Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Ransomware Attacks: Tools and Techniques for Detection., , , , , and . ICCR, page 1-5. IEEE, (2024)Citizen Centric Impact on Success Factors of Digital Government Maturity in Malaysian Public Sector., , and . PACIS, page 194. (2017)The Knowledge Communication Conceptual Model in Malaysian Public Sector., , , and . KMO, volume 731 of Communications in Computer and Information Science, page 27-38. Springer, (2017)Measurement Model of Relationship Between Knowledge Management Enablers and Knowledge Management Performance in Public Sector., , and . KMO, volume 224 of Lecture Notes in Business Information Processing, page 146-159. Springer, (2015)Forecasting social CRM adoption in SMEs: A combined SEM-neural network method., , and . Comput. Hum. Behav., (2017)Towards designing an EA readiness instrument: A systematic review., , , , , , and . CIST, page 158-163. IEEE, (2016)Business Intelligence Design: Consideration of Convergence Challenges., , , , , and . PACIS, page 94. (2017)Extending the Occupational Safety and Health Management System as a Knowledge Management System Through the Mixed-Reality Remote Audit., , , and . KMO, volume 1593 of Communications in Computer and Information Science, page 270-278. Springer, (2022)Constructing Conceptual Model for Security Culture in Health Information Systems Security Effectiveness., , and . WorldCIST, volume 206 of Advances in Intelligent Systems and Computing, page 213-220. Springer, (2013)e-Book use by Malaysian primary school children., and . DICTAP, page 109-113. IEEE, (2014)