Readability of COVID-19 information by the Malaysian Ministry of Health
Background and Purpose: COVID-19 pandemic has caused catastrophe to global health. To collectively break the chain of infection, the Malaysian Ministry of Health (MMoH) disseminates information about COVID-19 through its official websites. Since they are intended for the general public, this crucial...
| Main Authors: | Ab Hamid, Ahmad Rauyani, Hashim, Muhammad Faizuddin, Ab Hassan, Nurliyana, Mhd Azhan, Norsadida |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Universiti Sultan Zainal Abidin, Malaysia
2020
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/81032/ http://irep.iium.edu.my/81032/1/622-Article%20Text-1784-1-10-20200623.pdf |
Similar Items
Health information system (HMS) in Malaysia
by: Ujan, Imran Anwar, et al.
Published: (2018)
by: Ujan, Imran Anwar, et al.
Published: (2018)
Information security for professional counseling in organization
by: Mohamed, Abdikadir Yusuf, et al.
Published: (2016)
by: Mohamed, Abdikadir Yusuf, et al.
Published: (2016)
Toward managing security cost for healthcare information
by: Hameed, Shihab A., et al.
Published: (2012)
by: Hameed, Shihab A., et al.
Published: (2012)
Protecting personal medical information: Asian perspectives
by: Samsuri, Suhaila, et al.
Published: (2013)
by: Samsuri, Suhaila, et al.
Published: (2013)
Information security awareness through the use of social media
by: Abdul Molok, Nurul Nuha, et al.
Published: (2015)
by: Abdul Molok, Nurul Nuha, et al.
Published: (2015)
Beyond traditional audits: the implications of information technology on auditing
by: Shaikh, Humaiz, et al.
Published: (2018)
by: Shaikh, Humaiz, et al.
Published: (2018)
International collaboration in information and communication technology of Malaysian scholars
by: Abu Bakar, Ahmad Bakeri, et al.
Published: (2013)
by: Abu Bakar, Ahmad Bakeri, et al.
Published: (2013)
Securing information system & computer security self-efficacy effect
by: Al-Shawabkeh, Mahmoud
Published: (2013)
by: Al-Shawabkeh, Mahmoud
Published: (2013)
Exploring the factors influencing top management involvement and participation in information security
by: Abdul Munir, Rufizah, et al.
Published: (2017)
by: Abdul Munir, Rufizah, et al.
Published: (2017)
Information sharing in governance of flood management in Malaysia: COBIT based framework
by: Maidin, Siti Sarah, et al.
Published: (2014)
by: Maidin, Siti Sarah, et al.
Published: (2014)
Privacy models for protecting personal medical information: a preliminary study
by: Samsuri, Suhaila, et al.
Published: (2011)
by: Samsuri, Suhaila, et al.
Published: (2011)
Sharing of attacks information across clouds for improving security:a conceptual framework
by: Waqas, Ahmad, et al.
Published: (2014)
by: Waqas, Ahmad, et al.
Published: (2014)
Artifact evaluation in information systems design science research: social constructivism environment
by: Ataie, Farib, et al.
Published: (2017)
by: Ataie, Farib, et al.
Published: (2017)
Context related rich information delivery to mobile users using smart posters
by: Ayu, Media Anugerah
Published: (2012)
by: Ayu, Media Anugerah
Published: (2012)
Assessing the quality of Selangor Islamic Religion Council (MAIS) website: a descriptive study
by: Ab Hamid, Ahmad Rauyani
Published: (2020)
by: Ab Hamid, Ahmad Rauyani
Published: (2020)
Node status detection and information diffusion in router network using scale-free network
by: Mahesar, Abdul Waheed, et al.
Published: (2014)
by: Mahesar, Abdul Waheed, et al.
Published: (2014)
Edward Snowden disclosures turn the fears of surveillance into reality: the impact and transformation in information security
by: Mohamed Mahmoud, Fatimetou Zahra, et al.
Published: (2016)
by: Mohamed Mahmoud, Fatimetou Zahra, et al.
Published: (2016)
Towards implementing a privacy policy: an observation on existing practices in hospital information system
by: Samsuri, Suhaila, et al.
Published: (2011)
by: Samsuri, Suhaila, et al.
Published: (2011)
ICT in telemedicine: conquering privacy and security issues in health care services
by: Olanrewaju, Rashidah Funke, et al.
Published: (2012)
by: Olanrewaju, Rashidah Funke, et al.
Published: (2012)
Informatics Engineering and Information Science : International Conference, ICIES 2011 Kuala Lumpur, Malaysia, November 14-16, 2011 proceedings, Part I.
