Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Mariana Yusoff is active.

Publication


Featured researches published by Mariana Yusoff.


workshop on information security applications | 2013

A conceptual framework of info structure for information security risk assessment (ISRA)

Palaniappan Shamala; Rabiah Ahmad; Mariana Yusoff

Information security has become a vital entity to most organizations today due to current trends in information transfer through a borderless and vulnerable world. The concern and interest in information security is mainly due to the fact that information security risk assessment (ISRA) is a vital method to not only to identify and prioritize information assets but also to identify and monitor the specific threats that an organization induces; especially the chances of these threats occurring and their impact on the respective businesses. However, organizations wanting to conduct risk assessment may face problems in selecting suitable methods that would augur well in meeting their needs. This is due to the existence of numerous methodologies that are readily available. However, there is a lack in agreed reference benchmarking as well as in the comparative framework for evaluating these ISRA methods to access the information security risk. Generally, organizations will choose the most appropriate ISRA method by carrying out a comparative study between the available methodologies in detail before a suitable method is selected to conduct the risk assessment. This paper suggests a conceptual framework of info-structure for ISRA that was developed by comparing and analysing six methodologies which are currently available. The info-structure for ISRA aims to assist organizations in getting a general view of ISRA flow, gathering information on the requirements to be met before risk assessment can be conducted successfully. This info-structure can be conveniently used by organizations to complete all the required planning as well as the selection of suitable methods to complete the ISRA.


Journal of Information Security | 2012

Perception on Cyber Terrorism: A Focus Group Discussion Approach

Rabiah Ahmad; Zahri Yunos; Shahrin Sahib; Mariana Yusoff

Focus group discussion is an exploratory research technique used to collect data through group interaction. This technique provides the opportunity to observe interaction among participants on a topic under this study. This paper contributes to an understanding on the cyber terrorism conceptual framework through the analysis of focus group discussion. The proposed cyber terrorism conceptual framework which was obtained during the qualitative study by the authors has been used as a basis for discussion in the focus group discussion. Thirty (30) participants took part in the focus group discussion. The overall results suggest that the proposed cyber terrorism framework is acceptable by the participants. The present study supports our initial research that the cyber terrorism conceptual framework constitutes the following components: target, motivation, tools of attack, domain, methods of attack and impact.


science and information conference | 2014

Grounding the component of cyber terrorism framework using the grounded theory

Zahri Yunos; Rabiah Ahmad; Mariana Yusoff

The current framework of cyber terrorism consists of non-tested components which are related to physical terrorism as well as cyber security threats. However, there is no universally accepted definition of cyber terrorism, which seems to be a fundamental issue and challenge in countering threats from cyber terrorism. Grounded theory research begins by focusing on area of study and gathers data from various sources, including literatures, interviews and field observations. A grounded theory study can result in empirically grounded hypothesis that can be further tested and verified with new data using qualitative methodology. In this research, semi-structured interview with purposive sampling procedures is the primary data collection. Twenty-two (22) participants took part in the interview session. The analysis indicated that the framework describing cyber terrorism can be considered from six components: motivation, target, method of attack, domain, action by perpetrator and impact. Continued research in this area can be further conducted, which may lead to the development of strategic and technological framework to counter cyber terrorism.


Archive | 2013

Evaluation on Tracking Performance of PID, Gain Scheduling and Classical Cascade P/PI Controller on XY Table Ballscrew Drive System

Lokman Abdullah; Zamberi Jamaludin; Qumrul Ahsan; Jailani Jamaludin; Nur Aidawaty Rafan; Chiew Tsung Heng; Kamaruzaman Jusoff; Mariana Yusoff; Hang Tuah Jaya


international conference on digital information management | 2011

ICT + PBL = holistic learning solution: UTeM's experience

Faaizah Shahbodin; Mariana Yusoff; Che Ku Nuraini Che Ku Mohd


Journal of Human Capital Development | 2010

ANALYSING COMMUNICATION COMPETENCE IN ORAL PRESENTATIONS: ENGINEERING STUDENTS’ EXPERIENCES

Mariana Yusoff


Archive | 2013

Ultra-Wide Band (UWB) Ice Cream Cone antenna for communication system

Mohd Azlishah Othman; Siti Rohmah Mohamed Kamaruddin; Kamaruzaman Jusoff; Mohamad Zoinol Abidin Abdul Aziz; Mohd Muzafar Ismail; Hamzah Asyrani Sulaiman; Mohamad Harris Misran; Ridza Azri Ramli; Maizatul Alice Meor Said; Badrul Hisham Ahmad; Zahriladha Zakaria; Mohan Sinnappa; Mariana Yusoff; Shadia Suhaimi


Archive | 2013

A New Hybrid Embedding Method in Iris Biometric System

Zaheera Zainal Abidin; Mazani Manaf; Abdul Samad Shibghatullah; Kamaruzaman Jusoff; Rabiah Ahmad; Zakiah Ayop; Syarulnaziah Anawar; Azizah Shaaban; Mariana Yusoff


Archive | 2013

Establishing a Hybrid Laser Lathing Technology

S. Thiru; Kamaruzaman Jusoff; Mariana Yusoff; T. Qumrul Ahsan; Azizah Shaaban; Mohd Razali Muhamad; Mohd Fahmi Mohamad Amran; Wan Hasrulnizzam; Mohd Shahir; Mohd Amri; Mohd Warikh; Mohd Rizal; D. Sivakumar; Azman Abdullah; Hang Tuah Jaya


Archive | 2013

Assessing the Use of Mobile Technology for Technical English

Zanariah Jano; Razilah Abdul Rahim; Noridah Abdullah; Khoo Mei Sui Linda; Mei Sui; Yeo Mun Yee; Rabiah Ahmad; Mariana Yusoff; Kamaruzaman Jusoff; Noorli Khamis; Hang Tuah Jaya; Menara Razak

Collaboration


Dive into the Mariana Yusoff's collaboration.

Top Co-Authors

Avatar

Rabiah Ahmad

Universiti Teknikal Malaysia Melaka

View shared research outputs
Top Co-Authors

Avatar

Hang Tuah Jaya

Universiti Teknikal Malaysia Melaka

View shared research outputs
Top Co-Authors

Avatar

Zahri Yunos

Universiti Teknikal Malaysia Melaka

View shared research outputs
Top Co-Authors

Avatar

Abdul Samad Shibghatullah

Universiti Teknikal Malaysia Melaka

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Che Ku Nuraini Che Ku Mohd

Universiti Teknikal Malaysia Melaka

View shared research outputs
Top Co-Authors

Avatar

Chiew Tsung Heng

Universiti Teknikal Malaysia Melaka

View shared research outputs
Top Co-Authors

Avatar

Faaizah Shahbodin

Universiti Teknikal Malaysia Melaka

View shared research outputs
Top Co-Authors

Avatar

Hamzah Asyrani Sulaiman

Universiti Teknikal Malaysia Melaka

View shared research outputs
Top Co-Authors

Avatar

Lokman Abdullah

Universiti Teknikal Malaysia Melaka

View shared research outputs
Researchain Logo
Decentralizing Knowledge