This page has only limited features, please log in for full access.
Lysine glutarylation is a post-translation modification which plays an important regulatory role in a variety of physiological and enzymatic processes including mitochondrial functions and metabolic processes both in eukaryotic and prokaryotic cells. This post-translational modification influences chromatin structure and thereby results in global regulation of transcription, defects in cell-cycle progression, DNA damage repair, and telomere silencing. To better understand the mechanism of lysine glutarylation, its identification in a protein is necessary, however, experimental methods are time-consuming and labor-intensive. Herein, we propose a new computational prediction approach to supplement experimental methods for identification of lysine glutarylation site prediction by deep neural networks and Chou’s Pseudo Amino Acid Composition (PseAAC). We employed well-known deep neural networks for feature representation learning and classification of peptide sequences. Our approach opts raw pseudo amino acid compositions and obsoletes the need to separately perform costly and cumbersome feature extraction and selection. Among the developed deep learning-based predictors, the standard neural network-based predictor demonstrated highest scores in terms of accuracy and all other performance evaluation measures and outperforms majority of previously reported predictors without requiring expensive feature extraction process. iGluK-Deep:Computational Identification of lysine glutarylationsites using deep neural networks with general Pseudo Amino Acid Compositions Sheraz Naseer, Rao Faizan Ali, Yaser Daanial Khan, P.D.D Dominic Communicated by Ramaswamy H. Sarma
Sheraz Naseer; Rao Faizan Ali; Yaser Daanial Khan; P. D. D. Dominic. iGluK-Deep: computational identification of lysine glutarylation sites using deep neural networks with general pseudo amino acid compositions. Journal of Biomolecular Structure and Dynamics 2021, 1 -14.
AMA StyleSheraz Naseer, Rao Faizan Ali, Yaser Daanial Khan, P. D. D. Dominic. iGluK-Deep: computational identification of lysine glutarylation sites using deep neural networks with general pseudo amino acid compositions. Journal of Biomolecular Structure and Dynamics. 2021; ():1-14.
Chicago/Turabian StyleSheraz Naseer; Rao Faizan Ali; Yaser Daanial Khan; P. D. D. Dominic. 2021. "iGluK-Deep: computational identification of lysine glutarylation sites using deep neural networks with general pseudo amino acid compositions." Journal of Biomolecular Structure and Dynamics , no. : 1-14.
Big data is rapidly being seen as a new frontier for improving organizational performance. However, it is still in its early phases of implementation in developing countries’ healthcare organizations. As data-driven insights become critical competitive advantages, it is critical to ascertain which elements influence an organization’s decision to adopt big data. The aim of this study is to propose and empirically test a theoretical framework based on technology–organization–environment (TOE) factors to identify the level of readiness of big data adoption in developing countries’ healthcare organizations. The framework empirically tested 302 Malaysian healthcare employees. The structural equation modeling was used to analyze the collected data. The results of the study demonstrated that technology, organization, and environment factors can significantly contribute towards big data adoption in healthcare organizations. However, the complexity of technology factors has shown less support for the notion. For technology practitioners, this study showed how to enhance big data adoption in healthcare organizations through TOE factors.
Ebrahim Ghaleb; P. Dominic; Suliman Fati; Amgad Muneer; Rao Ali. The Assessment of Big Data Adoption Readiness with a Technology–Organization–Environment Framework: A Perspective towards Healthcare Employees. Sustainability 2021, 13, 8379 .
AMA StyleEbrahim Ghaleb, P. Dominic, Suliman Fati, Amgad Muneer, Rao Ali. The Assessment of Big Data Adoption Readiness with a Technology–Organization–Environment Framework: A Perspective towards Healthcare Employees. Sustainability. 2021; 13 (15):8379.
Chicago/Turabian StyleEbrahim Ghaleb; P. Dominic; Suliman Fati; Amgad Muneer; Rao Ali. 2021. "The Assessment of Big Data Adoption Readiness with a Technology–Organization–Environment Framework: A Perspective towards Healthcare Employees." Sustainability 13, no. 15: 8379.
