Search Results - "Ismail, Zuraini"
-
1
Retraction Note to: Day of the year-based prediction of horizontal global solar radiation by a neural network auto-regressive model
Published in Theoretical and applied climatology (01-05-2020)“…The Editor-in-Chief has retracted this article [1] because validity of the content of this article cannot be verified. This article showed evidence of…”
Get full text
Journal Article -
2
Safe use of hospital information systems: an evaluation model based on a sociotechnical perspective
Published in Behaviour & information technology (01-02-2020)“…There is growing evidence that shows Hospital Information Systems (HIS) can pose risks to patient safety when they are poorly designed, implemented, or…”
Get full text
Journal Article -
3
Healthcare practitioner behaviours that influence unsafe use of hospital information systems
Published in Health informatics journal (01-03-2020)“…This study aims to investigate healthcare practitioner behaviour in adopting Health Information Systems which could affect patients’ safety and quality of…”
Get full text
Journal Article -
4
RETRACTED ARTICLE: Day of the year-based prediction of horizontal global solar radiation by a neural network auto-regressive model
Published in Theoretical and applied climatology (01-08-2016)“…The availability of accurate solar radiation data is essential for designing as well as simulating the solar energy systems. In this study, by employing the…”
Get full text
Journal Article -
5
Classification of antecedents towards safety use of health information technology: A systematic review
Published in International journal of medical informatics (Shannon, Ireland) (01-11-2015)“…Highlights • We identify and classify the antecedents for safety use of health IT. • The antecedents are attributed by socio-technical aspect. • The…”
Get full text
Journal Article -
6
The Impact of the Security Competency on “Self-Efficacy in Information Security” for Effective Health Information Security in Iran
Published in Journal of medical systems (01-11-2016)“…The security effectiveness based on users’ behaviors is becoming a top priority of Health Information System (HIS). In the first step of this study, through…”
Get full text
Journal Article -
7
Notice of Retraction: A comprehensive adoption model of e-Government services in developing countries
Published in 2010 IEEE International Conference on Advanced Management Science(ICAMS 2010) (01-07-2010)Get full text
Conference Proceeding -
8
Development and Validation of SafeHIT: An Instrument to Assess the Self-Reported Safe Use of Health Information Technology
Published in Applied clinical informatics (01-08-2023)“…Implementing health information technology (HIT) may cause unintended consequences and safety risks when incorrectly designed and used. Yet, the tools to…”
Get full text
Journal Article -
9
Day of the year-based prediction of horizontal global solar radiation by a neural network auto-regressive model
Published in Theoretical and applied climatology (01-08-2016)“…The availability of accurate solar radiation data is essential for designing as well as simulating the solar energy systems. In this study, by employing the…”
Get full text
Journal Article -
10
Exploring the contributing factors to workarounds to the hospital information system in Malaysian hospitals
Published in Journal of evaluation in clinical practice (01-10-2020)“…Objectives The objective of this study was to identify the factors influencing workarounds to the Hospital Information System (HIS) in Malaysian government…”
Get full text
Journal Article -
11
Security threats categories in healthcare information systems
Published in Health informatics journal (01-09-2010)“…This article attempts to investigate the various types of threats that exist in healthcare information systems (HIS). A study has been carried out in one of…”
Get more information
Journal Article -
12
EXPLORING COMPUTER ETHICS ISSUES IN MALAYSIA
Published in Issues in information systems (2010)Get full text
Journal Article -
13
Antecedents for safety in health IT: An exploratory investigation
Published in Proceedings of the 6th International Conference on Information Technology and Multimedia (01-11-2014)“…Most of the accidental harm in the healthcare process related to patient safety leads to medical errors. One of the recommendations to prevent medical errors…”
Get full text
Conference Proceeding -
14
Testing an Adoption Model for E-Government Services Using Structure Equation Modeling
Published in 2013 International Conference on Informatics and Creative Multimedia (01-09-2013)“…The prevalent issue in the adoption of e-Government services may be in the social behavior of the user themselves, particularly in a developing country. The…”
Get full text
Conference Proceeding -
15
Information security culture in health informatics environment: A qualitative approach
Published in 2017 International Conference on Research and Innovation in Information Systems (ICRIIS) (01-07-2017)“…Information security culture is recognised as having an influence towards end-user compliance towards information security controls and policies in the…”
Get full text
Conference Proceeding -
16
Healthcare employees' perception on information privacy concerns
Published in 2017 International Conference on Research and Innovation in Information Systems (ICRIIS) (01-07-2017)“…Healthcare organisations process massive amount of electronic medical records (EMR) utilised by their employees. Having given privileged access to sensitive…”
Get full text
Conference Proceeding -
17
Information privacy concerns in electronic healthcare records: A systematic literature review
Published in 2013 International Conference on Research and Innovation in Information Systems (ICRIIS) (01-11-2013)“…The concerns in healthcare services is needed to deal with privacy and data security risks in handling electronic healthcare records (EHR). With the limitation…”
Get full text
Conference Proceeding Journal Article -
18
A conceptual model for knowledge sharing towards information security culture in healthcare organization
Published in 2013 International Conference on Research and Innovation in Information Systems (ICRIIS) (01-11-2013)“…Digital innovations have now made it possible for healthcare organization to transform their task to use digital devices to access medical information, monitor…”
Get full text
Conference Proceeding Journal Article -
19
Botnet evolution: Network traffic indicators
Published in 2014 International Symposium on Biometrics and Security Technologies (ISBAST) (01-08-2014)“…In recent years, the HTTP has become dominant protocol among other protocols for the Internet services as it provides a set of rules to manage the data…”
Get full text
Conference Proceeding -
20
Initial framework on identifying factors influencing individuals' usage of telehealth
Published in 2013 International Conference on Research and Innovation in Information Systems (ICRIIS) (01-11-2013)“…In this study, we proposed a research model to investigate the factors influencing individuals' usage of telehealth, in particular, MyHealth portal, a…”
Get full text
Conference Proceeding Journal Article