrahim; Rosilah Hassan; Kamsuriah Ahmad; Asrul Nizam Asat

By using conventional database management tools, data explosion is one of the most regular triggers for the development of Big Data. This results in increase difficulty for database management and larger datasets from existing applications. The organizations face the challenge to capture, manage and analyze the data in an acceptable period of time due to the increasing size of data sets, ranging from several terabytes to multiple petabytes. The proposed research aims at resolving the problem faced in internet traffic measurement and depth analysis. As there is a wide growth in the internet traffic and high speed access, the system is facing a scalability problem. To overcome this, we are introducing a Hadoop based traffic monitoring system which performs analysis of multi-terabytes (IP, HTTP, TCP, NetFlow) of the internet traffic system in a scalable manner and for in-depth analysis of the problem, the paper shows the different features.


international conference on research and innovation in information systems | 2013

The mapping process of unstructured data to structured data

Mohammad Fikry Abdullah; Kamsuriah Ahmad

Emergence of heterogeneous format of unstructured data is vital for an organization to consider as a basis to support organization function. Thus, there is an urgency of a suitable management process of unstructured data through collecting, manage, transfer and transform these data to a meaningful and informed data. Effective and efficient mapping processes of unstructured data to structured data could help organization to understand the significance of exploited and transformed data in supporting decision making process. Currently there is no study done on mapping unstructured data to structured data that can full fill the organization needs. This paper will explained four (4) main processes which are extraction, classification, repositories development and mapping of data with intention to help in generating new data and information which are more structured, comprehensive, collective and varied in topics to serve organizational needs. Output from this study is to ensure the mapping process of unstructured data to structured data will denote unstructured data as renewable assets that is useful, well informed and meaningful to serve organizational functions.


international conference on research and innovation in information systems | 2011

The role of Finance Information Systems in anti financial corruptions: A theoretical review

Ali Abdulbaqi Ameen; Kamsuriah Ahmad

In recent years, computerization and anti corruption were attracting a lot of attention around the world. Many governments have worked to fight corruptions in their actions. This paper intends to provide a better understanding of the Finance Information Systems (FISs) and their impact on fighting financial corruptions in the public sector. In a number of nations, Information and Communication Technologies (ICTs) have received considerable attention as convenient means to reduce corruption. But FISs have not been widely considered, although it has been used in many prominent efforts to reduce corruption. The paper explores academic and non-academic literature. First, it explores the theoretical background of the concepts; corruption and the coalition of anti-corruption. Second, we illustrate the existing information of FISs and the effort to build it. An examples of some FISs are given, which contribute significantly in reducing financial corruption in different countries. This paper concludes that the financial information systems can become one of the key components of a broader anti corruption strategy.

Collaboration


Dive into the Kamsuriah Ahmad's collaboration.

Top Co-Authors

Avatar

Dalbir Singh

National University of Malaysia

View shared research outputs
Top Co-Authors

Avatar

Hamidah Ibrahim

Universiti Putra Malaysia

View shared research outputs
Top Co-Authors

Avatar

Shahrul Azman Mohd Noah

National University of Malaysia

View shared research outputs
Top Co-Authors

Avatar

Ali Mamat

Universiti Putra Malaysia

View shared research outputs
Top Co-Authors

Avatar

Ali Abdulbaqi Ameen

National University of Malaysia

View shared research outputs
Top Co-Authors

Avatar

Amjad Qtaish

National University of Malaysia

View shared research outputs
Top Co-Authors

Avatar

Mohannad Moufeed Ayyash

National University of Malaysia

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Zawiyah Mohammad Yusof

National University of Malaysia

View shared research outputs
Top Co-Authors

Avatar

Basel Alshaikhdeeb

National University of Malaysia

View shared research outputs
Researchain Logo
Decentralizing Knowledge