Your browser doesn't support javascript.
Show: 20 | 50 | 100
Results 1 - 5 de 5
Filter
1.
1st International Visualization, Informatics and Technology Conference, IVIT 2022 ; : 148-154, 2022.
Article in English | Scopus | ID: covidwho-2248716

ABSTRACT

The COVID-19 outbreak has resulted in a significant loss of human life around the world, and it poses an extraordinary threat to public health. Almost every government in the world is fighting to stop the disease from spreading. Governments have used harsh measures such as quarantines, lockdowns, social isolation, and movement restrictions. Malaysia reached 22nd place in the Global COVID-19 recovery Index globally. However, the studies that present Malaysia's experiences in countering COVID 19 still very minimum. This study aims to review Malaysia's experience in courting Covid 19 epidemic Spread, the results showed that Malaysian authorities have imposed several measures to encounter covid-19 pandemic such as travel restrictions, movement control, contact tracing, website, and social media, regular press releases, manual contact tracing, contact tracing apps. In fact, the digital contact tracing apps application technology indeed helped Malaysians to slow down the outbreak. It supported policymakers in the suppression of the pandemic and helped in the prevention of any possible wave of the coronavirus outbreak. © 2022 IEEE.

2.
Sustainability (Switzerland) ; 15(5), 2023.
Article in English | Scopus | ID: covidwho-2248715

ABSTRACT

The COVID-19 pandemic forced governments to implement strategies for contact tracing due to the disease's ease of spread. The Malaysian government has sought to develop and implement a digital contact-tracking application to make it easier and faster to detect the spread;the system has become an integral part of the exit strategy from mandated lockdowns. These applications keep track of the user's proximity with others who are in the system to inform them early on if they are at a risk of infection. The effectiveness of these applications depends on the willingness of users to install and allow the application to track their location at all times. Therefore, this research aims to identify the factors that would stimulate or slow down the adoption of contact-tracing apps. © 2023 by the authors.

3.
2022 International Conference on Intelligent Technology, System and Service for Internet of Everything, ITSS-IoE 2022 ; 2022.
Article in English | Scopus | ID: covidwho-2213345

ABSTRACT

The COVID-19 pandemic swiftly forced the closure of higher education institutions across the world. As a result, all educational institutions have made a considerable move toward e-learning. E-learning systems suffer from confidentiality, integrity, and availability-related security threats. Hence, understanding this problem from various perspectives that include technology, human behavior, management, and policies, as well as implementing policies and standards will assist in finding the most influencing factors that can help in protecting e-learning information systems from potential security threats. In this research, a review has been conducted to analyze and assess 55 states of the art articles on e-learning security and to identify countermeasures to strengthen e-learning information systems. The study contributes to our understanding of how to strengthen the e-learning information systems security by answering the following questions: What are the factors that have an impact on the e-learning systems vulnerability during the COVID-19 pandemic? What are the most important technology, management, and environment-based factors that need to be considered for protecting e-learning systems from potential security attacks?. The results of this study will enable decision and policymakers at higher education institutions to better understand the essential elements of adopting an e-learning system. Knowing these factors will help the designers and developers of e-learning systems adopt secure software design and development methodologies to reduce the likelihood that such vulnerabilities and it contributes to enhancing the system's security resilience against potential attacks. In addition, university management will be more knowledgeable about how to instruct their staff and students on best practices for using e-learning web applications. © 2022 IEEE.

4.
9th International Conference on Electrical and Electronics Engineering, ICEEE 2022 ; : 440-450, 2022.
Article in English | Scopus | ID: covidwho-1878959

ABSTRACT

Malaysian organizations are following different methods for cybersecurity risk assessment such as Control Objectives for Information and Related Technologies (COBIT) and International Organization for Standardization (ISO) 27001. The higher education institutions in Malaysia are facing the same difficulties as different standards and approaches are used to evaluate the cybersecurity risk of their institutions. So, there is a lack of a cybersecurity risk assessment approach that takes Malaysian and international standards into consideration. This paper aims to develop a cybersecurity risk assessment approach for higher education institutions in Malaysia. The methodology of conducting this research is qualitative research using a case study. The framework has considered international cybersecurity standards such as the Holistic cybersecurity maturity assessment framework (HCYMAF) and local cybersecurity standards such as National Cyber Security Agency (NACSA) and the Malaysia Cyber Security Strategy (MCSS). In addition, a measurable instrument to assess cybersecurity risk has been proposed. The subject-matter expert can apply this approach to assess their organization's cybersecurity maturity and risk. The findings of this study shall be useful in overcoming the drawbacks of employing non-standard procedures in such evaluations, resulting in more accurate and reliable evaluation outcomes. © 2022 IEEE.

5.
Periodicals of Engineering and Natural Sciences ; 9(4):977-998, 2021.
Article in English | Scopus | ID: covidwho-1591000

ABSTRACT

Since the quit of 2019, the COVID-19 disorder has been spreading over the world. This outbreak poses a principal risk to the public's fitness and safety, as well as the health and safety of medical personnel and medical systems around the world. During a pandemic, it is expected that robots will be used to improve patient care and reduce the burden on the medical system. However, there is a shortage of applications and smart systems in the e-health currently specially the proposed solutions for the pandemic, from the perspective of technologies. Throughout the healthcare application, the Wireless Body Area Network (WBAN) allows for non-stop fitness monitoring of the affected person besides affecting his or her normal things to do of each day living. One of the most significant factors for creating an effective surveillance system is network performance efficiency in health care applications. Previous research, on the different hand, has failed to produce a tremendous gadget that ought to tackle the constraints to the tremendous community set up or the improvement of WBAN structures successful in rapidly sending and receiving crucial affected person data. Thus, through this paper is proposed smart system in title Design and Implementation of WBAN Smart System connection to control Covid-19 patients remotely. There are some previous studies that have been adopted to examine the solutions currently used to address the packet loss. © The Author 2021. This work is licensed under a Creative Commons Attribution License (https://creativecommons.org/licenses/by/4.0/) that allows others to share and adapt the material for any purpose (even commercially), in any medium with an acknowledgement of the work's authorship and initial publication in this journal.

SELECTION OF CITATIONS
SEARCH DETAIL