A grave concern to an organization’s information security is employees’ behavior when they do not value information security policy compliance (ISPC). Most ISPC studies evaluate compliance and noncompliance behaviors separately. However, the literature lacks a comprehensive understanding of the factors that transform the employees’ behavior from noncompliance to compliance. Therefore, we conducted a systematic literature review (SLR), highlighting the studies done concerning information security behavior (ISB) towards ISPC in multiple settings: research frameworks, research designs, and research methodologies over the last decade. We found that ISPC research focused more on compliance behaviors than noncompliance behaviors. Value conflicts, security-related stress, and neutralization, among many other factors, provided significant evidence towards noncompliance. At the same time, internal/external and protection motivations proved positively significant towards compliance behaviors. Employees perceive internal and external motivations from their social circle, management behaviors, and organizational culture to adopt security-aware behaviors. Deterrence techniques, management behaviors, culture, and information security awareness play a vital role in transforming employees’ noncompliance into compliance behaviors. This SLR’s motivation is to synthesize the literature on ISPC and ISB, identifying the behavioral transformation process from noncompliance to compliance. This SLR contributes to information system security literature by providing a behavior transformation process model based on the existing ISPC literature.
Rao Ali; P. Dominic; Syed Ali; Mobashar Rehman; Abid Sohail. Information Security Behavior and Information Security Policy Compliance: A Systematic Literature Review for Identifying the Transformation Process from Noncompliance to Compliance. Applied Sciences 2021, 11, 3383 .
AMA StyleRao Ali, P. Dominic, Syed Ali, Mobashar Rehman, Abid Sohail. Information Security Behavior and Information Security Policy Compliance: A Systematic Literature Review for Identifying the Transformation Process from Noncompliance to Compliance. Applied Sciences. 2021; 11 (8):3383.
Chicago/Turabian StyleRao Ali; P. Dominic; Syed Ali; Mobashar Rehman; Abid Sohail. 2021. "Information Security Behavior and Information Security Policy Compliance: A Systematic Literature Review for Identifying the Transformation Process from Noncompliance to Compliance." Applied Sciences 11, no. 8: 3383.
The advancement of information communication technology in healthcare institutions has increased information security breaches. Scholars and industry practitioners have reported that most security breaches are due to negligence towards organizational information security policy compliance (ISPC) by healthcare employees such as nurses. There is, however, a lack of understanding of the factors that ensure ISPC among nurses, especially in developing countries such as Malaysia. This paper develops and examines a research framework that draws upon the factors of organizational climate of information security (OCIS) and social bond theory to enhance ISPC among nurses. A questionnaire was adopted in which responses were obtained from 241 nurses employed in 30 hospitals in Malaysia. The findings from the study demonstrated that the ISPC among nurses is enhanced through OCIS factors. The influence on ISPC was even more significant when examined by the mediating effect of the social bond. It implies that influential OCIS factors reinforce social bonds among nurses and eventually increase the ISPC. For information security practitioners, the study findings emphasize the prevalence of socio-active information security culture in healthcare organizations to enhance ISP compliance among nurses.
Ke Dong; Rao Ali; P. Dominic; Syed Ali. The Effect of Organizational Information Security Climate on Information Security Policy Compliance: The Mediating Effect of Social Bonding towards Healthcare Nurses. Sustainability 2021, 13, 2800 .
AMA StyleKe Dong, Rao Ali, P. Dominic, Syed Ali. The Effect of Organizational Information Security Climate on Information Security Policy Compliance: The Mediating Effect of Social Bonding towards Healthcare Nurses. Sustainability. 2021; 13 (5):2800.
Chicago/Turabian StyleKe Dong; Rao Ali; P. Dominic; Syed Ali. 2021. "The Effect of Organizational Information Security Climate on Information Security Policy Compliance: The Mediating Effect of Social Bonding towards Healthcare Nurses." Sustainability 13, no. 5: 2800.
Oil and Gas organizations are dependent on their IT infrastructure, which is a small part of their industrial automation infrastructure, to function effectively. The oil and gas (O&G) organizations industrial automation infrastructure landscape is complex. To perform focused and effective studies, Industrial systems infrastructure is divided into functional levels by The Instrumentation, Systems and Automation Society (ISA) Standard ANSI/ISA-95:2005. This research focuses on the ISA-95:2005 level-4 IT infrastructure to address network anomaly detection problem for ensuring the security and reliability of Oil and Gas resource planning, process planning and operations management. Anomaly detectors try to recognize patterns of anomalous behaviors from network traffic and their performance is heavily dependent on extraction time and quality of network traffic features or representations used to train the detector. Creating efficient representations from large volumes of network traffic to develop anomaly detection models is a time and resource intensive task. In this study we propose, implement and evaluate use of Deep learning to learn effective Network data representations from raw network traffic to develop data driven anomaly detection systems. Proposed methodology provides an automated and cost effective replacement of feature extraction which is otherwise a time and resource intensive task for developing data driven anomaly detectors. The ISCX-2012 dataset is used to represent ISA-95 level-4 network traffic because the O&G network traffic at this level is not much different than normal internet traffic. We trained four representation learning models using popular deep neural network architectures to extract deep representations from ISCX 2012 traffic flows. A total of sixty anomaly detectors were trained by authors using twelve conventional Machine Learning algorithms to compare the performance of aforementioned deep representations with that of a human-engineered handcrafted network data representation. The comparisons were performed using well known model evaluation parameters. Results showed that deep representations are a promising feature in engineering replacement to develop anomaly detection models for IT infrastructure security. In our future research, we intend to investigate the effectiveness of deep representations, extracted using ISA-95:2005 Level 2-3 traffic comprising of SCADA systems, for anomaly detection in critical O&G systems.
Sheraz Naseer; Rao Faizan Ali; P.D.D Dominic; Yasir Saleem. Learning Representations of Network Traffic Using Deep Neural Networks for Network Anomaly Detection: A Perspective towards Oil and Gas IT Infrastructures. Symmetry 2020, 12, 1882 .
AMA StyleSheraz Naseer, Rao Faizan Ali, P.D.D Dominic, Yasir Saleem. Learning Representations of Network Traffic Using Deep Neural Networks for Network Anomaly Detection: A Perspective towards Oil and Gas IT Infrastructures. Symmetry. 2020; 12 (11):1882.
Chicago/Turabian StyleSheraz Naseer; Rao Faizan Ali; P.D.D Dominic; Yasir Saleem. 2020. "Learning Representations of Network Traffic Using Deep Neural Networks for Network Anomaly Detection: A Perspective towards Oil and Gas IT Infrastructures." Symmetry 12, no. 11: 1882.
Information security attacks on oil and gas (O&G) organizations have increased since the last decade. From 2015 to 2019, almost 70 percent of O&G organizations faced at least one significant security breach worldwide. Research has shown that 43 percent of security attacks on O&G organizations occur due to the non-compliant behavior of O&G employees towards information security policy. The existing literature provides multiple solutions for technical security controls of O&G organizations. However, there are very few studies available that address behavioral security controls, specifically for O&G organizations of developing countries. The purpose of this study is to provide a comprehensive framework for information security policy compliance (ISPC) for the O&G sector. A mixed-method approach is used to develop the research framework. Semi-structured interviews from O&G specialists refined the developed framework. Based on qualitative study a survey questionnaire was developed. To evaluate the research framework, structural equation modeling was applied to a sample of 254 managers/executives from 150 Malaysian O&G organizations. The obtained test results confirmed the proposed research model, according to which good social bonding among employees plays a critical role in improving ISPC. However, there was less support for the notion that all organizational governance factors significantly improve the social bonding of Malaysian O&G organizations employees. This paper contributes to the current information system (IS) literature by exploring the interrelationships among organizational governance, social bonding, and information security policy compliance (ISPC) in Malaysian O&G organizations.
Rao Ali; P.D.D. Dominic; Kashif Ali. Organizational Governance, Social Bonds and Information Security Policy Compliance: A Perspective towards Oil and Gas Employees. Sustainability 2020, 12, 8576 .
