{"id":222,"date":"2017-08-29T12:16:54","date_gmt":"2017-08-29T12:16:54","guid":{"rendered":"http:\/\/people.utm.my\/nurazean\/?page_id=222"},"modified":"2023-05-26T05:16:27","modified_gmt":"2023-05-26T05:16:27","slug":"example-4","status":"publish","type":"page","link":"https:\/\/people.utm.my\/nurazean\/example-4\/","title":{"rendered":"Supervision : Year 2012 &#8211; Present"},"content":{"rendered":"\n<p><strong>DOCTOR OF PHILOSOPHY \/ PHD<\/strong><\/p>\n\n\n\n<p><\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td><strong>Student Name<\/strong><\/td><td><strong>Research Working Title<\/strong><\/td><td><strong>Area of Research<\/strong><\/td><td><strong>Status<\/strong><\/td><\/tr><tr><td>WAN FAEZAH ABBAS<\/td><td>Enterprise Architecture for Digital Transformation Adaptation in Higher Education Institution<\/td><td>Information Systems\/ Governance Informatics<\/td><td>On -going(Co)<\/td><\/tr><tr><td>WAN MIMI HIRDAWATI WAN AFFANDI<\/td><td>Factors Influencing Adult Users Satisfaction on Quranic Application<\/td><td>Information Systems<\/td><td>On-going(Main)<\/td><\/tr><tr><td>AKEEM SULAIMAN KURANGA<\/td><td>Critical Success Factors for Enterprise Resource Planning Systems Post Implementation in A Public Sector Organization<\/td><td>Information Systems\/ Governance Informatics<\/td><td>On-going(Co)<\/td><\/tr><tr><td>FARHANA AINI BT SALUDIN<\/td><td>Web Design Features for Chronic Disease Patients<\/td><td>Information Systems\/ Health Informatics<\/td><td>On-going(Main)<\/td><\/tr><tr><td>PUSPADEVI A\/P KUPPUSAMY<\/td><td>Information Security Policy Compliance Behaviour Model For Malaysian Public Sector<\/td><td>Information Systems\/ Governance Informatics<\/td><td>Completed (Co)<\/td><\/tr><tr><td>ALTALHI MARYAM MUTI A<\/td><td>A Study of Social Co-Creation Acceptance Among Females in Saudi Arabia<\/td><td>Information Systems\/ Social Informatics<\/td><td>Completed(Main)<\/td><\/tr><tr><td>SURYA SUMARNI HUSSEIN<\/td><td>Enterprise Architecture Readiness Assessment Model for a Successful EA Establishment in Malaysia<\/td><td>Information Systems\/ Governance Informatics<\/td><td>Completed(Co)<\/td><\/tr><tr><td>KHAN SOHRAB<\/td><td>Factors Influencing Citizens Trust to Participate in Government Social Media<\/td><td>Information Systems\/ Social Informatics<\/td><td>Completed(Co)<\/td><\/tr><tr><td>NOOR HAFIZAH HASSAN<\/td><td>Factors Influencing Information Security Culture Among Healthcare Professional<\/td><td>Information Systems\/ Health Informatics<\/td><td>Completed(Co)<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p><strong>MASTER OF PHILOSOPHY \/ MPHIL<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td><strong>Student Name<\/strong><\/td><td><strong>Research Working Title<\/strong><\/td><td><strong>Area of Research<\/strong><\/td><td><strong>Status<\/strong><\/td><\/tr><tr><td>NUR HASNIZA ILLIAS<\/td><td>Success Model of Social Media Use for Flood Disaster Preparedness in Klang Valley<\/td><td>Information Systems<\/td><td>Completed (Main)<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p><strong>MASTER BY TAUGHT COURSE AND MASTER MIXED MODE<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td><strong>Student Name<\/strong><\/td><td><strong>Research Working Title<\/strong><\/td><td><strong>Area of Research<\/strong><\/td><td><strong>Status<\/strong><\/td><\/tr><tr><td>ALMABROUK ALHAMLI GUMA KHALLEEFAH<\/td><td>A Satisfaction Model Of Interactive Digital Whiteboard Considering Usability Factors<\/td><td>Information Systems\/ Education Informatics<\/td><td>Completed<\/td><\/tr><tr><td>ABDUL HALID RAMLI<\/td><td>Information System Security Risk Assessment Checklist for Managing Facilities in The Transportation Industry<\/td><td>Information Security<\/td><td>Completed<\/td><\/tr><tr><td>AHMAD FARID BIN ABDOL GHANI<\/td><td>Modeling Of The Business Requirement Architecture Of An Integrated Pharmacy Hospital Information System<\/td><td>Information Systems\/ Healthcare Informatics<\/td><td>Completed<\/td><\/tr><tr><td>NURUL