
|
|
Ts. Dr. Mohd. Fairuz Iskandar Othman |
|
Senior Lecturer
|
| |
|
|
|
| |
Email |
: |
[email protected] |
| |
Phone |
: |
+606 270 4523 |
| |
Website |
: |
https://www.fairuziskandar.com/ |
| |
Office |
: |
B1 B/2-01 |
| |
| |
| My Google Scholar |
| |
| Qualification |
| PhD. Information Technology (QUT), MSc. Internetworking (UTS), BSc. (Hons) Computer Science (UTM), MCP CCNA, CCAI, CompTIA Security+, MIEE |
| |
| Field of Specialization |
| IT Security, IS Security, IT Governance, IT Management |
| |
| Research Group |
| Information Security Forensics and Computer Networking (INSFORNET) |
| |
| Biography |
| Mohd Fairuz Iskandar Othman is a Senior Lecturer in the Faculty of Information and Communication Technology (FTMK) at Universiti Teknikal Malaysia Melaka (UTeM). He has a PhD in Information Technology (Queensland University of Technology), a Masters in Internetworking (University of Technology, Sydney) and a Degree in Computer Science (Universiti Teknologi Malaysia). His research interests include IT/IS Governance and Management, as well as IT/IS Security. He has extensive experience as a consultant in various computer network and computer security related projects: i.e.: with the Ministry of Health, UTeM Computer Centre, and the Malaysia Anti-Corruption Agency (now known as Malaysia Anti-Corruption Commission (MACC)). Fairuz is a certified Cisco Certified Academy Instructor (CCAI), Cisco Certified Network Associate (CCNA), Certified CompTIA Security+ and Microsoft Certified Professional (MCP). He is an instructor at Cisco Academy and CompTIA Academy in FTMK, UTeM. He is currently seconded as Head of Infrastructure Management and Infostructure Development Section at the Centre for Instructional Resources & Technology (PSTP). He also serves as Head of the Human-Centered Computing - Information Systems Lab (HCC-ISL) Research Group under C-ACT at FTMK. |
| |
| Publication |
Book Chapter: Alseadoon, I., Othman, M. F. I., & Chan, T. (2015). What Is the Influence of Users� Characteristics on Their Ability to Detect Phishing Emails? In H. A. Sulaiman, M. A. Othman, M. F. I. Othman, Y. A. Rahim & N. C. Pee (Eds.), Advanced Computer and Communication Engineering Technology (Vol. 315, pp. 949-962): Springer International Publishing.
Journals:Othman, M. A., Azman, H., Husain, M. N., Aziz, M. Z. A. A., Rahim, Y. A., Pee, A. N. C., . . . Othman, M. F. I. (2014). 10 GHz Microstrip Spanar Antennas: An Experimental Analysis. In Journal of Physics: Conference Series (Vol. 495, pp. 012028): IOP Publishing.
Daud, M. D., Othman, M. A., & Othman, M. F. I. (2014). Methods of Tumor Detection Using Microwave Technology: A Review. Journal of Engineering & Applied Sciences, 9(9).
Rahim, Y. A., Othman, M. A., Pee, A. N. C., & Othman, M. F. I. (2014). Anonymization Clinical Data: Privacy Case Study. ARPN Journal of Engineering and Applied Sciences, 9(7). Muslim, Z., Abdollah, M. F., Othman, M. F. I., Abu, N. A., & Sahib, S. (2011). Behavioral Analysis on IPv4 Malware in both IPv4 and IPv6 Network Environment. International Journal of Computer Science and Information Security (IJCSIS), 9(2).
Abdollah, M. F., Sahib, S., Yaacob, A. H., Othman, M. F. I., & Yusof, R. (2008). Feature Selection For Detecting Fast Attack in Network Intrusion Detection. Journal of Advanced Manufacturing Technology, 2(2), 39-56.
Abdollah, M. F., Yaacob, A. H., Sahib, S., Mohamad, I., & Othman, M. F. I. (2008). Revealing the Influence of Feature Selection for Fast Attack Detection. IJCSNS International Journal of Computer Science and Network Security, 8, 107-115.
Conference papers: Hazawawi, N. A. M., Othman, M. F. I., Zakaria, M. H., Pee, N. C., & Emran, M. H. (2015). A Structured Literature Review on Applied Neuroscience in Information Systems (NeuroIS). In 2nd International Symposium on Technology Management & Emerging Technologies (ISTMET 2015).
Alqahtani, F., & Othman, M. F. I. (2015). Enterprise Web 2.0 Strategy: An Initial Implementation Task. In 2015 International Conference on Business, Management, Tourism and Hospitality (BIZMATOUR).
Othman, M. F. I., & Chan, T. (2013). Barriers to Formal IT Governance Practice � Insights from a Qualitative Study. In 46th Annual Hawaii International Conference on System Sciences.
Alseadoon, I. M., Othman, M. F. I., Foo, E., & Chan, T. (2013). Typology of Phishing Email Victims Based on their Behavioural Response. In 19th Americas Conference on Information Systems (AMCIS) (pp. 19).
Othman, M. F. I., Chan, T., & Foo, E. (2011). IT Governance Adoption in Malaysia: A Preliminary Investigation. In 22nd Australasian Conference on Information Systems (ACIS) (pp. 69).
Othman, M. F. I., Chan, T., & Timbrell, G. (2010). Barriers to Information Technology Governance Adoption: A Preliminary Empirical Investigation. In 15th IBIMA Conference on Knowledge Management and Innovation: A Business Competitive Edge Perspective: IBIMA Publishing, USA.
|