AMA StyleRao Ali, P.D.D. Dominic, Kashif Ali. Organizational Governance, Social Bonds and Information Security Policy Compliance: A Perspective towards Oil and Gas Employees. Sustainability. 2020; 12 (20):8576.
Chicago/Turabian StyleRao Ali; P.D.D. Dominic; Kashif Ali. 2020. "Organizational Governance, Social Bonds and Information Security Policy Compliance: A Perspective towards Oil and Gas Employees." Sustainability 12, no. 20: 8576.
This paper provides a systematic literature review in the information security policies’ compliance (ISPC) field, with respect to information security culture, information security awareness, and information security management exploring in various settings the research designs, methodologies, and frameworks that have evolved over the last decade. Studies conducted from 2006 to 2016 reporting results from data collected through diverse means have been explored; however, only a few studies have focused primarily on a sensitive infrastructure under risk, as is the case with higher education institutions (HEIs). This study reports that ISPC in HEIs remains scarce, as is the realization of security threats and dissemination of information security policies to end users (employees). This research makes a novel contribution to the body of knowledge as a unique study that has reviewed the influence of institutional governance in HEIs on protection motivation leading towards ISPC.
Sadaf Hina; Dhanapal Dominic. Information security policies’ compliance: a perspective for higher education institutions. Journal of Computer Information Systems 2018, 60, 201 -211.
AMA StyleSadaf Hina, Dhanapal Dominic. Information security policies’ compliance: a perspective for higher education institutions. Journal of Computer Information Systems. 2018; 60 (3):201-211.
Chicago/Turabian StyleSadaf Hina; Dhanapal Dominic. 2018. "Information security policies’ compliance: a perspective for higher education institutions." Journal of Computer Information Systems 60, no. 3: 201-211.
Organizations profoundly rely on contemporary information systems as they store essential business and resources data. Security of these information systems is critically handled by applying both technical and behavioral controls. However, security culture in certain organizations such as Higher Education Institutions (HEI) is questionable due to the lax attitude of employees towards the institutional resources. This research intends to examine the effect of institutional governance (IG) factors security awareness programs, establishment of security policies and periodic monitoring in enhancing the protection motivation among employees. It is believed that employees motivated, through various sources of information, towards the protection of resources intend to comply with organizational Information Security Policies (ISP) documented to disseminate the roles and responsibilities of employees. The two relevant theories i.e. Protection Motivation Theory (PMT) and Theory of Planned Behavior (TPB) are integrated for this research. The effect of IG and negative experience, as external sources of information, is investigated on the integrated theories. Relevant hypotheses are formulated in the proposed hybrid research model. To pilot test the survey questionnaire, data collection was done among the employees within the HEI of Malaysia. Results were derived using IBM SPSS 23. Pilot study shows reliable measurement scales, suitable for final data collection and analysis to validate the research model.
Sadaf Hina; Dhanapal Durai Dominic; Dhanapal Dominic. Need for information security policies compliance: A perspective in Higher Education Institutions. 2017 International Conference on Research and Innovation in Information Systems (ICRIIS) 2017, 1 -6.
AMA StyleSadaf Hina, Dhanapal Durai Dominic, Dhanapal Dominic. Need for information security policies compliance: A perspective in Higher Education Institutions. 2017 International Conference on Research and Innovation in Information Systems (ICRIIS). 2017; ():1-6.
Chicago/Turabian StyleSadaf Hina; Dhanapal Durai Dominic; Dhanapal Dominic. 2017. "Need for information security policies compliance: A perspective in Higher Education Institutions." 2017 International Conference on Research and Innovation in Information Systems (ICRIIS) , no. : 1-6.
The hi-tech instigation of social media, powered and enhanced by the unique participation/collaboration pattern has initiated an epoch of in-depth research practices in education, government and the corporate sector. Social Networking Sites (SNS) are an example of Web 2.0 software that adheres to the participation/collaboration pattern with the capacity to connect people with similar demographics, interests, ideas, as well as similar educational, professional or social backgrounds. This study examines the perceived security and privacy on SNS along with the cyber safety education (acceptable usage policies) among stakeholders in schools (parents, teachers, students and school admin). A research framework has been established by incorporating a construct of intention to use SNS from the Technology Acceptance Model along with a unique combination of perceived security, perceived privacy, cyber safety education and trust constructs. Using reliable metrics from the literature, the research study validates that an enhanced sense of security and privacy positively affects users' trust in SNS. This paper highlights that the existence of a cyber-safety education among stakeholders also positively influences user trust in friends and eventually in positive intention for educational association. Moreover, secure and trusted intention to use SNS leads towards participation/collaboration between all stakeholders in the school environment.
