default search action
Azah Anir Norman
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2024
- [j20]Rathika Palanisamy, Azah Anir Norman, Miss Laiha Mat Kiah:
Employees' BYOD Security Policy Compliance in the Public Sector. J. Comput. Inf. Syst. 64(1): 62-77 (2024) - 2023
- [j19]Vizaad Ali, Azah Anir Norman, Saaidal Razalli Bin Azzuhri:
Characteristics of Blockchain and Its Relationship With Trust. IEEE Access 11: 15364-15374 (2023) - [j18]Azah Anir Norman, Athirah Husna Marzuki, B. Fatokun Faith, Suraya Hamid, Norjihan Binti Abdul Ghani, Sri Devi Ravana, Noreen Izza Arshad:
Technology Dependency and Impact During COVID-19: A Systematic Literature Review and Open Challenges. IEEE Access 11: 40741-40760 (2023) - [j17]Vizaad Ali, Azah Anir Norman, Saaidal Razalli Bin Azzuhri:
An Empirical Examination of Formation of Trust in Blockchain. IEEE Access 11: 109319-109330 (2023) - [j16]Christopher Ifeanyi Eke, Azah Anir Norman, Mwenge Mulenga:
Machine learning approach for detecting and combating bring your own device (BYOD) security threats and attacks: a systematic mapping review. Artif. Intell. Rev. 56(8): 8815-8858 (2023) - 2022
- [j15]Rathika Palanisamy, Azah Anir Norman, Miss Laiha Mat Kiah:
BYOD Policy Compliance: Risks and Strategies in Organizations. J. Comput. Inf. Syst. 62(1): 61-72 (2022) - [j14]Azma Alina Ali Zani, Azah Anir Norman, Norjihan Binti Abdul Ghani:
Motivating Factors to Self-Disclosure on Social Media: A Systematic Mapping. IEEE Trans. Prof. Commun. 65(3): 370-391 (2022) - 2021
- [j13]Christopher Ifeanyi Eke, Azah Anir Norman, Liyana Shuib:
Context-Based Feature Technique for Sarcasm Identification in Benchmark Datasets Using Deep Learning and BERT Model. IEEE Access 9: 48501-48518 (2021) - [j12]Suraya Ika Tamrin, Azah Anir Norman, Suraya Hamid:
Intention to share: the relationship between cybersecurity behaviour and sharing specific content in Facebook. Inf. Res. 26(1) (2021) - [j11]Rathika Palanisamy, Azah Anir Norman, Miss Laiha Mat Kiah:
BYOD Security Risks and Mitigation Strategies: Insights from IT Security Experts. J. Organ. Comput. Electron. Commer. 31(4): 320-342 (2021) - 2020
- [j10]Aimi Nadrah Maseri, Azah Anir Norman, Christopher Ifeanyi Eke, Atif Ahmad, Nurul Nuha Abdul Molok:
Socio-Technical Mitigation Effort to Combat Cyber Propaganda: A Systematic Literature Mapping. IEEE Access 8: 92929-92944 (2020) - [j9]Noreen Izza Arshad, Ahmad Sobri Hashim, Mazeyanti Bt. Mohd Ariffin, Nurshazlyn Mohd Aszemi, Hui Min Low, Azah Anir Norman:
Robots as Assistive Technology Tools to Enhance Cognitive Abilities and Foster Valuable Learning Experiences among Young Children With Autism Spectrum Disorder. IEEE Access 8: 116279-116291 (2020) - [j8]Christopher Ifeanyi Eke, Azah Anir Norman, Liyana Shuib, Henry Friday Nweke:
Sarcasm identification in textual data: systematic review, research challenges and open directions. Artif. Intell. Rev. 53(6): 4215-4258 (2020) - [j7]Rathika Palanisamy, Azah Anir Norman, Miss Laiha Mat Kiah:
Compliance with bring your own device security policies in organizations: A systematic literature review. Comput. Secur. 98: 101998 (2020) - [j6]Hussain Mutlaq Alnajrani, Azah Anir Norman:
The Effects of Applying Privacy by Design to Preserve Privacy and Personal Data Protection in Mobile Cloud Computing: An Exploratory Study. Symmetry 12(12): 2039 (2020) - 2019
- [j5]Christopher Ifeanyi Eke, Azah Anir Norman, Liyana Shuib, Henry Friday Nweke:
A Survey of User Profiling: State-of-the-Art, Challenges, and Solutions. IEEE Access 7: 144907-144924 (2019) - 2017
- [j4]Suraya Ika Tamrin, Azah Anir Norman, Suraya Hamid:
Information systems security practices in social software applications: A systematic literature review. Aslib J. Inf. Manag. 69(2): 131-157 (2017) - 2016
- [j3]Suraya Hamid, Sarah Bukhari, Sri Devi Ravana, Azah Anir Norman, Mohamad Taha Ijab:
Role of social media in information-seeking behaviour of international students: A systematic literature review. Aslib J. Inf. Manag. 68(5): 643-666 (2016) - [j2]Raja Jamilah Raja Yusof, Azah Anir Norman, Siti Soraya Abdul Rahman, Nurul'adilah Nazri, Zulkifli Mohd-Yusoff:
Cyber-volunteering: Social media affordances in fulfilling NGO social missions. Comput. Hum. Behav. 57: 388-397 (2016) - 2011
- [j1]Mohd Nasir, Azah Anir Norman, Shukor Sanim Bin Mohd Fauzi, Masliyana Azmi:
An RFID-based validation system for halal food. Int. Arab J. Inf. Technol. 8(2): 204-211 (2011)
Conference and Workshop Papers
- 2023
- [c10]Shahin Hasan, Raja Jamilah Raja Yusof, Hazrina Sofian, Rodina Binti Ahmad, Nazean Jomhari, Asmiza Abdul Sani, Siti Hafizah Ab Hamid, Azah Anir Norman, Unaizah Hanum Obaidellah, Saaidal Razalli Azzuhri, Mohd Yamani Idna Bin Idris:
Preliminary Study for Identifying Personnel for Innovative Software Engineering Project. EDUCON 2023: 1-5 - 2022
- [c9]Vizaad Ali, Azah Anir Norman, Saaidal Razalli Bin Azzuhri:
Characteristics of Blockchain and its Relationship with Trust. GCAIoT 2022: 76-81 - [c8]Odai Ali Ali Sharfadeen AL-Azazi, Azah Anir Norman, Norjihan Binti Abdul Ghani:
Bring Your Own Device Information Security Policy Compliance Framework: A Systematic Literature Review and Bibliometric Analysis (2017-2022). ICCR 2022: 1-8 - [c7]Siti Baizura Mohd Yusof, Siti Norul Huda Sheikh Abdullah, Masnizah Mohd, Noridayu Adnan, Raja Jamilah Raja Yusof, Umi Asma' Mokhtar, Azah Anir Norman, Wan Fariza Paizi Fauzi:
The effectiveness of Women 4IR Cyber 3A #Aware, Avoid, Act Program in Malaysia. ICCR 2022: 1-5 - [c6]Noor Ashitah Abu Othman, Azah Anir Norman, Miss Laiha Mat Kiah:
Systematic Literature Review of Security Control Assessment Challenges. ICCSCE 2022: 31-36 - [c5]B. Fatokun Faith, Zalizah Awang Long, Suraya Hamid, O. Fatokun Johnson, Christopher Ifeanyi Eke, Azah Anir Norman:
An Intelligent Gamification Tool to Boost Young Kids Cybersecurity Knowledge on FB Messenger. IMCOM 2022: 1-8 - 2021
- [c4]Noor Ashitah Abu Othman, Azah Anir Norman, Miss Laiha Mat Kiah:
Information System Audit for Mobile Device Security Assessment. CRC 2021: 1-6 - 2019
- [c3]Rathika Palanisamy, Azah Anir Norman, Miss Laiha Mat Kiah:
BYOD Security Policy Compliance Framework. PACIS 2019: 162 - 2018
- [c2]Azma Alina Ali Zani, Azah Anir Norman, Norjihan Binti Abdul Ghani:
A Review of Security Awareness Approach: Ensuring Communal Learning. PACIS 2018: 278 - 2009
- [c1]Azah Anir Norman, Norizan Mohd Yasin:
An analysis of Information Systems Security Management (ISSM): The hierarchical organizations vs. emergent organization. ICITST 2009: 1-8
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-05 21:17 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint