![](https://dblp.uni-trier.de./img/logo.320x120.png)
![search dblp search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
default search action
Zuraini Ismail
Person information
Refine list
![note](https://dblp.uni-trier.de./img/note-mark.dark.12x12.png)
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2020
- [j8]Lizawati Salahuddin
, Zuraini Ismail, Raja Rina Raja Ikram
, Ummi Rabaah Hashim, Ariff Idris, Nor Haslinda Ismail, Noor Hafizah Hassan, Fiza Abdul Rahim
:
Safe use of hospital information systems: an evaluation model based on a sociotechnical perspective. Behav. Inf. Technol. 39(2): 188-212 (2020) - [j7]Lizawati Salahuddin
, Zuraini Ismail, Ummi Rabaah Hashim, Nor Haslinda Ismail, Raja Rina Raja Ikram
, Fiza Abdul Rahim
, Noor Hafizah Hassan:
Healthcare practitioner behaviours that influence unsafe use of hospital information systems. Health Informatics J. 26(1) (2020)
2010 – 2019
- 2019
- [j6]Lizawati Salahuddin
, Zuraini Ismail, Ummi Rabaah Hashim, Raja Rina Raja Ikram
, Nor Haslinda Ismail, Mohd Hariz Naim @ Mohayat
:
Sociotechnical factors influencing unsafe use of hospital information systems: A qualitative study in Malaysian government hospitals. Health Informatics J. 25(4) (2019) - 2017
- [c24]Sanaz Kavianpour
, Zuraini Ismail, Bharanidharan Shanmugam
:
Classification of Third-Party Applications on Facebook to Mitigate Users' Information Leakage. WorldCIST (1) 2017: 144-154 - 2016
- [j5]Ahmad Bakhtiyari Shahri
, Zuraini Ismail, Shahram Mohanna
:
The Impact of the Security Competency on "Self-Efficacy in Information Security" for Effective Health Information Security in Iran. J. Medical Syst. 40(11): 241:1-241:9 (2016) - [c23]Surya Sumarni Hussein
, Zuraini Ismail, Mohd Naz'ri Mahrin, Mohd Shahidan Abdullah, Nor Zairah Ab. Rahim
, Ganthan Narayana Samy, Mohamad Zainuddi Mat Taib:
Towards designing an EA readiness instrument: A systematic review. CIST 2016: 158-163 - 2015
- [j4]Lizawati Salahuddin
, Zuraini Ismail:
Classification of antecedents towards safety use of health information technology: A systematic review. Int. J. Medical Informatics 84(11): 877-891 (2015) - [c22]Lizawati Salahuddin
, Zuraini Ismail:
Safety Use of Hospital Information Systems: A Preliminary Investigation. KMO 2015: 707-721 - 2014
- [c21]Yew Chuan Ong, Zuraini Ismail:
Enhanced Web Log Cleaning Algorithm for Web Intrusion Detection. IC2IT 2014: 315-324 - [c20]Mohammd Reza Rostami, Meisam Eslahi, Bharanidharan Shanmugam
, Zuraini Ismail:
Botnet evolution: Network traffic indicators. ISBAST 2014: 274-279 - [c19]Fiza Abdul Rahim
, Zuraini Ismail, Ganthan Narayana Samy:
Information Privacy Concerns in Electronic Medical Records: A Preliminary Investigation. KMO 2014: 177-185 - [c18]Noor Hafizah Hassan, Zuraini Ismail, Nurazean Maarop:
Understanding Relationship Between Security Culture and Knowledge Management. KMO 2014: 397-402 - 2013
- [c17]Fiza Abdul Rahim
, Zuraini Ismail
, Ganthan Narayana Samy
:
A Conceptual Model for Privacy Preferences in Healthcare Environment. KMO 2013: 221-228 - [c16]Noor Hafizah Hassan, Zuraini Ismail
:
Investigation of Key Resistance Factors in Knowledge Sharing Towards Information Security Culture in Healthcare Organization. KMO 2013: 593-601 - [c15]Sanaz Kavianpour
, Bharanidharan Shanmugam
, Zuraini Ismail
:
Data Anonymization According to the Combination of Attributes on Social Network Sites. SSCC 2013: 272-280 - [c14]Ahmad Bakhtiyari Shahri
, Zuraini Ismail
, Nor Zairah Ab. Rahim
:
Constructing Conceptual Model for Security Culture in Health Information Systems Security Effectiveness. WorldCIST 2013: 213-220 - 2012
- [j3]Ahmad Bakhtiyari Shahri, Zuraini Ismail:
A Tree Model for Identification of Threats as the First Stage of Risk Assessment in HIS. J. Information Security 3(2): 169-176 (2012) - [c13]Elfadil Sabeil, Azizah Abdul Manaf, Zuraini Ismail
:
Development of Malaysian Digital Forensics Investigator Competency Identification Methods. AMLTA 2012: 554-565 - [c12]Fatemeh Meskaran, Zuraini Ismail
:
Customers' trust in e-commerce: In collective culture setting. CAMP 2012: 182-186 - [c11]Suhaila Samsuri, Zuraini Ismail, Rabiah Ahmad:
Adopting a Knowledge Management Concept in Securing the Privacy of Electronic Medical Record Systems. KMO 2012: 547-558 - [c10]Amirhossein Mohtasebi, Zuraini Ismail
, Bharanidharan Shanmugam
:
Analysis of Applying Enterprise Service Bus Architecture as a Cloud Interoperability and Resource Sharing Platform. KMO 2012: 581-588 - 2011
- [c9]Sanaz Kavianpour
, Zuraini Ismail
, Amirhossein Mohtasebi:
Effectiveness of Using Integrated Algorithm in Preserving Privacy of Social Network Sites Users. DICTAP (2) 2011: 237-249 - [c8]Elfadil Sabeil, Azizah Bt Abdul Manaf, Zuraini Ismail
, Mohamed Abas
:
Trainees' Competency Based-Assessment Methods in Cyber Forensics Education or Training Programmes - A Review. ICSECS (1) 2011: 517-526 - 2010
- [j2]Ganthan Narayana Samy
, Rabiah Ahmad, Zuraini Ismail:
Security threats categories in healthcare information systems. Health Informatics J. 16(3): 201-209 (2010) - [c7]Zahri Yunos, Syahrul Hafidz Suid, Rabiah Ahmad, Zuraini Ismail
:
Safeguarding Malaysia's critical national information infrastructure (CNII) against cyber terrorism: Towards development of a policy framework. IAS 2010: 21-27 - [c6]Ganthan Narayana Samy
, Rabiah Ahmad, Zuraini Ismail
:
A framework for integrated risk management process using survival analysis approach in information security. IAS 2010: 185-190 - [c5]Nurzaini Mohamad Zain, Ganthan Narayana Samy
, Rabiah Ahmad, Zuraini Ismail
, Azizah Bt Abdul Manaf:
Fuzzy Based Threat Analysis in Total Hospital Information System. AST/UCMA/ISA/ACN 2010: 1-14
2000 – 2009
- 2009
- [j1]Maslin Masrom, Zuraini Ismail
, Ramlah Hussein:
Ethical awareness of computer use among undergraduate students. SIGCAS Comput. Soc. 39(1): 27-40 (2009) - [c4]Ganthan Narayana Samy
, Rabiah Ahmad, Zuraini Ismail
:
Threats to Health Information Security. IAS 2009: 540-543 - [c3]Rabiah Ahmad, Ganthan Narayana Samy
, Nuzulha Khilwani Ibrahim, Peter A. Bath
, Zuraini Ismail
:
Threats Identification in Healthcare Information Systems Using Genetic Algorithm and Cox Regression. IAS 2009: 757-760 - 2008
- [c2]Maslin Masrom, Zuraini Ismail:
Computer Ethics Awareness Among Undergraduate Students in Malaysian Higher Education Institutions. ACIS 2008 - 2006
- [c1]Husnayati Hussin, Zuraini Ismail, Mohd. Adam Suhaimi, Noor Shahriza Abdul Karim:
Examining Factors Influencing IT Outsourcing Success in Malaysian Organizations. ACIS 2006
Coauthor Index
![](https://dblp.uni-trier.de./img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-21 00:18 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint