Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Norizan Anwar is active.

Publication


Featured researches published by Norizan Anwar.


ieee symposium on business, engineering and industrial applications | 2012

Installation and use of pirated software: The factors behind of it

Norizan Anwar; Farrah Diana; Saiful Bahry; Noraizan Amran

This study is to attempt and understand the factors that influence the consumer or user on the activities of installing and using pirated software. As time goes by, the issue of selling, installing, using etc. pirated software seems no stopping zone. Not to be surprised, year-by-year, respective body reported that software house producer lost million of dollars due to this problem. Thus, various similar studies conducted to measure the situations either in the perspective of behaviors of the consumer or user and some are doing on the effects of using these pirated software. In this study, the researcher focus on the factor of Reciprocal Fairness (RF), Procedural Fairness (PF), Attitude (ATT) and Subjective Norm (SN) as dependent variables towards the Intention (INT) use of these pirated software. As results, Procedural Fairness (PF), Attitude (ATT) and Subjective Norm (SN) have significant differences towards the Intention (INT) use of pirated software.


ieee symposium on business, engineering and industrial applications | 2012

Predicting intended to use of web portal using extended technology acceptance model (TAM): Some perspective on information management students

Farrah Diana Saiful Bahry; Norizan Anwar; Noraizan Amran

Extensive use of technology acceptance model (TAM) in measuring information system related stimulate other researchers to take part in contributing to the knowledge. Using information management student as a respondent to measure perceived attractiveness, physic cost perceptions, perceived usefulness and perceived playfulness toward intended to use of web portal. University student in Malaysia especially UiTM should make use of web portal effectively especially for their learning tools. Result shows ranging student from undergraduate to postgraduate in Faculty of Information Management in Puncak Perdana will use the student portal if the portal is useful to them and enjoyable to use.


IBIMA Business Review Journal | 2011

The Relationship between Cultural Identity and Individual Knowledge Sharing Behavior

Mohamad Noorman Masrek; Siti Arpah Noordin; Norizan Anwar; Ahmad Sufi Alwi Idris

While study focusing on cultural identity has been vastly reported in the literature, not much is really known about the relationship between knowledge sharing behavior and cultural identity. Against this background, this study was undertaken to examine the relationship between knowledge sharing identity and the four cultural identities, namely, horizontal individualism, vertical individualism, horizontal collectivism and vertical collectivism. Using the survey research method involving 100 respondents in a university setting, the study found that both collectivism behaviors are significantly correlated with the knowledge sharing behavior. The findings also suggest that vertical collectivism is more dominant amongst research respondents.


ieee business engineering and industrial applications colloquium | 2013

Factors influencing the use of Web 2.0 tools: Usage trends and expectations

Norizan Anwar; Farrah Diana Saiful Bahry; Noraizan Amran; Azizah Mohd Nor

Web 2.0 technologies have become fundamental tools for students to become active learners by posting their thoughts and ideas in collaboration with teachers using Web 2.0 applications. In order to understand why they use respective applications in Web 2.0 technologies, this study quantitatively investigate three (3) factors influencing the use of Web 2.0 among undergraduate students. The three (3) independents variables are the Use of Online Tools, Usage Trends and Expectations and one (1) dependent variable is the Use of Web 2.0. The paper draws on the practical experience of undergraduate students across different modes of studies. The results show a significant support of all the three (3) independents variables towards the Use of Web 2.0 by the undergraduates.


ieee business engineering and industrial applications colloquium | 2013

Factors in selection of a Malaysian university

Farrah Diana Saiful Bahry; Noraizan Amran; Norizan Anwar; Sobariah Awang Mokhtar; Zuraidah Abd Manaf; Norzanah Md Noor; Megawati Omar

This study examined the university selection factors in Malaysia. In particular it explored the relationship among the factors in the selection of Universiti Teknologi MARA by its students. The study was conducted by surveying a sample of the universitys first intake of 2011. Six hundred questionnaires were distributed and 365 responds were received for analysis. The result of the analysis showed that the universitys favourable reputation, facility and learning environment and its offered programmes were the major factors that influenced the participants to select Universiti Teknologi MARA to pursue their studies.


Communications of The IbIMA | 2017

A Systematic Review on the Strategic Utilization of Information Systems and IT Infrastructure Flexibility

Norizan Anwar; Mohamad Noorman Masrek; Mad Khir Johari Abdullah Sani

IT infrastructure is a crucial element in any organization across industry. It does not matter which industry are you in, i.e. manufacturing, education, cosmetic, automobile, health and much more required sufficient IT backbone to support these industries day-to-day operation. To remain relevant in their respective market, they need to be competitive with their competitors. It is recommended that the organization fully utilizes their information systems to forecast and measure their product or services offered. In a way, information systems are able to lead the managers or decision makers to maximize their ability, capability, wisely and strategically use information systems in assisting them to direct, evaluate, guide and suggest for better decision making. Therefore, this study attempts to identify the determinants of strategic utilization of information systems. Literally, most researchers identified determinants of any subject matters through literature review processes. The mechanism in capturing determinants over literature review processes varies to one another among researchers. Mainly in this study, the researchers decided to use systematic review as it is one of the best ways for the researchers to dig and evaluate which of the dimensions best suit both dependent variables (DV) and independent variables (IV). In the process of systematic review, five (5) components were involved, such as problem formulation; literature search; data evaluation; data analysis; and interpretation of results. Respective variable findings were drawn using schematic and it led the researchers to decide which dimension is best to represent respective variable.