Sadaf Hina; Dhanapal Dominic. Digital connectivity and sharing at school: Opportunities and security challenges of using social networking sites. 2017 5th International Conference on Information and Communication Technology (ICoIC7) 2017, 1 -6.
AMA StyleSadaf Hina, Dhanapal Dominic. Digital connectivity and sharing at school: Opportunities and security challenges of using social networking sites. 2017 5th International Conference on Information and Communication Technology (ICoIC7). 2017; ():1-6.
Chicago/Turabian StyleSadaf Hina; Dhanapal Dominic. 2017. "Digital connectivity and sharing at school: Opportunities and security challenges of using social networking sites." 2017 5th International Conference on Information and Communication Technology (ICoIC7) , no. : 1-6.
The webometric ranking system is currently one of the most widely used methods to rank website quality including for university websites. It uses pre-determined weights for the criteria assessed in these method; therefore, raised a question whether the pre-determined weigh is objective. Entropy method provides a more objective weighing method criterion. This study aims to compare the use of the entropy method followed by PROMETHEE II methods to evaluate 27 Indonesian university websites. The entropy method assesses four indicators: visibility, presence, openness and excellence of the website performance. The PROMETHEE II method was conducted to provide a complete ranking of university websites from the best to the worst, based on a pair-wise comparison of alternatives along each recognized criterion. The entropy method resulted in 0,3; 0,17;0,23; and 0,27 for visibility, presence, openness and excellence weights, respectively. The website ranking using PROMETHEE II method was not significantly different from the ranking generated from the webometric ranking system. To conclude, the use of entropy as a more objective method followed by PROMETHEE II is a reasonable alternative of the webometric system for ranking university websites, at least in the Indonesian context.
Handaru Jati; Dhanapal Durai Dominic; Dhanapal Dominic. A New Approach of Indonesian University Webometrics Ranking Using Entropy and PROMETHEE II. Procedia Computer Science 2017, 124, 444 -451.
AMA StyleHandaru Jati, Dhanapal Durai Dominic, Dhanapal Dominic. A New Approach of Indonesian University Webometrics Ranking Using Entropy and PROMETHEE II. Procedia Computer Science. 2017; 124 ():444-451.
Chicago/Turabian StyleHandaru Jati; Dhanapal Durai Dominic; Dhanapal Dominic. 2017. "A New Approach of Indonesian University Webometrics Ranking Using Entropy and PROMETHEE II." Procedia Computer Science 124, no. : 444-451.
This manuscript emphasizes on incorporating the hands on learning practices using information communication technology (ICT) tools and collaborative learning using social media technologies, in university educational courses such as Statistics & Empirical Methods. From the students' perspective, digital knowledge acquiring experience motivates learning capabilities and develops required scholastic skills. Introduction to software for analytical problem solving, and establishing communication channel using available online collaborative technologies can aid in enriching university teaching and learning experience. The results of use of ICT in university courses have shown substantial difference among the two participating groups; each comprised of twenty five students from the Statistics & Empirical Methods course. The experimental group performed significantly better than the controlled group, after going through series of tests and evaluations. The findings suggest that hands on learning experience blended with collaborative learning are essentially constructive for university courses and prepare university students for applied workplaces.
Dhanapal Dominic; Sadaf Hina. Engaging university students in hands on learning practices and social media collaboration. 2016 3rd International Conference on Computer and Information Sciences (ICCOINS) 2016, 559 -563.
AMA StyleDhanapal Dominic, Sadaf Hina. Engaging university students in hands on learning practices and social media collaboration. 2016 3rd International Conference on Computer and Information Sciences (ICCOINS). 2016; ():559-563.
Chicago/Turabian StyleDhanapal Dominic; Sadaf Hina. 2016. "Engaging university students in hands on learning practices and social media collaboration." 2016 3rd International Conference on Computer and Information Sciences (ICCOINS) , no. : 559-563.
Enterprises are striving to cut down their cost and the same time maintains an expectable level of quality in service delivery to keep the competitive edge. Integral to that is an analysis of business processes in order to identify inefficiencies in the design as well as execution of processes. Subsequently, based on the analysis improvement actions are taken. The techniques to identify inefficiencies in process are categorized into two types, a priori (pre-execution) analysis and posterior (post-execution) analysis. This study focuses on posterior analysis, in which the data produced as a result of process execution are used to identify inefficiencies such as execution delay, and resource utilization. The aim of study is to analyze the existing work on business process improvement and build a unified framework for business process intelligence.
Abid Sohail; Dhanapal Dominic. A Unified Framework for Business Process Intelligence. Lecture Notes in Electrical Engineering 2013, 285, 437 -444.
AMA StyleAbid Sohail, Dhanapal Dominic. A Unified Framework for Business Process Intelligence. Lecture Notes in Electrical Engineering. 2013; 285 ():437-444.
Chicago/Turabian StyleAbid Sohail; Dhanapal Dominic. 2013. "A Unified Framework for Business Process Intelligence." Lecture Notes in Electrical Engineering 285, no. : 437-444.
A cliché that no one could deny today is one that sound as the following; “Knowledge is power”. We need to understand the fact that managing organizational knowledge recourses is as important as managing conventional organization resources. Knowledge management is a method, which aims to help organizations to effectively use knowledge. A knowledge audit is often the initial step of a knowledge management activity. This paper aims to present a 6-stage Knowledge Audit Model; derived from a comparative study performed on two knowledge audit methodologies. These 6 stages are centred on core processes and integrates the development of appropriate knowledge management strategies. The practical implementation of this knowledge audit model for knowledge auditing allows for the investigation and analysis of the current knowledge-environment, the measurement of the risk and opportunities faced by the organization with respect to its “knowledge health” and finally the recommendation of appropriate knowledge management strategies to be undertaken.
AruntethyBai Ganasan; Dhanapal Dominic. Knowledge audit made comprehensive thru 6 stages. 2011 International Conference on Research and Innovation in Information Systems 2011, 1 -6.
AMA StyleAruntethyBai Ganasan, Dhanapal Dominic. Knowledge audit made comprehensive thru 6 stages. 2011 International Conference on Research and Innovation in Information Systems. 2011; ():1-6.
Chicago/Turabian StyleAruntethyBai Ganasan; Dhanapal Dominic. 2011. "Knowledge audit made comprehensive thru 6 stages." 2011 International Conference on Research and Innovation in Information Systems , no. : 1-6.
In recent years, many people have devoted their efforts to the issue of quality of Web site. The concept of quality is consisting of many criteria: quality of service perspective, a user perspective, a content perspective or indeed a usability perspective. Because of its possible instant worldwide audience a Websitepsilas quality and reliability are crucial. The very special nature of the Web applications and Websites pose unique software testing challenges. Webmasters, Web applications developers, and Website quality assurance managers need tools and methods that can match up to the new needs. This research conducts some tests to measure the quality of e government web site of five Asian countries via Web diagnostic tools online. The result of this study confirmed that the E-government Websites of Asian are neglecting performance and quality criteria.
Handaru Jati; Dhanapal Dominic. Quality Evaluation of E-government Website Using Web Diagnostic Tools: Asian Case. 2009 International Conference on Information Management and Engineering 2009, 85 -89.
AMA StyleHandaru Jati, Dhanapal Dominic. Quality Evaluation of E-government Website Using Web Diagnostic Tools: Asian Case. 2009 International Conference on Information Management and Engineering. 2009; ():85-89.
Chicago/Turabian StyleHandaru Jati; Dhanapal Dominic. 2009. "Quality Evaluation of E-government Website Using Web Diagnostic Tools: Asian Case." 2009 International Conference on Information Management and Engineering , no. : 85-89.