Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Marini Othman is active.

Publication


Featured researches published by Marini Othman.


Procedia. Economics and finance | 2015

An Integrated Success Model for an Electronic Health Record: A Case Study of Hakeem Jordan

Dua’ Abdellatef. Nassar; Marini Othman; Jamal A. Hayajneh; Nor'ashikin Ali

Abstract Electronic Health Record (EHR) has been adopted in many countries due to its ability to enhance and raise the healthcare quality. In Jordan, an EHR called Hakeem was launched by His Majesty King Abdullah Bin Al-Hussien to improve the health care and quality of the countrys medical sector. This research aims to build a model which assess the EHR in general and Hakeem in particular. In the assessment, the research has undertaken the task of integrating two models namely: the Delone and Mcleans information system success model, and the Balanced Scorecard. The models contributed to perspectives which assess the success of Hakeem. Triangulation methods using qualitative and quantitative methods were adopted. This involves an interview, and questionnaire which results were used to build a case study. Prince Hamzah Hospital which implements Hakeem is central to the study. The results showed all Internal perspectives proposed by the two integrated models have strongly influenced the success of Hakeem. Another obvious result is in the relation between the perspectives which affect each other and reflected on the EHR success. This research has proposed an integrated EHR model that could be used in assessing the success of any EHR implementation. For future research undertaking, it is recommended that external success factors such as political, economic, social and technological are studies.


computer and information technology | 2008

Constructing a chaos proofing pre-development framework to manage chaos in a chaos-prone systems development environment

Marini Othman; Abdullah Mohd Zin; Abdul Razak Hamdan

When plans are disrupted to accommodate changes in a software development project, the environment becomes unstable. This brings about chaos. ldquoChaosrdquo is real and we need to deal with it. This research is based on the premise that 1. Chaos has a pattern, and that it is possible to learn this pattern and 2. If we are able to measure chaos, we will be able to better manage the situation brought by chaos. This paper put forth a list of chaos triggers based on findings from a case study of a chaos-prone system development project based in Malaysia. Lessons learned based on findings from a focus-group depth interview leads to the construction of a pre development framework to chaos-proof system development environment.


international conference on information technology | 2011

Internet Addiction and dependency: A case study in UNITEN, Malaysia

Boshra Haghighi; Marini Othman; Faridah Hanim Hashim

The Internet has become an inseparable part of our daily lives. However, problematical use of the Internet can lead to various types of mental and physical problems. Internet Addiction (IA) is a disorder which is caused by problematical Internet usage. This study aims to determine the situation of Internet Addiction in UNITEN, Malaysia by looking at the Internet usage patterns. How is the Internet Addiction situation in UNITEN, Malaysia? What are the profiles of the Malaysian Internet Users? The research employed a quantitative approach. Data collection was based on a web-based and paper-based survey of 700 college students in Malaysia. The questionnaire survey was developed based on Dr. K. Youngs Internet Addiction Test (IAT) and Internet Addiction Diagnostic Questionnaire (IADQ). The respondents were then categorized into 3 levels of Internet Addiction: mild, moderate and severe Internet Addiction. A comparative analysis was performed on the situation in Malaysia in which data on the pattern and the usage of Internet was already available. The survey which was carried out with 700 respondents, produced a 3 percent spoiled result, and found that 31 percent of the respondents are mild addicts, 63 percent are moderate addicts and only 3 percent of the respondents are severe Internet Addicts. Further details which include the profiles of Malaysian Internet users and the revision over published knowledge based on Malaysia Internet Addiction are provided in detail. Physical and mental problems caused by Internet Addiction consequently make problems for the society. An awareness of the Internet usage pattern and the situation of Internet Addiction help to prevent and control the negative consequences of this modern disorder.


international conference on advanced computer science applications and technologies | 2015

Review on National Electronic Identification System

Wael Jabbar Abed Al-nidawi; Mahdi Athab Maan; Marini Othman

National Electronic ID (NeID) has been adopted in e-government by many countries due to its ability to enhance and raise the authentication quality. The authentication process aims to identify the correct recipient of the e-government services which is a major challenge. This paper provides a review on national electronic identification system in some selected countries and review some practices to enable and facilitate accessing e-government services. Finally, the benefits of a NeID have been discussed.


international conference on it convergence and security, icitcs | 2014

Information Sharing in Governance of Flood Management in Malaysia: COBIT Based Framework

Siti Sarah Maidin; Marini Othman; Mohammad Nazir Ahmad

Due to the frequent occurrences of catastrophic disasters worldwide, several measures and approaches have been implemented by governments in an attempt to overcome and alleviate the hazards and risks. To date, governance has been identified as a crucial element by which to drive effective Flood Management (FM). The aim of this paper is to identify the challenges related to information sharing in the current structure and propose a governance framework to oversee FM. A qualitative field study is employed to identify challenges in managing information within FM. The paper concludes by making recommendations for the improvement of FM practices in Malaysia with emphasis on governance by utilizing the Control Objectives for Information and Related Technology (COBIT) framework.


Archive | 2019

Smart Verification Algorithm for IoT Applications using QR Tag

Abbas M. Al-Ghaili; Hairoladenan Kasim; Fiza Abdul Rahim; Zul-Azri Ibrahim; Marini Othman; Zainuddin Hassan

A Smart Verification Algorithm (SVA) used with Internet of Things (IoT) applications is proposed performing a verification procedure to enable authorized requests by user to access a smart system with help of Quick Response (QR) tag. It uses encrypted QR-tag values to compare them to original values. Three-layers have been proposed for this verification procedure to attain security objectives. The first layer implements a comparison to preserve the system integrated. In the second layer, original values are stored in offline database storage to disable any access caused by threats; to preserve it available. The third one frequently generates an authenticated QR tag using 1-session private key to prevent both information leakage and an unauthorized access if the key was deduced; to keep it confidential. The SVA aims to increase the system privacy. It is evaluated in terms of security factors. Results confirm that it is faster than other competitive techniques. Additionally, results have discussed SVA’s robustness against unauthorized access’s attempts and brute force attack.


Archive | 2018

The Determinants of Customer Knowledge Sharing Behavior: A Review Study

Hasan Sari; Marini Othman; Abbas M. Al-Ghaili

In the current age of dynamic business, knowledge became a vital source of competitive advantage. Traditional literature on knowledge management (KM) focused mostly on knowledge sharing within the organization. In this regard, while the general enablers and inhibitors of knowledge sharing behavior have been studied in prior research, the factors that encourage or hinder customers to share their knowledge have not received enough attention in the field of knowledge management. This study thus reviewed previous literature in the context of customer knowledge management to examine the most cited factors that influence customer knowledge sharing (CKS). The relevant articles were analyzed and screened to identify the factors of customer knowledge sharing behavior. Based on the findings, CKS behavior determinants could be classified into three main categories: personal, social, and technological. Among the personal determinants, the most cited factors are the reciprocal benefit, enjoyment of helping others, and knowledge sharing self-efficacy. On the other hand, sense of belonging shared goal/language and interpersonal trust is the most cited social determinants. Meanwhile, perceived usefulness and perceived ease of use are the most cited technological determinants of CKS behavior. The previous research focused more on personal and psychological factors, and as such, more research is needed to examine other motivation factors that might influence CKS behavior, particularly the technological factors.


International Conference of Reliable Information and Communication Technology | 2018

A Proposed Conceptual Framework for Mobile Health Technology Adoption Among Employees at Workplaces in Malaysia

Hasan Sari; Marini Othman; Abbas M. Al-Ghaili

With the rising incidence and cost of lifestyle diseases among working population, many organizations are becoming increasingly concerned with health promotion and protection. Although many organizations established workplace health promotion (WHP), the uptake of these interventions is low. The emergence of mobile health technologies (MHTs), such as smartphone health applications and connected wearable devices, provide an excellent opportunity for increasing WHP effectiveness. Despite the potential, the benefits of this initiative could not be fully utilized without understanding the employees’ perception towards adoption and use of MHTs. While mHealth acceptance has been studied in different contexts, the adoption among employees at workplace received limited attention. Therefore, this study attempts to bridge the gap in the literature by identifying the factors that influence employees at the workplace to adopt and use MHTs. The study addresses the adoption factors from technology acceptance and health behavior perspectives. The proposed conceptual framework incorporates technology acceptance determinants from UTAUT2: performance expectancy, effort expectancy, social influence, facilitating condition, hedonic motivation and health-related determinants (perceived vulnerability, perceived severity). Furthermore, perceived privacy risk, and personal innovativeness found to influence the behavioral intention. Personal innovativeness (PI) and demographic factors (age & gender) found to moderate the relationship between main constructs, behavioral intention, and the actual use. The finding of the study help both policy makers the application developers to understand the critical factors that might influence employees to use mobile technologies for improving their health and enhancing productivity and performance at work.


International Conference of Reliable Information and Communication Technology | 2018

Security Factors Based Evaluation of Verification Algorithm for an IoT Access System

Abbas M. Al-Ghaili; Hairoladenan Kasim; Marini Othman; Zainuddin Hassan

This paper proposes a verification algorithm (VA) used as an access tool for Internet-of-Things (IoT) systems. From a security aspect’s point of view, the VA has been evaluated in terms of security factors. To perform this evaluation, a Multiple-Layer Security Architecture (MLSA) has been used in order to attain the three security objectives which are: confidentiality, integrity, and availability. The VA aims to enable an authorized access to smart IoT applications such as smart city applications. The VA has adopted the Quick Response (QR) tag to encrypt values being used as a smart-key. Performance of the proposed algorithm has considered the security factors in order to strengthen the security side of such an IoT system. To evaluate the VA accuracy, a total number of 70 QR tags have been generated. Results have shown a high percentage of accuracy in terms of security for verified QR tags used as smart keys for IoT systems.


International Conference of Reliable Information and Communication Technology | 2017

Understanding Health Professionals’ Intention to Use Telehealth in Yemen: Using the DeLone and McLean IS Success Model

Abdulrahman Al-Ezzi Al-Fadhli; Marini Othman; Nor'ashikin Ali; Bassam Ali Ali Aljamrh

Telehealth is considered as an innovative technology for enhancing healthcare systems in rural areas. Rural areas in Yemen are suffering from poor healthcare due to limited access of health services. Therefore, the aim of this study is to determine Health Professionals’ intention to use Telehealth in Yemen. Delone and Mclean model has been developed by integrating indirect factor “Anxiety” from the unified theory of acceptance and use of technology (UTAUT). A quantitative approach based on self-administrated questionnaire has been deployed. SPSS has been used for analysis purposes. Results found that factors System quality, Information quality, Service quality, Net benefit and User satisfaction had a positive and significant impact on Intention to use Telehealth. The results revealed that the Health Professionals have intention to use the Telehealth to do their duties.

Collaboration


Dive into the Marini Othman's collaboration.

Top Co-Authors

Avatar

Azizah Suliman

Universiti Tenaga Nasional

View shared research outputs
Top Co-Authors

Avatar

Siti Sarah Maidin

International Islamic University Malaysia

View shared research outputs
Top Co-Authors

Avatar

Nor'ashikin Ali

Universiti Tenaga Nasional

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Abdul Razak Hamdan

National University of Malaysia

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge