Mohd Fairuz Iskandar Othman
TitleCited byYear
Barriers to Information Technology Governance Adoption: A Preliminary Empirical Investigation
MFI Othman, T Chan, E Foo, KJ Nelson, GT Timbrell
15th International Business Information Management Association Conference …, 2011
442011
Barriers to Formal IT Governance Practice--Insights from a Qualitative Study
MFI Othman, T Chan
46th Hawaii International Conference on System Sciences (HICSS), 4415-4424, 2013
212013
Advanced Computer and Communication Engineering Technology: Proceedings of ICOCOE 2015
Springer 362, 1325, 2016
15*2016
What Is the Influence of Users’ Characteristics on Their Ability to Detect Phishing Emails?
I Alseadoon, MFI Othman, T Chan
Advanced Computer and Communication Engineering Technology, 949-962, 2015
112015
Revealing the Influence of Feature Selection for Fast Attack Detection
MF Abdollah, AH Yaacob, S Sahib, I Mohamad, MFI Othman
IJCSNS International Journal of Computer Science and Network Security 8, 107-115, 2008
102008
Clustering methods for cluster-based routing protocols in wireless sensor networks: Comparative study
AA Hassan, WM Shah, MF Iskandar, AAJ Mohammed
International Journal of Applied Engineering Research 12 (21), 11350-11360, 2017
82017
Typology of Phishing Email Victims Based on their Behavioural Response
IM Alseadoon, MFI Othman, E Foo, T Chan
19th Americas Conference on Information Systems (AMCIS), 19, 2013
72013
IT Governance Adoption in Malaysia: A Preliminary Investigation
MFI Othman, T Chan, E Foo
22nd Australasian Conference on Information Systems (ACIS), 1-10, 2011
72011
Unequal clustering routing algorithms in wireless sensor networks: A comparative study
AAH Hassan, WM Shah, MF Iskandar, MN Al-Mhiqani, ZK Naseer
J. Adv. Res. Dyn. Control Syst 10 (2), 2142-2156, 2018
52018
Behavioral Analysis on IPv4 Malware in both IPv4 and IPv6 Network Environment
M Zulkiflee, MA Faizal, MFI Othman, AN Azman, S Shahrin
International Journal of Computer Science and Information Security (IJCSIS …, 2011
5*2011
K nearest neighbor joins and mapreduce process enforcement for the cluster of data sets in bigdata
W Md Shah, MFI Othman, H Hassan, A Abdul, MS Talib, AAJ Mohammed
Journal Of Adv Research In Dynamical & Control Systems 10, 690-696, 2018
32018
K Nearest Neighbor Joins and Mapreduce Process Enforcement for the Cluster of Data Sets in Bigdata
AA Hassan, W Md Shah, MFI Othman, MS Talib, AAJ Mohammed
Journal of Advanced Research in Dynamical and Control Systems (JARDCS), 690-696, 2018
32018
Barriers to the Adoption of Formal IT Governance Practice: A Malaysian Case
MFI Othman
Queensland University of Technology, 2016
32016
A Structured Literature Review on Applied Neuroscience in Information Systems (NeuroIS)
MH Hazawawi, N. A. M., Othman, M. F. I., Zakaria, M. H., Pee, N. C., & Emran
2nd International Symposium on Technology Management & Emerging Technologies …, 2015
32015
A Novel Approach on Teaching Network Security for ICT Courses
MNM Khambari, MFI Othman, M Radzi Motsidi, M Faizal Abdollah
2009 International Conference on Engineering Education (ICEED), 66-71, 2009
32009
Clustering Approach in Wireless Sensor Networks Based on K-means: limitations and Recommendations
MFIO Ali Abdul-hussian Hassan, WahidahMd Shah, Ali Mohamed Husien, Mohammed ...
International Journal of Recent Technology and Engineering (IJRTE) 7 (6S5 …, 2019
2*2019
Methods of Tumor Detection Using Microwave Technology: A Review
MD Daud, MA Othman, MFI Othman
Journal of Engineering & Applied Sciences 9 (9), 2014
22014
Methods of Tumor Detection Using Microwave Technology: A Review
MD Daud, MA Othman, MFI Othman
Journal of Engineering and Applied Sciences 9 (9), 1450-1454, 2014
22014
New approach in teaching network security subjects
M Motsidi, MFI Othman, Y Abd Rahim, MN Khambari
International Conference on Information (ICI9), Kuala Lumpur, 2009
22009
New Curriculum Approach in Teaching Network Security Subjects for ICT Courses in Malaysia
MFI Othman, N Bahaman, Z Muslim, F Abdollah
Proceedings of World Academy of Science, Engineering and Technology, 293-297, 2008
22008
The system can't perform the operation now. Try again later.
Articles 1–20