Papers by Mohammad Nabil Almunawar

Handbook of Research on Innovation and Development of E-Commerce and E-Business in ASEAN
IGI Global eBooks, Aug 28, 2020
The development of e-commerce business in Indonesia is very rapid. The rapid development of e-com... more The development of e-commerce business in Indonesia is very rapid. The rapid development of e-commerce in Indonesia will make Indonesia the largest digital economy in Southeast Asia in 2020. However, there are several obstacles, one of which is the provision of a trusted e-commerce database. Data has an important element in development in developing an e-commerce business in Indonesia. As the National Statistics Organizations, BPS Statistics Indonesia was pushed to collect the e-commerce data. BPS has developed several methods of collection e-commerce data using e-commerce survey and crawling technique in 2018 but still has a weakness. As a comparative study, there are several countries of G-20 that have high development in e-commerce and associate themselves as BRICS countries. With SWOT Analysis and Maturity Assessment, this study wants to analyze strength, weakness, opportunity, and thread, also measure the maturity from each method of collection used. Based on the result, Indonesia has better maturity in technology implemented, but worse regulation and people cooperation.

Advances in human resources management and organizational development book series, 2018
This paper is aimed to assess the current knowledge sharing processes in tertiary education in Br... more This paper is aimed to assess the current knowledge sharing processes in tertiary education in Brunei Darussalam. It identifies and examines the preferences, benefits and barriers of knowledge sharing and knowledge sharing platforms utilized in tertiary education. A descriptive research method is employed, in which quantitative approach was selected to collect data on the use of Web 2.0 tools, especially social media, for knowledge sharing in tertiary education in Brunei Darussalam. This study revealed that respondents highly utilize emails and Web 2.0 tools for knowledge sharing, which are normally provided by their host universities as information and knowledge sharing platforms. Web 2.0 tools, especially social media, are considered suitable platforms for sharing knowledge. However, there are some concerns in using Web 2.0 tools for knowledge sharing, mainly in term of privacy issues and reliability of information and knowledge shared due to its high risk of collaborators.

Advances in Computer and Electrical Engineering, 2019
We are witnessing the business prospects of cloud computing becoming apparent as many cloud compu... more We are witnessing the business prospects of cloud computing becoming apparent as many cloud computing services have been made available online. Previously, outsourcing of computing resources employs a third party to set up, develop, and maintain the infrastructure within or outside the business organization. However, nowadays many business organizations all over the world see that outsourcing their computing resources through cloud computing is a highly viable option as it saves a business organization from the complicated setup and maintenance costs of computer infrastructure. There are three generally known types cloud computing, namely public cloud, private cloud, and hybrid cloud. There also three generally service models namely software as a service (SaaS), platform as a service (PaaS), and infrastructure as a service (IaaS). This chapter highlights the development of cloud computing technology, benefits and issues of outsourcing an organization's computing resources throug...

Security and Privacy Issues in Cloud-Based E-Government
IGI Global eBooks, 2019
Cloud computing services have grown rapidly over the years. Government agencies are also interest... more Cloud computing services have grown rapidly over the years. Government agencies are also interested in cloud-based provision for their E-government processes. Despite the advantages of cloud-related technologies, there are many security issues as well that fall into several categories of breaches with serious impacts. All these breaches have serious legal and reputational implications. Therefore, governments need to ensure that inherent security threats can be neutralized to ensure that data or information stored in the cloud are well protected. It is imperative for cloud-based e-government (CB-eGov) to use an information security management system (ISMS) to effectively manage CB-eGov. The purpose of this chapter is to discuss how cloud computing can be incorporated in an e-government implementation to improve its efficiency without compromising information security. As such, the government needs to take special care in ensuring security, privacy, and confidentiality of information stored in the cloud.

Jurnal Bisnis dan Manajemen (Fakultas Ekonomi Universitas Lampung), May 29, 2023
We aim to add value to the ongoing inconsistencies by extracting models from past studies and bui... more We aim to add value to the ongoing inconsistencies by extracting models from past studies and building an overarching framework for understanding the purchase intentions of foreign and domestic products in the cross-border electronic commerce (CBEC) context. We review significant works in various disciplines and systematically extend abstractions from diverse models and theories toward iterative methods. We deconstruct and (re)construct them into the framework. We identify the importance of segmenting consumer engagement with global-local discourses and screen samples not engaging with the country of origin (COO) discussions. We pinpoint the significance of the underlying theories of social class, rational choice, social identity, COO, substitute versus complementary, schema, consumer culture, adaptive structuration, and the unified theory of acceptance and use of technology. We highlight the urgency of drawing from multidisciplinary approaches to acknowledge the complex relationship between constructs of product types, social class, ethnocentrism, informedness, benefits, perceived risks, and the purchase intention of domestic and foreign products. Researchers should refine models based on consumer segments and test the framework to examine its usability. Policymakers and international marketers can refine policies and strategies by incorporating the framework's critical success factors. We fill the wide research gap in international marketing and information systems literature by offering an integrative approach that broadens our understanding of foreign versus domestic product controversies.
Information Security Management Systems: A Novel Framework and Software as a Tool for Compliance with Information Security Standard

The Utilization of Web 2.0 for Knowledge Sharing
IGI Global eBooks, 2020
This chapter assesses the current knowledge creation and sharing processes in Brunei Darussalam&#... more This chapter assesses the current knowledge creation and sharing processes in Brunei Darussalam's tertiary education. The chapter explains the preferences, benefits, and barriers to knowledge creation and sharing processes in tertiary education. A descriptive research method is used, in which a quantitative approach was selected to collect data. This study revealed that most of the respondents highly utilize emails, learning management system, knowledge system that is provided by the host tertiary institutes and instant text messaging platforms. The benefits of using Web 2.0 are its flexibility and ease of use. Due to these benefits, knowledge sharing utilizing Web 2.0 technologies are used for communication, collaboration, and documentation purposes. However, there are some concerns in using Web 2.0 tools for knowledge sharing, mainly in term of privacy issues and reliability of information and knowledge shared due to its high risk of collaborators.

Advances in educational marketing, administration, and leadership book series, 2016
This shift involves the movement of applications, documents and other stored content from desktop... more This shift involves the movement of applications, documents and other stored content from desktop-based to web-based through the utility known as the 'cloud'. The cloud links thousands of computers and servers together where users are not limited to one device but are able to access their documents and other contents through any computer device, provided it has the ability to connect to the Internet. This allows for better storage capacity, lower costs, scalability and on-demand access. Higher education institutions are opting to reap the same benefits of cloud computing. Students, academics, administrators, and other users will be able to access computing resources through university applications, e-mail, databases and other cloud hosting services. This book chapter provides a general understanding of cloud computing systems and what benefits and challenges of cloud computing in higher education. It is followed by the trends of cloud computing usage and considerations needed for adopting cloud computing. The chapter will end with recommendations needed for adopting cloud computing.
Information Security Management Systems
Apple Academic Press eBooks, Jun 14, 2018
Integrated Solution Framework
Cloud Learning Management System in Higher Education
Advances in educational technologies and instructional design book series, 2019
The main objective of this chapter is to discuss the growth of cloud-based learning management sy... more The main objective of this chapter is to discuss the growth of cloud-based learning management system (LMS) in higher education. This will look at the benefits of LMS adoption and how it has grown in higher education institutions. The utilization of information and communication technology (ICT) has permeated in almost every aspect of life. This chapter will cover a brief introduction about cloud-based LMS, roles of LMS in education, drivers for adoption and advantages of cloud-based LMS, factors to consider in the adoption of cloud-based LMS, the need for LMS and end with conclusion and future directions of cloud-based LMS.

Assurance information systems design for blockchain - based micro, small and medium enterprises in Indonesia
IOP conference series, Jul 1, 2022
Halal Product Guarantee is legal certainty regarding the halalness of a product as evidenced by a... more Halal Product Guarantee is legal certainty regarding the halalness of a product as evidenced by a halal certificate. Regulations regarding halal certificates are carried out based on Law Number 33 of 2014 concerning Halal Product Assurance (“Law 33/2014”). This provision requires all products to have a halal certificate. This certificate is hoped to add the value of the product to be absorbed by the market more. However, the problem is that not all business actors or industries can implement halal guarantees. Micro, small, and medium enterprises (MSMEs) have weaknesses in the documentation and halal traceability. These two things become one of the criteria for the halal assurance system to get a halal certificate. We need a computerised information system that can help SMEs document and trace. Meanwhile, blockchain technology is needed for documentation transparency, which effectively keeps track of information and transactions. The system is proven to be safe and transparent. Because when the transaction takes place, all parties can see public access.

The adoption of biometric point-of-sale terminal for payments
Journal of science & technology policy management, Aug 19, 2021
Purpose The purpose of this paper is to investigate factors that influence customers’ adoption of... more Purpose The purpose of this paper is to investigate factors that influence customers’ adoption of biometric-based point-of-sale in Brunei. Design/methodology/approach This paper extends technology acceptance model constructs with trust and some other variables as the framework to investigate their influence on the attitude toward the usage of a biometric point-of-sale terminal for payments in Brunei. Nine variables may influence user’s perception toward usage. The nine variables are needed, perceived ease of use, perceived usefulness, experience, innovativeness, privacy, security, trust and attitude toward usage. Multiple regression analysis was conducted to test hypotheses related to these nine variables. Findings It is found that the innovativeness of an individual and similar experience corresponds toward trust, which is positively related to attitude toward usage. Perceived usefulness and trust have significantly influenced the intention of individuals to use biometrics as an authentication method for payment. Research limitations/implications The nature of this research is to gather the public’s opinion and perception as much as it is deemed possible to get a bigger and clearer picture of the study. As the target respondence is citizens and residents of Brunei without any specification or exclusion, a large response would be needed to have a more reliable and accurate result. However, only 205 respondents can be gathered in this study. Had there been a longer time frame, it would be best to gather a lot more responses. Originality/value This paper explores the adoption of biometric authentication in large-scale point-of-terminals. It identifies factors that influence adoption. The results of this study could assist future researchers in which direction to take to further explore biometric as an authentication method for payment. In addition to this, it could also provide banks and financial technology in Brunei a clearer picture of the Brunei market and Bruneians perspective on the biometric system.

