Pub Date : 2021-06-26DOI: 10.11113/oiji2021.9n1.20
Nurul Atiekah Ab Rashid, Suraya Ya'acob
The scheduled surgery cases, allocation of clinical provider, machine, equipment, preparation time, surgery performance, and patient recovery give the big impact on OT utilization. Low OT utilization due to no show patient and scheduling bottleneck interrupt patient flow in clinical process. It also decreases the admission to the OT and wastage of resources. In order to improve the capacity of OT, the logical solution need to be carried out is utilization audit. The trend of scheduled surgery cases has identified, and element affect the OT capacity have used to predict the OT optimization for future planning. The purpose of this study is to investigate efficiency of operating theatre (OT) utilization in healthcare institution and the application predictive analytics on its daily operational data. OT contribute to the revenue for the hospital and workload. This project use machine learning in identify which model can use to predict the decision of admission to which facility after the surgery. The model has been going through a few mathematical reasoning to getting the usage efficiency on the dataset. The result shows that Support Vector Machine (SVM) got the highest accuracy in test data rather than Logistic Regression (LR) and Random Forest Classifier. SVM used to predict the admission decision, which contribute to the surgery scheduling in OT. This project can be extended to the admission decision with the factor or severity of patient condition to undergo any intervention in outpatient.
{"title":"Predictive Analytics on Scheduled Surgery Cases in Forecasting the Operating Theatre Utilisation","authors":"Nurul Atiekah Ab Rashid, Suraya Ya'acob","doi":"10.11113/oiji2021.9n1.20","DOIUrl":"https://doi.org/10.11113/oiji2021.9n1.20","url":null,"abstract":"The scheduled surgery cases, allocation of clinical provider, machine, equipment, preparation time, surgery performance, and patient recovery give the big impact on OT utilization. Low OT utilization due to no show patient and scheduling bottleneck interrupt patient flow in clinical process. It also decreases the admission to the OT and wastage of resources. In order to improve the capacity of OT, the logical solution need to be carried out is utilization audit. The trend of scheduled surgery cases has identified, and element affect the OT capacity have used to predict the OT optimization for future planning. The purpose of this study is to investigate efficiency of operating theatre (OT) utilization in healthcare institution and the application predictive analytics on its daily operational data. OT contribute to the revenue for the hospital and workload. This project use machine learning in identify which model can use to predict the decision of admission to which facility after the surgery. The model has been going through a few mathematical reasoning to getting the usage efficiency on the dataset. The result shows that Support Vector Machine (SVM) got the highest accuracy in test data rather than Logistic Regression (LR) and Random Forest Classifier. SVM used to predict the admission decision, which contribute to the surgery scheduling in OT. This project can be extended to the admission decision with the factor or severity of patient condition to undergo any intervention in outpatient.","PeriodicalId":379468,"journal":{"name":"Open International Journal of Informatics","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122081076","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-06-26DOI: 10.11113/oiji2021.9n1.28
Muhammad Farhan Shahrom, N. Maarop, Ganthan Narayana Samy, N. H. Hassan, Fiza Abdul Rahim, Pritheega Magalingam, N. Kamaruddin
Social engineering is a technique of deceiving people into giving away confidential information that could be useful to gain unauthorized access to an information system. Even to the most secured system, social engineering is a formidable threat. It is one of the most devastating threats to organizations and businesses. Unlike traditional hacking, social engineering is less or non-technological. It manipulates characteristics of human nature, exploiting people’s desire to be kind and helpful. The psychology leverage makes social engineering hard to defend against. This paper presents the identification of factors related to social engineering in the context of armed forces through a review of related literature. Prior works from previous studies are discussed, and factors have been identified based on certain criterion. This study executed a pilot analysis on 30 samples of respondents among Malaysian armed forces personnel. As a result, nine factors are identified that may affect defense against social engineering in the armed forces: Authority, Reciprocation, Commitment and Consistency, Diffusion of Responsibility, Scarcity, Friendliness and Liking, Awareness, Social Proof, and Trust.
