Journal of Information Systems Research and Practice https://mojem.um.edu.my/index.php/JISRP <p><strong>Journal Information</strong></p> <p>Journal of Information Systems Research and Practice (JISRP) refers to the academic field and practical application of studying how information technology (IT) can be effectively used to solve real-world problems within organizations. This interdisciplinary field combines elements of computer science, management, psychology, sociology, and other related disciplines to understand how technology can be designed, implemented, and managed to support organizational goals and objectives.</p> <p>The Journal of Information Systems Research and Practice (JISRP) is dedicated to address the challenges in the areas of Information Systems in theoretical aspect and Its Applications, thereby presenting a consolidated view to the interested researchers in the aforesaid fields. The journal looks for significant contributions to Information Systems in theoretical and practical aspects.</p> <p><strong style="font-size: 0.875rem;">Journal Summary</strong></p> <table class="data" border="1" width="100%"> <tbody> <tr valign="top"> <td width="20%">Journal Title</td> <td width="80%"><strong>Journal of Information Systems Research and Practice (JISRP) </strong></td> </tr> <tr valign="top"> <td width="20%">Subjects</td> <td width="80%">Information Systems</td> </tr> <tr valign="top"> <td width="20%">Language</td> <td width="80%"><strong>English</strong></td> </tr> <tr valign="top"> <td width="20%">ISSN</td> <td width="80%">1985-3920</td> </tr> <tr valign="top"> <td width="20%">Frequency</td> <td width="80%">4 issues per year<strong><br /></strong></td> </tr> <tr valign="top"> <td width="20%">DOI</td> <td width="80%">TBA</td> </tr> <tr valign="top"> <td width="20%">Editor in Chief</td> <td width="80%"><a href="https://ejournal.um.edu.my/index.php/JISRP/editorialteam">Editorial Members</a></td> </tr> <tr valign="top"> <td width="20%">Publisher</td> <td width="80%">Dept of Information Systems | FCSIT | Uni Malaya</td> </tr> <tr valign="top"> <td width="20%">Citation Analysis</td> <td width="80%">Google Scholar</td> </tr> </tbody> </table> <p>For Special Issue, please send your proposal to <strong><a href="mailto:jisrp@um.edu.my">jisrp@um.edu.my</a></strong>.</p> Dept of Information Systems | FCSIT | Uni Malaya en-US Journal of Information Systems Research and Practice 1985-3920 Preface https://mojem.um.edu.my/index.php/JISRP/article/view/52239 <div class="description"> <p>The Volume 6 Issue 2 of JISRP has been available online since <strong>14th</strong><strong> May 2024</strong> for the regular issue of June 2024. The issue has been available online for accepted papers (uncorrected proofs)<strong>.</strong></p> </div> Tutut Herawan Copyright (c) 2024 Journal of Information Systems Research and Practice https://creativecommons.org/licenses/by-sa/4.0/ 2024-05-14 2024-05-14 2 2 1 1 Big Data Analytics and Public Health Strategies in Coping Covid-19 Outbreak https://mojem.um.edu.my/index.php/JISRP/article/view/52529 <p>The use of big data analytics plays an important role in determining the public health strategies taken by a country in relation to the Covid-19 pandemic which is currently ongoing worldwide. The objective of this article is to present both conceptual analysis and analysis of the conditions of the Covid-19 pandemic that occurs worldwide to design a framework which shows the relationship between the use of big data analytics and public health strategies&nbsp;to cope with the Covid-19&nbsp;pandemic. In fact, the public health strategy taken by a country is inseparable from both the public policies strictly taken by its government and the local culture. This way, this paper also discusses the variables of government policies and culture as moderating variables.&nbsp;This article uses the conceptual analysis&nbsp;method&nbsp;and literature&nbsp;review to develop a conceptual model which is followed by proposing three related propositions. In addition, this paper also presents a number of research opportunities as well as the possible research objects, the&nbsp;possible additional variables, and&nbsp;data analysis. This article has implications to assist and provide direction for future research to further examine other interesting topics related to&nbsp;the use of big data analytics in coping with the Covid-19 outbreak.&nbsp;Besides, it also has implications for stakeholders in making decisions and policies to&nbsp;use&nbsp;important variable, i.e. big data analytics, by taking into account government regulations and local culture in dealing with the Covid-19&nbsp;outbreak.</p> Lucia Ika Fitriastuti Yohannes Vemberi Saifudin Zuhri Tutut Herawan Copyright (c) 2024 Journal of Information Systems Research and Practice https://creativecommons.org/licenses/by-sa/4.0/ 2024-05-14 2024-05-14 2 2 1 12 Utilizing The Naive Bayes Method for Heart Disorder Classification Based on Body Weight Factors https://mojem.um.edu.my/index.php/JISRP/article/view/52392 <p>The main cause of death which is ranked number one in Indonesia is heart disease which is usually triggered by cholesterol, diabetes and high blood pressure. Heart disorders are a significant public health concern, and understanding their correlation with body weight can aid in early diagnosis and intervention. This study presents an analysis of heart disorder classification by leveraging the Naïve Bayes method, focusing on body weight factors as key indicators. The Naïve Bayes method, a probabilistic classification technique, is applied to assess the relationship between body weight factors and the presence of heart disorders. The classification model achieved an accuracy rate of more than 95%, highlighting its potential as a valuable tool for healthcare professionals in identifying individuals at risk of heart disorders. This high level of accuracy provides a strong foundation for future research and clinical applications in the field of cardiovascular health.