Rohail Hassan
Universiti Teknologi Petronas
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Rohail Hassan.
The Journal of social sciences and humanities | 2017
Humera Khan; Rohail Hassan; Maran Marimuthu
This study examines the relationship between gender diversity among corporate board and firms’ financial performance using 100 non-financial companies in Malaysia. This study uses data from 2009 to 2013. Return on equity measures the financial performance. Gender diversity measured by the number of females on board. This study incorporates descriptive statistics, correlation testing, and regression analysis. However, the results of gender diversity have a positive impact on performance (ROE).
2015 International Symposium on Technology Management and Emerging Technologies (ISTMET) | 2015
Rohail Hassan; Maran Marimuthu; Satirenjit Kaur Johl
This paper examines the demographic diversity at top-level management and its impact on firm performance. The paper focuses on Upper-echelon theory, which explains board characteristics and firm performance. Theoretical framework is specially designed using concepts, measures and models. Relevant hypotheses are developed to test diversity impact with the use of appropriate variables and measures. A total sample of large 60 top listed companies are considered based on their market capitalization. This empirical work uses BODs attributes and financial data, which are gathered over the period 2009 to 2013. This study incorporates econometrics methodology on panel data analysis, which is used rigorously for hypothesis testing. The results indicate that demographic diversity at board level does have a relationship with market value.
international conference on computer communications | 2014
Sum Keng Chung; Ow Chee Yee; Manmeet Mahinderjit Singh; Rohail Hassan
E-learning enables acquisition of knowledge and information through technologies such as computers, smartphones, tablets and wide area networks. The existence of e-learning does contribute in the field of education field such as in the university because its improve the education quality and distributing and sharing of teaching material efficiently. However, due to the open-network in which e-learning tools resides, it is prone to various security attacks. In this paper, we will classify e-learning technology security based attacks into classification via active and passive attacks. Next, two major attacks which is the SQL injection attack and session hijacking is explored in-depth. Case study for each attack to investigate the vulnerabilities in e-learning system and mechanism of solutions to tackle this attack is also presented. An evaluation of the proposed solutions against the X.800 security architecture is done at the end of the study.
international conference on ubiquitous information management and communication | 2015
Teh FarahinAzahar; Manmeet Mahinderjit-Singh; Rohail Hassan
Radio frequencies refer to the electromagnetic energy that we transmit the identification information from tags to its reader. Radio Frequency Identification (RFID) transmits the data without line of sight. RFID tags are small, wireless devices that help identify item automatically and indicating unique serial number for each item. However, counterfeiting in supply chain management likes cloned and fraud RFID tag bring the impact to the organization and social when attackers want to gain illegal benefits. Organizationsarelosing a lot of money and trust from userswhen counterfeiting occurred. Furthermore, RFID data nature characteristics faces the issues likes RFID just carry simple information, in-flood of data, inaccuracy data from RFID readers and difficulties to track spatial and place. We propose to use clustering algorithms in order to detect counterfeit in supply chain management. We will apply various clustering algorithms to analyzed and determine every attribute in the dataset structure pattern. Based on evaluation that have done, we found that Farthest First is the best algorithm for 1000 (small data) and 10000 (bigger data). However, the values of false negative in data still quite high and it is dangerous if RFID scanner misread the cloned or fraud tags become genuine tags. Hence, we applied cost algorithms to reduce false negative values.
Global Business and Management Research: An International Journal | 2015
Rohail Hassan; Maran Marimuthu; Satirenjit Kaur Johl
Advanced Science Letters | 2015
Rohail Hassan; Maran Marimuthu; Satirenjit Kaur Johl
Economics Bulletin | 2016
Rohail Hassan; Maran Marimuthu
International Journal of Biometrics | 2015
Rohail Hassan; Maran Marimuthu
International Journal of Financial Studies | 2017
Rohail Hassan; Maran Marimuthu
Social Responsibility Journal | 2018
Roshima Said; Ariffah Ashikin Abdul Rahim; Rohail Hassan