SAKINA BINTI SHAHARUDIN<\/td><td>Digital Community Dashboard For Pandemic Outbreak Management Using Visual Analytics<\/td><td>Information Systems\/ Business Intelligence<\/td><td>Completed<\/td><\/tr><tr><td>NUR SAKINAH BINTI MD SANI<\/td><td>Metamorphic Virus Detection Using Term Frequency Inverse Document Frequency (TF- IDF)<\/td><td>Information Security<\/td><td>Completed<\/td><\/tr><tr><td>MARHA SIDIK<\/td><td>Success Model of Digital Government in Malaysia Environment<\/td><td>Information Systems\/ Governance Informatics<\/td><td>Completed<\/td><\/tr><tr><td>NORJANAH SULAIMAN&nbsp;&nbsp;(Best Student)<\/td><td>Internet of Things Readiness Amongst Malaysian Public Organization<\/td><td>Information Systems\/ Governance Informatics<\/td><td>Completed<\/td><\/tr><tr><td>NUR NAZIRA MUSTAKENG<\/td><td>Factors Influencing Social Media Usage Towards Flood Disaster Management<\/td><td>Information Systems\/ Business Intelligence<\/td><td>Completed<\/td><\/tr><tr><td>SITI NORHIDAYAH MOHAMAD<\/td><td>Success Model of Business Intelligence Implementation in Higher Education: A Feasibility Study<\/td><td>Information Systems\/ Business Intelligence<\/td><td>Completed<\/td><\/tr><tr><td>NURHAZIRAH ABDAN<\/td><td>National Kidney Foundation (NKF) Malaysia Website Success Model<\/td><td>Information Systems\/ Health Informatics<\/td><td>Completed<\/td><\/tr><tr><td>ASLINA MAT ASLI<\/td><td>Juvenile Profiles Among Malaysian and Sexual Habit Pattern Detection Using Machine Learning Algorithm<\/td><td>Business Intelligence<\/td><td>Completed<\/td><\/tr><tr><td>FATHI IBRAHIM SALIH YAGOUB<\/td><td>E-Government Adoption Model for Citizens in Sudan<\/td><td>Information Systems\/ Information Security<\/td><td>Completed<\/td><\/tr><tr><td>MUHAMMAD FARHAN BIN SHAHROM<\/td><td>Determining Factors Affecting Defence Against Social Engineering<\/td><td>Information Systems\/ Information Security<\/td><td>Completed<\/td><\/tr><tr><td>RINI YUDESIA BINTI NASWIR<\/td><td>Usability Conceptual Model of Digital Government in Malaysia<\/td><td>Information Systems\/ Governance Informatics<\/td><td>Completed<\/td><\/tr><tr><td>WAN MIMI HIRDAWATI WAN AFFANDI<\/td><td>Success Model of Research Information Management System in Research University<\/td><td>Information Systems\/ Governance Informatics<\/td><td>Completed<\/td><\/tr><tr><td>SITI RINIY FARIZA BINTI MOHD BORHAM (Best Student)<\/td><td>The Acceptance of Internet of Things (IoT) Considering Security Perspective in Malaysian Government<\/td><td>Information Systems\/ Governance Informatics<\/td><td>Completed<\/td><\/tr><tr><td>HASLINDA BINTI MAT AKHIR (Best Student)<\/td><td>Success Model for Bring Your Own Device (BYOD) Implementation Considering Human and Security Perspective in Malaysia Government Environment<\/td><td>Information Systems\/ Governance Informatics<\/td><td>Completed<\/td><\/tr><tr><td>HONG KIM HENG (Best Student)<\/td><td>A Conceptual Model of Factors Affecting Trust of Software as a Service Usage in Public Network<\/td><td>Information Systems\/ Information Security<\/td><td>Completed<\/td><\/tr><tr><td>REDHWAN AL-AMRI<\/td><td>Factors Influencing NFC Mobile Wallet Proximity Payment<\/td><td>Information Systems\/ Information Security<\/td><td>Completed<\/td><\/tr><tr><td>DERICK NG CHI HORNG<\/td><td>Factors Affecting Web Accessibility Implementation in Journalism Companies<\/td><td>Information Systems\/ Informatics<\/td><td>Completed<\/td><\/tr><tr><td>LUQMAN HAKIM IBRAHIM<\/td><td>Information Security Governance Framework for Intelligence Department<\/td><td>Information Systems\/ Information Security<\/td><td>Completed<\/td><\/tr><tr><td>FUADY RASHID OMAR<\/td><td>E-Commerce adoption in Zanzibar<\/td><td>Information Systems\/ Governance Informatics<\/td><td>Completed<\/td><\/tr><tr><td>SHEHAB AL BADRI<\/td><td>Secure Model for Online Shopping Among Millennial&nbsp;&nbsp; in Yemen<\/td><td>Information Systems\/ Information Security<\/td><td>Completed<\/td><\/tr><tr><td>KAVITHA THAMADHARAN (Anugerah Naib Canselor)<\/td><td>Feasibility of E-Assessment Among Lecturers Considering Security Perspective<\/td><td>Information Systems\/ Information Security<\/td><td>Completed<\/td><\/tr><tr><td>NURBAINI ZAINUDDIN<\/td><td>Feasibility Study of Cloud Computing Adoption in Private Hospital<\/td><td>Information Systems\/ Health Informatics<\/td><td>Completed<\/td><\/tr><tr><td>HASIMAH RAZAK<\/td><td>Security Features of Teleconsultation<\/td><td>Information Systems\/ Health Informatics<\/td><td>Completed<\/td><\/tr><tr><td>MEHRAN JANFESHAN<\/td><td>Vulnerability Detection Assessment in Large Organization<\/td><td>Information Security<\/td><td>Completed<\/td><\/tr><tr><td>ABDUL QADER SHEIKH AIDARUS<\/td><td>Information Security Awareness Model for Employees in Bank<\/td><td>Information Systems\/ Information Security<\/td><td>Completed<\/td><\/tr><tr><td>MD ATHAR IMTIAZ&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; (Best Student)<\/td><td>Feasibility Study of Lecturers\u2019 Acceptance of E- Assessment<\/td><td>Information Systems\/ Education Informatics<\/td><td>Completed<\/td><\/tr><tr><td>NURBAYA MOHD ROSLI<\/td><td>A Study of Acceptance of FROG VLE in Vocational College<\/td><td>Information Systems\/ Education Informatics<\/td><td>Completed<\/td><\/tr><tr><td>ERFAN AYAZI<\/td><td>Understanding Enterprise Resources Planning Implementation Success Factors in Steel Manufacturing Industry: A Case Study in Iran<\/td><td>Information Systems\/ Enterprise Informatics<\/td><td>Completed<\/td><\/tr><tr><td>MALAHAT POURANSAFAR<\/td><td>Understanding the Information Security Vulnerability in Electrical Industry: A Case Study in Iran<\/td><td>Information Systems\/ Enterprise Informatics<\/td><td>Completed<\/td><\/tr><tr><td>NURADILAH IBRAHIM<\/td><td>Factors Affecting the Acceptance of Mobile Application Among Millennials in Malaysia<\/td><td>Information Systems\/ Social Informatics<\/td><td>Completed<\/td><\/tr><tr><td>HATAMULLAH MOHD ARIF<\/td><td>Web Accessibility Features for Partially Blind Users<\/td><td>Information Systems\/ Informatics<\/td><td>Completed<\/td><\/tr><tr><td>NOORJAN MOHD MUSTAPHA<\/td><td>Success Factors of Information Security Management System Plan Phase Self Implementation<\/td><td>Information Systems\/ Governance Informatics<\/td><td>Completed<\/td><\/tr><tr><td>TAMIL CHELVI VADIVELU<\/td><td>Security Features for Remote Healthcare System in Government Hospital<\/td><td>Information Systems\/ Health Informatics<\/td><td>Completed<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>DOCTOR OF PHILOSOPHY \/ PHD Student Name Research Working Title Area of Research Status WAN FAEZAH ABBAS Enterprise Architecture for Digital Transformation Adaptation in Higher Education Institution Information Systems\/ Governance Informatics On -going(Co) WAN MIMI HIRDAWATI WAN AFFANDI Factors Influencing Adult Users Satisfaction on Quranic Application Information Systems On-going(Main) AKEEM SULAIMAN KURANGA Critical Success Factors [&hellip;]<\/p>\n","protected":false},"author":24841,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-222","page","type-page","status-publish","hentry","entry"],"_links":{"self":[{"href":"https:\/\/people.utm.my\/nurazean\/wp-json\/wp\/v2\/pages\/222","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/people.utm.my\/nurazean\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/people.utm.my\/nurazean\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/people.utm.my\/nurazean\/wp-json\/wp\/v2\/users\/24841"}],"replies":[{"embeddable":true,"href":"https:\/\/people.utm.my\/nurazean\/wp-json\/wp\/v2\/comments?post=222"}],"version-history":[{"count":24,"href":"https:\/\/people.utm.my\/nurazean\/wp-json\/wp\/v2\/pages\/222\/revisions"}],"predecessor-version":[{"id":1376,"href":"https:\/\/people.utm.my\/nurazean\/wp-json\/wp\/v2\/pages\/222\/revisions\/1376"}],"wp:attachment":[{"href":"https:\/\/people.utm.my\/nurazean\/wp-json\/wp\/v2\/media?parent=222"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}