</p> Mardi Turnip Nathan Andrew Panjamotan Agung Ramadhan Steven Lie Valencia Sitompul Abdi Dharma Arjon Turnip Copyright (c) 2024 Journal of Information Systems Research and Practice https://creativecommons.org/licenses/by-sa/4.0/ 2024-05-14 2024-05-14 2 2 13 21 Laplacian Metropolis Hastings Gradient Torgerson Scaling and Optimized Vgg16 Based Mammogram Classification https://mojem.um.edu.my/index.php/JISRP/article/view/52401 <p>Breast cancer (BC) is proliferating to a greater extent day to day. Early discovery can help the patient in saving life. Mammography is commonly utilized in diagnosing BC. Mammography classification is the most critical stage as it assists medical professionals in identifying BC. In this paper, a hybrid method accomplishes accurate and precise classification in a timely manner is proposed and tested. In this work a method called, Laplacian Metropolis Hastings Gradient Torgerson Scaling and Optimized (LMHG-TSO) VGG16-based mammogram classification is proposed. The LMHG-TSO VGG16-based mammogram classification method is split into four sections, namely, preprocessing, segmentation, feature selection and finally classification. First, with the raw mammogram images obtained as input is subjected to Laplacian Neighborhood Gabor Filter-based preprocessing for acquiring computationally efficient preprocessed mammogram images. Second watershed segmentation model called Metropolis Hastings Gradient Region is applied to the preprocessed images to obtain precise segmentation results. Next, to minimize dimensionality and reduce loss Torgerson Scaling&nbsp;Sequential Feature Selection model is applied to the segmented preprocessed mammogram images. Finally, Affine Linear Optimized VGG16-based Mammogram Classification model is applied to make distinct classification between three types (i.e., normal, benign and malignant) in an accurate manner. Experimental evaluation is carried out on factors such as precision, recall, training time and classification accuracy for different mammogram images. The reported results prove the efficiency of the suggested method against prevailing state-of-the-art methods.</p> T. Leena Prema Kumari K. Perumal Copyright (c) 2024 Journal of Information Systems Research and Practice https://creativecommons.org/licenses/by-sa/4.0/ 2024-05-14 2024-05-14 2 2 22 30 Applications of Information System Success Model and Task-Technology-Fit Theories: A Review https://mojem.um.edu.my/index.php/JISRP/article/view/52402 <p>The Information System Success Model (ISSM) and Task-Technology Fit (TTF) theories offer a means of evaluating the efficiency of technology in a system by analyzing the correlation between the technology and the tasks it is intended to facilitate. The two theories are generally acknowledged and have been implemented in several ways, although there has been less effort to consolidate and integrate the utilization of ISSM and TTF in literature. The objectives of this study are (1) to find and analyze pertinent literature that utilizes the TTF and ISSM models in the context of higher education, (2) to identify which of these theories are the most commonly used models, and (3) to evaluate the studies that combine TTF and ISSM in the context of digital libraries. The findings revealed that the applied studies are primarily aimed to develop theories or evaluate specific real-world phenomena. These studies were conducted in various settings, with a majority of them being in public universities. Additionally, the combination of these two theories is seldom in the context of digital libraries. The outcomes of this study lead to a better knowledge of TTF and ISSM applications, and help in the process of formulating future research to further analyze TTF and ISSM investigations.</p> Hend Ali Musbah Jebril Mohammad Nazir Ahmad Copyright (c) 2024 Journal of Information Systems Research and Practice https://creativecommons.org/licenses/by-sa/4.0/ 2024-05-14 2024-05-14 2 2 31 42 New Technologies-based Defense for Web Application Vulnerabilities: A Survey https://mojem.um.edu.my/index.php/JISRP/article/view/52407 <p>Many of the most dangerous attacks on the web come as a result of the exploitation of vulnerabilities that exist on the web. Fundamentally, malicious actors’ purpose is to identify and engage vulnerabilities inherent in web applications that accept and execute code without necessarily determining its origin or safety. Despite the numerous solutions and coordinated efforts that researchers, governments, and organizations have put towards addressing web application threats, security issues contextual to the threat that these attacks pose remain the subject of survey in many security bulletins at national and global forums. This survey examines how state-of-the-art defense systems have evolved and how web application vulnerabilities (WAV) are identified and mitigated. Moreover, this study also delves into the evolution of defense systems against WAV, by tracing their development from rudimentary measures to sophisticated strategies that leverage the latest in Blockchain, Quantum Computing, and Artificial Intelligence technologies. The characteristics and challenges concerning the use of these three technologies were discussed and then appropriate solutions to these various challenges were proposed. Despite these advancements, we proved that no single solution offers a panacea for web application security. We show how the dynamic and ever-evolving nature of cyber threats necessitates a multi-layered and adaptive approach. The presented survey underscores the importance of continuous innovation and collaboration in the quest to protect web applications from vulnerabilities and ensure the security of our digital lives.</p> Muath AlShaikh Mostefa Kara Konstantinos Karampidis Giorgos Papadourakis Copyright (c) 2024 Journal of Information Systems Research and Practice https://creativecommons.org/licenses/by-sa/4.0/ 2024-05-27 2024-05-27 2 2 43 55