Acta Informatica Malaysia (AIM)

THE MEDIATING ROLE OF INTRINSIC MOTIVATION BETWEEN TRANSFORMATIONAL LEADERSHIP AND CREATIVITY

THE MEDIATING ROLE OF INTRINSIC MOTIVATION BETWEEN TRANSFORMATIONAL LEADERSHIP AND CREATIVITY

ABSTRACT

 

THE MEDIATING ROLE OF INTRINSIC MOTIVATION BETWEEN TRANSFORMATIONAL LEADERSHIP AND CREATIVITY

Journal: Acta Informatica Malaysia (AIM)

Author: Abdul Majeed, Sabarani B. Ghazali

This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited

Doi:10.26480/aim.01.2018.01.03

The current article is a literature review on the mediating role of intrinsic motivation between transformational leadership and creativity. However, past studies conducted on the role of intrinsic motivation as a mediator between transformational leaders and creativity has produced mixed results. Moreover, the lack and significance of creativity in education have been highlighted.Conclusion and future research are written at the end.

Pages 01-03
Year 2018
Issue 1
Volume 2

Download

Research On The Multilevel Security Authorization Method Based On Image Content

ABSTRACT

 

Research On The Multilevel Security Authorization Method Based On Image Content

Journal: Acta Informatica Malaysia (AIM)

Author: Tu. Chunxia

This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited

Doi:10.26480/aim.02.2017.17.19

The technology of digital watermarking and information hidden of image cannot solve the security problem of confidential regional data, and thus the research of the high-performance encryption technology of confidential data of Large Quantity of image has a important theoretical value and practical significance.In this paper, on the basis of the characteristics of Large Quantity of Image and application requirements on security, a scheme of authorizing the use of image based on multi-level secrurity is put forward. We propose multi-region and multi-level confidential information of image encryption algorithm based on content. The same images after encryption are distrtbuted to different level users, such as authorized user, partly authorized user, unauthorized user, but different authorization users acquire different importmant degree information after decryption through their own decryption keys. The scheme has the high confidentiality and high computing efficiency encryption algorithm and solve the difficult problems of Large Quantity of Image on security and secrecy.

 

Pages 17-19
Year 2017
Issue 2
Volume 1

Download

Rasch Model Application In Validating Instrument for Knowledge Integration in Small Medium Enterprises

ABSTRACT

 

Rasch Model Application In Validating Instrument for Knowledge Integration in Small Medium Enterprises

Journal: Acta Informatica Malaysia (AIM)
Author: Nur Ilyana Ismarau Tajuddin, Rusli Abdullah, Marzanah A. Jabar, Yusmadi Yah Jusoh, Nureize Arbaiy

This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited

DOI:10.26480/aim.02.2017.15.16

This paper aims in analysing the application of Social Media to enhance the Knowledge Integra-tion (KI) by proposed of KI model for Small Medium Enterprises (SMEs) by using Rasch Model Application. An initial conceptual model has been constructed based on TOE framework (Tech-nology, Organization, Environment) which is including KI, Social Media, SMEs, Environment, and Service Quality Factors.

Pages 15-16
Year 2017
Issue 2
Volume 1

Download

A Conceptual Framework For Measuring The Performance of Big Data Analytics Process

ABSTRACT

 

A Conceptual Framework For Measuring The Performance of Big Data Analytics Process

Journal: Acta Informatica Malaysia (AIM)

Author: Ismail Mohamed Ali, Yusmadi Yah Jusoh, Rusli Abdullah, Rozi Nor Haizan Nor

This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited

DOI:10.26480/aim.02.2017.13.14

Processes are described as a sequence of steps which result in a specific output based on a given input. The use of term, process, is common and used in different settings including more recently as big data analytics(BDA) process, and Extract, Transform, Load (ETL) process for traditional data warehousing and business intelligence in the past. BDA process starts from data acquisition and selection of the sources, to data preparation, analysis and modeling, to visualiza-tion and interpretation phases. Looking at big data analytics in a process perspective has major benefits since improving process drives a better outcome. This study focuses on how the performance of BDA process can be measured. The major con-tribution will be performance measurement framework of BDA process. The concept of process performance is broadly covered in the literature, mainly in the areas of business process and software process. Thus, process performance measures are available. Time, quality, cost, and flexibility are four of them. Do they apply to BDA process? This is a major question to be dealt with in this research. The overall structure of this research is shown in Figure 1.