Published: (2011)
Published: (2011)
Citizen experience towards humanizing digital government: a case in Malaysia
by: Hussein, Idyawati, et al.
Published: (2017)
by: Hussein, Idyawati, et al.
Published: (2017)
Metaheuristic approaches for gateway placement optimization in wireless mesh networks: a survey
by: M. Ahmed, Awadallah, et al.
Published: (2014)
by: M. Ahmed, Awadallah, et al.
Published: (2014)
Improving message delay, handoff latency and binding update in high level nested network mobility
by: Babiker, Mohammed Ali, et al.
Published: (2015)
by: Babiker, Mohammed Ali, et al.
Published: (2015)
Evaluation of an enhanced scheme for high-level nested network mobility
by: Ali Mohammed, Mohammed Babiker, et al.
Published: (2015)
by: Ali Mohammed, Mohammed Babiker, et al.
Published: (2015)
Performance study of intra-domain mobility management
by: Rusli, Nazreen, et al.
Published: (2005)
by: Rusli, Nazreen, et al.
Published: (2005)
Using lexical ontology for semi-automatic logical data warehouse design
by: Mior Nazri, Mior Nasir, et al.
Published: (2010)
by: Mior Nazri, Mior Nasir, et al.
Published: (2010)
An efficient scalable batch-rekeying scheme for secure multicast communication using multiple logical key trees
by: Zakaria, Omar, et al.
Published: (2014)
by: Zakaria, Omar, et al.
Published: (2014)
Investigation of gateway placement optimization approaches in wireless mesh networks using genetic algorithms
by: M. Ahmed, Awadallah, et al.
Published: (2014)
by: M. Ahmed, Awadallah, et al.
Published: (2014)
Evaluation of nested network mobility approaches
by: Ali Mohammed, Mohammed Babiker, et al.
Published: (2014)
by: Ali Mohammed, Mohammed Babiker, et al.
Published: (2014)
Mobility issues in hierarchical mobile IP
by: Hassan Abdalla Hashim, Aisha, et al.
Published: (2005)
by: Hassan Abdalla Hashim, Aisha, et al.
Published: (2005)
A novel scheme of binding update no sense drop BCE in LMA
by: Geaiger, Mohamed, et al.
Published: (2014)
by: Geaiger, Mohamed, et al.
Published: (2014)
Fixed wings UAV direction control “Hardware Design”
by: Khalil Abdallah, Mohamed, et al.
Published: (2015)
by: Khalil Abdallah, Mohamed, et al.
Published: (2015)
Implementation of direction control algorithms for fixed wings UAV
by: Abdalla, Mohamed K., et al.
Published: (2015)
by: Abdalla, Mohamed K., et al.
Published: (2015)
Dynamic spectrum allocation scheme for heterogeneous network: BER analysis
by: Othman, Nurzati Iwani, et al.
Published: (2017)
by: Othman, Nurzati Iwani, et al.
Published: (2017)
A survey on scalable multicasting in mobile ad hoc
networks
by: Qabajeh, Mohammad M., et al.
Published: (2015)
by: Qabajeh, Mohammad M., et al.
Published: (2015)
Comparison of X-band satellite link measurements with radar derived rain attenuation in the tropics
by: Badron, Khairayu, et al.
Published: (2014)
by: Badron, Khairayu, et al.
Published: (2014)
Medical emergency and healthcare model: enhancemet with SMS and MMS facilities
by: Hameed, Shihab A., et al.
Published: (2010)
by: Hameed, Shihab A., et al.
Published: (2010)
Statistical modeling for speech recognition
by: Khalifa, Othman Omran, et al.
Published: (2013)
by: Khalifa, Othman Omran, et al.
Published: (2013)
Wireless energy harvesting for portable devices using split ring resonator
by: Zainal ‘Abidin, Balqis Mohamed, et al.
Published: (2015)
by: Zainal ‘Abidin, Balqis Mohamed, et al.
Published: (2015)
Fishing community wireless network concept in Kuala Rompin, Pahang, Malaysia
by: Hashim, Wahidah, et al.
Published: (2019)
by: Hashim, Wahidah, et al.
Published: (2019)
Similar Items
-
Health information system (HMS) in Malaysia
by: Ujan, Imran Anwar, et al.
Published: (2018) -
Information security for professional counseling in organization
by: Mohamed, Abdikadir Yusuf, et al.
Published: (2016) -
Toward managing security cost for healthcare information
by: Hameed, Shihab A., et al.
Published: (2012) -
Protecting personal medical information: Asian perspectives
by: Samsuri, Suhaila, et al.
Published: (2013) -
Information security awareness through the use of social media
by: Abdul Molok, Nurul Nuha, et al.
Published: (2015)