{"title":"A Pilot Analysis of Factors Affecting Defense Against Social Engineering Attacks in the Armed Forces Environment","authors":"Muhammad Farhan Shahrom, N. Maarop, Ganthan Narayana Samy, N. H. Hassan, Fiza Abdul Rahim, Pritheega Magalingam, N. Kamaruddin","doi":"10.11113/oiji2021.9n1.28","DOIUrl":"https://doi.org/10.11113/oiji2021.9n1.28","url":null,"abstract":"Social engineering is a technique of deceiving people into giving away confidential information that could be useful to gain unauthorized access to an information system. Even to the most secured system, social engineering is a formidable threat. It is one of the most devastating threats to organizations and businesses. Unlike traditional hacking, social engineering is less or non-technological. It manipulates characteristics of human nature, exploiting people’s desire to be kind and helpful. The psychology leverage makes social engineering hard to defend against. This paper presents the identification of factors related to social engineering in the context of armed forces through a review of related literature. Prior works from previous studies are discussed, and factors have been identified based on certain criterion. This study executed a pilot analysis on 30 samples of respondents among Malaysian armed forces personnel. As a result, nine factors are identified that may affect defense against social engineering in the armed forces: Authority, Reciprocation, Commitment and Consistency, Diffusion of Responsibility, Scarcity, Friendliness and Liking, Awareness, Social Proof, and Trust.","PeriodicalId":379468,"journal":{"name":"Open International Journal of Informatics","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117332764","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Abduurrahim H El Hejjaji, Suriani Mohd Sam, Norliza Mohamed, K. Kamardin, N. Ahmad, Y. Md Yusof
The Internet of Things (IoT) is a rising innovation, including a wide range of uses identified with modern control, savvy metering, home mechanization, horticulture, health, etc. For these applications to run independent the IoT gadgets are required to make do for a considerable length of time and years under severe vitality imperatives. When growing such applications, it is significant for the application to think about its own energy consumption. In this work, we propose and assess an energy consumption estimation approach for occasional detecting applications running on the IoT gadgets. Our methodology depends on three stages. In the main stage, we distinguish the unmistakable exercises, for example, rest, transmit, detect and process in a detecting cycle. In the subsequent stage, we measure the power consumption of these exercises before the IoT gadget has been conveyed in the arrange. The third stage happens at run-time once the IoT gadget has been sent, to convey the energy consumption of a detecting cycle. The energy consumption is determined by utilizing the exercises control and their spans acquired at run-time. The proposed methodology is basic and conventional on the grounds that it doesn’t include any intricate equipment for runtime control estimation. Besides, this methodology likewise consolidates the dynamic idea of detecting applications by run-time estimation of energy consumption.
{"title":"Energy consumption in wireless IoT- A Review","authors":"Abduurrahim H El Hejjaji, Suriani Mohd Sam, Norliza Mohamed, K. Kamardin, N. Ahmad, Y. Md Yusof","doi":"10.11113/oiji2021.9n1.2","DOIUrl":"https://doi.org/10.11113/oiji2021.9n1.2","url":null,"abstract":"The Internet of Things (IoT) is a rising innovation, including a wide range of uses identified with modern control, savvy metering, home mechanization, horticulture, health, etc. For these applications to run independent the IoT gadgets are required to make do for a considerable length of time and years under severe vitality imperatives. When growing such applications, it is significant for the application to think about its own energy consumption. In this work, we propose and assess an energy consumption estimation approach for occasional detecting applications running on the IoT gadgets. Our methodology depends on three stages. In the main stage, we distinguish the unmistakable exercises, for example, rest, transmit, detect and process in a detecting cycle. In the subsequent stage, we measure the power consumption of these exercises before the IoT gadget has been conveyed in the arrange. The third stage happens at run-time once the IoT gadget has been sent, to convey the energy consumption of a detecting cycle. The energy consumption is determined by utilizing the exercises control and their spans acquired at run-time. The proposed methodology is basic and conventional on the grounds that it doesn’t include any intricate equipment for runtime control estimation. Besides, this methodology likewise consolidates the dynamic idea of detecting applications by run-time estimation of energy consumption.","PeriodicalId":379468,"journal":{"name":"Open International Journal of Informatics","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127605342","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-06-26DOI: 10.11113/oiji2021.9n1.19
H. Tan, H. Abas, N. Shafie
Technology development never sleeps, humans creating more high-tech devices for society to use. Swift movement of technology growth has changed the conceptual design of the physical security control, location landscape, human behaviors factor, and perimeter controls are the factors to determine the security posture of the location. Hence, the rise of the new financial digital banking ecosystem has raised significant new concerns to bank consumers. In order to study the control measurement of current banking industry effectiveness by using the systematic literature review (SLR) to conduct the research that published in the digital library through world wide web. In short, maintaining the principle, policy guideline, and standard framework shall continue review periodically to identify the control measurement effectiveness.