Journal of business & economic analysis, Aug 21, 2020
Halal food is food in which its halalness status is regulated by a shariah institution, which is ... more Halal food is food in which its halalness status is regulated by a shariah institution, which is normally designated by the government. The halal status of food should be traced starting from raw materials, processing, packaging, transportation and distribution processes to end consumers. This is to make sure that halal food is free from any contamination that may change its halal status. The problem is the difficulty of tracing halal food along the supply chain as the supply chain information from the upstream to downstream in the food industry is not transparent. Currently, food tracking systems are a centralized system, where information about food status is only available to those who control the information. To improve the transparency of the food status and to increase trust from customers, a distributed and transparent system, where many parties can access the food status any time, is needed. Blockchain technology can be applied to help track the halalness status of food along its supply chain. As blockchain is inherently distributed and transparent, hence a distributed system can be developed by incorporating blockchain technology for tracking food status. This paper proposes a distributed system for tracing halal food along its supply chains using blockchain technology. This system is expected to support transparency, neutrality.
Digital Transformation Management
Routledge eBooks, Jan 5, 2022

IGI Global eBooks, 2020
The purpose of this paper is to assess the current knowledge sharing processes in tertiary educat... more The purpose of this paper is to assess the current knowledge sharing processes in tertiary education in Brunei Darussalam and identify the preferred knowledge sharing activities as well as preferred online applications for the purpose. This study also examined the benefits and barriers of using Web 2.0 as a knowledge sharing platform in tertiary education. A descriptive research method is employed, in which quantitative approach was selected to collect data on the use of Web 2.0 tools for knowledge sharing in tertiary education. This study revealed that respondents highly utilize emails and Web 2.0 applications for knowledge sharing, which are normally provided by their host universities as information and knowledge sharing platforms. Web 2.0 applications, especially social networks, are considered good platforms for sharing knowledge. However, there are some concerns in using Web 2.0 applications for knowledge sharing, mainly in term of privacy issues and reliability of information and knowledge shared due to its high risk of collaborators.
arXiv (Cornell University), 2012
Multimedia Information security becomes a important part for the organization's intangible assets... more Multimedia Information security becomes a important part for the organization's intangible assets. Level of confidence and stakeholder trusted are performance indicator as successes organization, it is imperative for organizations to use Information Security Management System (ISMS) to effectively manage their multimedia information assets. The main objective of this paper is to Provide a novel practical framework approach to the development of ISMS, Called by the I-SolFramework, implemented in multimedia information security architecture (MISA), it divides a problem into six object domains or six layers, namely organization, stakeholders, tool & technology, policy, knowledge, and culture. In addition, this framework also introduced novelty algorithm and mathematic models as measurement and assessment tools of MISA parameters.
arXiv (Cornell University), Jul 18, 2012
Content-based multimedia information retrieval is an interesting research area since it allows re... more Content-based multimedia information retrieval is an interesting research area since it allows retrieval based on inherent characteristic of multimedia objects. For example retrieval based on visual characteristics such as colour, shapes or textures of objects in images or retrieval based on spatial relationships among objects in the media (images or video clips). This paper reviews some work done in image and video retrieval and then proposes an integrated model that can handle images and video clips uniformly. Using this model retrieval on images or video clips can be done based on the same framework.

Corporate Social Responsibility and Sustainable Development: Trends in Asia
CSR, sustainability, ethics & governance, Sep 30, 2013
Sustainable development needs responsible corporations. Corporations should aim for sustainabilit... more Sustainable development needs responsible corporations. Corporations should aim for sustainability of their development; that is, moving forward in developing all aspects dynamically in both internal and external aspects of the corporations. In other words, sustainable development ensures that a company grow with its resources, especially its intellectual resources and human capital and at the same time contribute to the community development and environmental preservation. The concepts of corporate social responsibility (CSR) and Sustainable Development (SD) developed in the West should not be adopted without proper adoption and adaptation to Asian values. Something that works well in the West may not work in Asia. Therefore CSR and sustainability development need to be acculturated to Asian environment and values to gain a success. This chapter will explore and discuss the development of CSR and sustainability development in major Asian countries: China, India, Indonesia, Japan, South Korea, and Singapore. China, India and Indonesia represent developing countries with large population while the last three countries represent developed countries. China, Japan, South Korea and Singapore share Asian values influenced by Confucian ethics, Indians root their values in Hinduism while Indonesian values are highly influenced by Islam.
Uploads
Papers by Mohammad Nabil Almunawar