The International Journal of Academic Research in Business and Social Sciences | 2016

Educational Data Utilization by the School Administrators to Improve the Students’ Academic Performance

Noraizan Amran; Farrah Diana Saiful Bahry; Norizan Anwar; Halida Yu

This paper aims 1) to identify the factors that may affect the students’ academic performance 2) to explore the strategic used of educational data by the school administrators to improve the students’ academic performance; based on information systems, database, focusing on Malaysian primary school education data in Student Information Systems (SIS) and School Examination Analysis Systems (SEAS). The researchers acquired secondary data from the SIS and the SEAS database for the investigation purposes, consists of students’ details (name, id, total siblings, address, and family income) and, mid-year exam (PT) and final year exam (PAT) students’ performance. The sample educational data have been categorized according to the students’ family dependents, area of residence and family income. The students’ performance in PT and PAT on particular subjects are also being explored. Educational data from SIS and SEAS database can be utilized either by the individual school to insight factors which contribute to the academic achievement, or by the State or Federal School Administrator which involve bigger volumes of data. The findings can help the school administrators by showing the pattern of students’ academic performance and measure the effectiveness of the program and activities which have been organized by them to enhance the students’ academic performance. In addition of that, its inspire the school administrators and the educators to organize more programmes and attempts for their students’ academic excellence.


Advanced Science Letters | 2015

Copyright act and determining relationship between software piracy related factors with ethical standards

Farrah Diana Saiful Bahry; Maslin Masrom; Norizan Anwar

Software piracy becomes a gigantic concern due to the act of people who continuously use pirated software although they are aware that it is immoral and violated the copyright act. Although the Malaysian copyright act had gone through several amendments and updated from time to time to suit the encroachment of digital technology, people felt that software piracy gives no harm to others as it does not generate income for them. Nevertheless, researchers already revealed many factors that contribute to the use of pirated software such as the user’s behaviors, moral judgments, subject norms, perceive ease of use and other factors from several prominent theories. Here, we target to understand the factors contributing to software piracy on the piracy environment such as the pirating behavior, reciprocal fairness, procedural fairness, and hardcore of pirated software and its relationship with ethical standards. Ethical literature agreed with the stand that the act of software piracy is ethically wrong and immoral. Furthermore, results of the study demonstrated that three out of four chosen independent variable have positive weak relationship with ethical standard. Only an independent variable which is pirating behavior showed that there was no relationship with ethical standard. Thus, awareness on the negative impact of software piracy is important to educate Malaysians to become morally and ethically conscious citizens.


international conference on advanced computer science applications and technologies | 2013

The Impact of IT Infrastructure Flexibility on Strategic Utilization on Information Systems: A Conceptual Framework

Norizan Anwar; Mohamad Noorman Masrek

Given the dearth of studies investigating the contribution of information technology infrastructure flexibility on strategic use of information systems, this paper proposed a framework linking the former and the later. In the framework, information systems strategic use is operationalised in three dimensions namely cost leadership, product or service differentiation, and growth advantage. The IT infrastructure flexibility is operationalized in nine dimensions namely compatibility, modularity, connectivity, IT personnel competency, scalability, continuity, rapidity, facility and modernity. The proposed framework is appropriate to be studied using the survey research methodology and the unit of analysis is firm or business organizations.


ieee symposium on business, engineering and industrial applications | 2012

Visitor Management system by applying the model of UTAUT

Norizan Anwar; Mohamad Noorman Masrek; Yanty Rahayu Rambli

Limited research conducted on the determinants of user acceptance of visitor application systems have been carried out eventhough there are varieties of similar system available in the market. Hence, in this paper, the researchers aim to adopt and adapt the Use of Technology model (UTAUT) to determine the user acceptance of visitor application system among viewers of the system. This visitor application system is called Visitor Management System (VMS) and with the motto “Handling Your Visitor at Your Fingertips”. Visitor Management System (VMS) was designed and developed in order to monitor visitor movement in an organization. The application can be viewed from local LAN (Intranet) with a standard web browser such as Microsoft Internet Explorer with no additional software or plug-in to load. VMS will be placed at the main guardhouse and will be handled by the corporate security section. Each of the department will be located with at least one front desk officer to monitor the current visitor to visit their department.

Collaboration


Dive into the Norizan Anwar's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Noraizan Amran

Universiti Teknologi MARA

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Azman Mat Isa

Universiti Teknologi MARA

View shared research outputs
Top Co-Authors

Avatar

Farrah Diana

Universiti Teknologi MARA

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Riaza Mohd Rias

Universiti Teknologi MARA

View shared research outputs
Researchain Logo
Decentralizing Knowledge