{"title":"Systematic Literature Review of Crime Prevention Through Environmental Design Principles Against Banks ATM Physical Security Effectiveness","authors":"H. Tan, H. Abas, N. Shafie","doi":"10.11113/oiji2021.9n1.19","DOIUrl":"https://doi.org/10.11113/oiji2021.9n1.19","url":null,"abstract":" \u0000Technology development never sleeps, humans creating more high-tech devices for society to use. Swift movement of technology growth has changed the conceptual design of the physical security control, location landscape, human behaviors factor, and perimeter controls are the factors to determine the security posture of the location. Hence, the rise of the new financial digital banking ecosystem has raised significant new concerns to bank consumers. In order to study the control measurement of current banking industry effectiveness by using the systematic literature review (SLR) to conduct the research that published in the digital library through world wide web. In short, maintaining the principle, policy guideline, and standard framework shall continue review periodically to identify the control measurement effectiveness. \u0000 ","PeriodicalId":379468,"journal":{"name":"Open International Journal of Informatics","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127167817","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Roslinda Mohamed, H. Abas, N. H. Hassan, Saiful Adli Ismail
Physical security and access control as one of the installations should be upgraded to confirm the security and readiness of the asset belong to the group to continue safely. As the quick development in technology offers a boundless defence level for physical security and access control in the office, every organization must offer a passable budget pertinent to the transformation of the world today. Through a very humane approach of natural surveillance, access control, maintenance, and reinforcements of territory, this strategy will contribute to the field of physical security as a whole. The purpose of this paper is to recognize the features that regulate taking for perimeter protection and access control in maximum were identified and analysed. The findings have revealed that five categories of features can be used to study the taking for perimeter protection and access control in maximum security protection: physical security; access control; security standard and policy; security awareness program and security training and security protection. A Systematic Literature Review (SLR) was accepted since it uses a more rigorous and well-defined method to swotting the study indication pertinent to the study. Initially, 62 papers were retrieved by a manual search in six databases and 17 primary studies were finally included. Consequently, 5 factors education.