Pages 13-14
Year 2017
Issue 2
Volume 1

Download

Agile Methodologies and The Use of Its Waterscrumfall Derivative For Software Project Development

ABSTRACT

 

Agile Methodologies and The Use of Its Waterscrumfall Derivative For Software Project Development

Journal: Acta Informatica Malaysia (AIM)
Author: Marzanah A. Jabar, Norhayati Mohd. Ali, Yusmadi Yah Jusoh, Salfarina Abdullah, S. Mohanarajah, Nazri Mohd Nawi

This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited

DOI:10.26480/aim.02.2017.11.12

This paper discusses the Agile methodologies and the use of its water-scrum-fall derivative for software project development. This approach seems to be a good alternative to the current development methods.

Pages 11-12
Year 2017
Issue 2
Volume 1

Download

Infrastructure Requirements For Experience Based Factory Model in Software Development Process in a Collaborative Environment

ABSTRACT

 

Infrastructure Requirements For Experience Based Factory Model in Software Development Process in a Collaborative Environment

Journal: Acta Informatica Malaysia (AIM)
Author: Mastura Hanafiah, Rusli Abdullah, Masrah Azrifah Azmi Murad, Jamilah Din, Norfaradilla Wahid

This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited

DOI:10.26480/aim.02.2017.09.10

This paper discuss the infrastructure requirement of the model named Experienced Based Facto-ry Model for Software Development Process (EBF-SD) in order to ensure the implementation of the model will be able support collaborative environment effectively and efficiently.

Pages 09-10
Year 2017
Issue 2
Volume 1

Download

Improving Security And Privacy Requirement For Business Registration System (BRS)

ABSTRACT

 

Improving Security And Privacy Requirement For Business Registration System (BRS)

Journal: Acta Informatica Malaysia (AIM)
Author: Siti Fatimah Daud, Noraini Che Pa, Aida Mustapha, Cik Feresa Mohd Foozy

This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited

DOI:10.26480/aim.02.2017.07.08

This paper explains the security and privacy requirement in Business Registration System (BRS) hosted at a government institution. These requirements will be used in an improvement for the system security and privacy requirement in BRS.

Pages 07-08
Year 2017
Issue 2
Volume 1

Download

Evaluating The Collaboration Level Among Physicians in Malaysian Healthcare Environment

ABSTRACT

 

Evaluating The Collaboration Level Among Physicians in Malaysian Healthcare Environment

Journal: Acta Informatica Malaysia (AIM)
Author: Luma Fawaz, Jarallah, Masrah Azrifah Azmi, Murad Marzanah A, Jabar Salfarina, Abdullah, Nurul Hidayah Ab Rahman

This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited

DOI: 10.26480/aim.02.2017.05.06

This paper explains the security and privacy requirement in Business Registration System (BRS) hosted at a government institution. These requirements will be used in an improvement for the system security and privacy requirement in BRS.
Pages 05-06
Year 2017
Issue 2
Volume 1

Download

Sustainable Green Information Systems Design: A Theoretical Model

ABSTRACT

 

Sustainable Green Information Systems Design: A Theoretical Model

Journal: Acta Informatica Malaysia (AIM)
Author: Shireen Muhammad, Yusmadi Yah Jusoh, Jamilah Din, Rozi Nor Haizan Nor, Azizul Azhar Ramli

This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited

DOI: 10.26480/aim.02.2017.03.04

This paper reports an ongoing research to develop a theoretical model for sustainable green information systems (green IS) design. The model is intended to be used as a reference model in designing a green IS by taking into account consideration, the environmental, economic, social and cultural sustainability dimensions so that they are fit for sustainability. For each dimension, the related non-functional attributes are specified.
Pages 03-04
Year 2017
Issue 2
Volume 1

Download

Managing Sensitive Data In Cloud Computing For Effective Information Systems’ Decisions

ABSTRACT

 

Managing Sensitive Data In Cloud Computing For Effective Information Systems’ Decisions

Journal: Acta Informatica Malaysia (AIM)
Author: Haifaa Jassim Muhasin, Marzanah A. Jabar, Salfarina Abdullah, Shahreen Kasim

This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited

DOI: 10.26480/aim.02.2017.01.02

The purpose of this research is defining the main factors influencing on decision of management system on sensitive data in cloud. The framework is proposed, a structured interview with experts working on cloud computing and a pilot study conduct to explore the main objectives of framework. The framework using multilevel to enhance management information system on sensitive data in cloud.
Pages 01-02
Year 2017
Issue 2
Volume 1

Download