Najwa Hayaati Mohd Alwi
Universiti Sains Islam Malaysia
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Najwa Hayaati Mohd Alwi.
International Conference on Technology Enhanced Learning | 2010
Najwa Hayaati Mohd Alwi; Ip-Shing Fan
The purpose of this paper is to investigate and define the information security threats in e-learning environment. A threat analysis has been conducted for each application in Managed Learning Environment (MLE) system used in e-learning. The threats analysis was conducted according to the approach adapted from Microsoft. This study produce a list of information security threats per application used in e-learning and a matrix of threats’ risk for e-learning. This study focused on vulnerabilities in application system and do not cover the vulnerabilities in host and network in e-learning. Thus, this study has revealed the information security threats specifically for applications in e-learning environment. The results of the threats analysis can be used as guidance to e-learning provider in implementing e-learning security strategy. The results can also be a guide for the e-learning users to increase their awareness on the potential threats in e-learning environment.
international conference for internet technology and secured transactions | 2009
Najwa Hayaati Mohd Alwi; Ip-Shing Fan
E-learning is a new method of learning and it depends on the Internet in its execution. Internet has become the venue for a new set of illegal activities and E-learning environment is now exposed to the threats. In this paper the benefit and growth of e-learning is elaborated. This paper discusses the security elements needed in e-learning. In addition, explains the situation and existing research on security in e-learning. Information security management is suggested to contribute in preparing the secured e-learning environment.
ieee international conference on high performance computing data and analytics | 2018
Abdul Fuad Abdul Rahman; Azni Ab Halim; Najwa Hayaati Mohd Alwi; Kamaruzzaman Seman Alwi; Farhan Arif Mohamad; Mohamad Nasrul Taufiq; Madihah Zulfa Mohamad; Khairul Azri Zainal Abidin
IoT devices must provide seamless connectivity while obeying stringent power and size constraints. Power consumption plays important factor to determine the status and connectivity of Sensor Node. This paper describes a series of simple experiments which measure the energy consumption of two IoT Sensor Nodes transmitting data to the cloud. The experiments will be used to compare the best solution between wire and wireless for IoT Sensor Nodes implementation. The experimental result shows that wireless connection consume more power compared to wire connection. Apart from comparison of two methods, the goal of this paper is also to develop a solid experimental basis, thus setting a better foundation for future research on IoT Sensor Nodes.
the internet of things | 2017
A. H. Azni; Abdul Fuad Abdul Rahman; Najwa Hayaati Mohd Alwi; Kamaruzzaman Seman
IoT devices must provide seamless connectivity while obeying stringent power and size constraints. Power consumption plays important factor to determine the status and connectivity of Sensor Node. This paper describes a series of simple experiments which measure the energy consumption of two IoT Sensor Nodes transmitting data to the cloud. The experiments will be used to compare the best solution between wire and wireless for IoT Sensor Nodes implementation. The experimental result shows that wireless connection consume more power compared to wire connection. Apart from comparison of two methods, the goal of this paper is also to develop a solid experimental basis, thus setting a better foundation for future research on IoT Sensor Nodes.
Archive | 2016
A. H. Azni; Rabiah Ahmad; Kamaruzzaman Seman; Najwa Hayaati Mohd Alwi; Zul Azri Mohamad Noh
This paper proposed a new correlated topology control (CTC) algorithm to achieve optimal survival networks topology under correlated node behavior. CTC algorithm enable every node to selects its own neighbors with highly correlated cooperative node dynamically. To select neighbors, measurement scheme of correlated node cooperativity is proposed to determine misbehave node and critical node. The scheme will check on correlated degree of neighboring nodes for any misbehave node and at the same time will check if the removal of node cause network to partition. In the case if nodes removal will partition the network, a new reconstruction scheme LNL is proposed to reconnect the broken link. The simulation results show that CTC algorithm can prolong node lifetime and maintain generated survival network topology. Besides that, the algorithm successfully prevented correlated event from misbehave node and network partitioning from isolated node. Further, it is also shown that as energy consumption decreased, network performance especially packet forwarding can be significantly improved and network survivability is optimally achieved.
international conference on information technology | 2014
Noorul Halimin Mansol; Najwa Hayaati Mohd Alwi; Waidah Ismail
Todays increased reliance on Information and Communications Technology (ICT) has raised the expectations for service quality, reliability and availability. Such expectations have introduced BCM as a crucial requirement for organizations. BCM is a management process that helps in improving the organizations resilience to interruptions caused by information security threats. The implementation of BCM not only involves the information technology (IT) department, but also business areas that use IT services. BCM however, only receives attention with the support and direction from top management whenever it is required for regulatory compliance. Therefore this paper aims to explore and identify the effects of organizational culture on the successful implementation of BCM in Malaysian organizations. Quantitative surveys have been distributed to 300 participants with varying roles within the organizational hierarchy. 22 Malaysian IT organizations and departments have been selected to participate in the survey. The survey explores the organization employees view on the importance and effect of organizational culture on BCM implementation. The results indicate that cultural factors greatly impact and play an important role to the organization in terms of BCM readiness and implementation. The results are useful as a guidance for organizations in Malaysia specifically to monitor security incidents or threats which may arise not only from technicalities but also human complexity. The results may also aid in the preparation of organizational guidelines regarding readiness towards BCM implementation.
International Journal of Technology Enhanced Learning | 2010
Najwa Hayaati Mohd Alwi; Ip-Shing Fan
Archive | 2010
Najwa Hayaati Mohd Alwi; Ip-Shing Fan
Procedia - Social and Behavioral Sciences | 2014
Najwa Hayaati Mohd Alwi; Normazla Ahmad Mahir; Shaharudin Ismail
Archive | 2013
Rabia Ihmouda Hassan; Najwa Hayaati Mohd Alwi