物理安全和访问控制作为其中一个安装应该进行升级,以确认属于该集团的资产的安全性和准备情况,以便继续安全运行。随着技术的快速发展,为办公室的物理安全和访问控制提供了无限的防御水平,每个组织都必须提供与当今世界转型相关的可通过的预算。通过一种非常人性化的自然监视、访问控制、维护和加强领土的方法,这一战略将为整个物理安全领域做出贡献。本文的目的是识别和分析最大限度的周界保护和访问控制的调节采取的特点。研究结果表明,在最大安全保护中,可以使用五类特征来研究周界保护和访问控制:物理安全;访问控制;安全标准和政策;安全意识规划、安全培训和安全防护。系统文献综述(Systematic Literature Review,简称SLR)采用了一种更为严格和定义明确的方法来确定与研究相关的研究指征,因此被接受。最初,在6个数据库中通过人工检索检索了62篇论文,最终纳入了17项主要研究。因此,教育有5个因素。
{"title":"Systematic Literature Review: Factor For Physical Security And Access Control in Maximun Security Protection","authors":"Roslinda Mohamed, H. Abas, N. H. Hassan, Saiful Adli Ismail","doi":"10.11113/oiji2021.9n1.5","DOIUrl":"https://doi.org/10.11113/oiji2021.9n1.5","url":null,"abstract":"Physical security and access control as one of the installations should be upgraded to confirm the security and readiness of the asset belong to the group to continue safely. As the quick development in technology offers a boundless defence level for physical security and access control in the office, every organization must offer a passable budget pertinent to the transformation of the world today. Through a very humane approach of natural surveillance, access control, maintenance, and reinforcements of territory, this strategy will contribute to the field of physical security as a whole. The purpose of this paper is to recognize the features that regulate taking for perimeter protection and access control in maximum were identified and analysed. The findings have revealed that five categories of features can be used to study the taking for perimeter protection and access control in maximum security protection: physical security; access control; security standard and policy; security awareness program and security training and security protection. A Systematic Literature Review (SLR) was accepted since it uses a more rigorous and well-defined method to swotting the study indication pertinent to the study. Initially, 62 papers were retrieved by a manual search in six databases and 17 primary studies were finally included. Consequently, 5 factors education.\u0000 ","PeriodicalId":379468,"journal":{"name":"Open International Journal of Informatics","volume":"13 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133700488","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-06-26DOI: 10.11113/oiji2021.9n1.25
N. A. Abu Bakar, Mardiana Abu Hassan, N. H. Hassan
The Internet of Things is the next step of the digital revolution that will change consumers' lives. The Internet of Things promises to be a worthy representative of an open course in technology, economics, and culture. IoT, without a doubt, has a promising future. The modern consumer actions and uses represent inescapable digital transformations for banking institutions. Emerging digital world developments guide all banking services' digital transformation. However, the security threats of using IoT in banking are increasing. Cybercriminals such as hacking, corruption, and financial violence, data breaches, and financial expenditure risks will continue to trouble the use of IoT in banking. Therefore, this research aims to study the banking industry's existing IoT uses, issues, and challenges in adopting the IoT in the banking industry. IoT threats are highlighted in this paper. This article sets out a model dimension of the process monitoring framework for IoT security risk management. Other than that, this paper also studies the existing security risk management model of IoT in banking. Moreover, preventive IoT protection initiatives and approaches to enhance IoT protection by implementing blockchain technology and Control Model Information Structure are addressed in this article
{"title":"IoT in Banking: The trends, threats, and solution","authors":"N. A. Abu Bakar, Mardiana Abu Hassan, N. H. Hassan","doi":"10.11113/oiji2021.9n1.25","DOIUrl":"https://doi.org/10.11113/oiji2021.9n1.25","url":null,"abstract":"The Internet of Things is the next step of the digital revolution that will change consumers' lives. The Internet of Things promises to be a worthy representative of an open course in technology, economics, and culture. IoT, without a doubt, has a promising future. The modern consumer actions and uses represent inescapable digital transformations for banking institutions. Emerging digital world developments guide all banking services' digital transformation. However, the security threats of using IoT in banking are increasing. Cybercriminals such as hacking, corruption, and financial violence, data breaches, and financial expenditure risks will continue to trouble the use of IoT in banking. Therefore, this research aims to study the banking industry's existing IoT uses, issues, and challenges in adopting the IoT in the banking industry. IoT threats are highlighted in this paper. This article sets out a model dimension of the process monitoring framework for IoT security risk management. Other than that, this paper also studies the existing security risk management model of IoT in banking. Moreover, preventive IoT protection initiatives and approaches to enhance IoT protection by implementing blockchain technology and Control Model Information Structure are addressed in this article","PeriodicalId":379468,"journal":{"name":"Open International Journal of Informatics","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129705127","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}