2021 |
Freemium multi-sided platform business model: mosque kitchen as a source of free food, employment and empowerment of B40s food-preneurs.
Journal of Information Systems and Digital Technologies,
3
(2)
pp. 1-10
|
2020 |
Redesign business model options for "University of the Future" and staying relevant in the fourth industrial revolution age.
Journal of Information Systems and Digital Technologies (JISDT),
2
(1)
pp. 47-59
|
2019 |
The case study of Emergency Response Plan (ERP) implementation during the Malaysia Airlines (MAS) flight MH370 disappearance.
Malaysian Journal of Computing,
4
(2)
pp. 270-277
|
2018 |
Redesigning the University of the Future (UotF) through humanizing education and industry revolution 4.0.
International Journal of Interdisciplinary Research and Innovations,,
6
(4 (October-December))
pp. 464-472
|
2017 |
Cyberterrorism definition patterns and mitigation
strategies: A literature review.
International Journal of Science and Research (IJSR),
6
(1)
pp. 180-186
|
2016 |
Big data and its impact on IT consultancy.
International Journal of Computer Science and Information Technology Research,
4
(2 (April-June))
pp. 211-216
|
2016 |
Critical infrastructure protection of ICT in Muslim world.
International Journal of Science and Research (IJSR),
5
(12)
pp. 325-329
|
2016 |
Cyber risk management for wireless communication in organization.
International Journal of Scientific and Research Publications,
Volume 6
(Issue 1)
pp. 403-407
|
2016 |
How IT can enhance professional practice with regards to smart-phones and social networks?.
International Journal of Management and Commerce Innovations,
Vol. 4
(Issue 1)
pp. 211-214
|
2016 |
Information security for professional counseling in organization.
International Journal of Management and Commerce Innovations,
4
(1 (April-September))
pp. 167-173
|
2016 |
Issues and security measures of mobile banking apps.
International Journal of Scientific and Research Publications,
6
(1)
pp. 36-41
|
2015 |
Cloud computing: cloud adoption in professional practice .
International Journal of Science and Research (IJSR),
4
(5)
pp. 1532-1536
|
2015 |
Comparison of Business Model Canvas (BMC) among the three consulting companies .
International Journal of Computer Science and Information Technology Research,
3
(2)
pp. 462-471
|
2015 |
Disaster preparedness in universities .
International Journal of Computer Trends and Technology (IJCTT),
19
(1)
pp. 1-4
|
2015 |
How much privacy we still have on social network? .
International Journal of Scientific and Research Publications,
5
(1)
pp. 1-5
|
2015 |
Information security aligned to enterprise management.
Middle East Journal of Business,
10
(1)
pp. 62-66
|
2015 |
Mobile security and privacy in smartphone technology.
International Journal of Computer Science and Information Technology Research,
3
(4)
pp. 345-350
|
2015 |
Potential use of data mining techniques in information technology consulting operations .
International Journal of Scientific and Research Publications,
5
(5)
pp. 1-4
|
2015 |
Prevalence of mobile usage among university students: a case study of International Islamic University Malaysia.
International Journal of Scientific and Research Publications,
5
(12)
pp. 655-659
|
2015 |
Survey on mobile and wireless security awareness: user perspectives.
International Journal of Science and Research (IJSR),
4
(1)
pp. 1287-1292
|
2015 |
The knowledge management strategies used as a tool within and through strategic consulting firms to increase the organisational performance .
International Journal of Scientific and Research Publications,
5
(2)
pp. 1-5
|
2015 |
The role of IT consulting practice: a successful enterprise mobility solution .
International Journal of Management and Commerce Innovations ,
3
(1)
pp. 197-203
|
2014 |
An overview on cyber security awareness in Muslim countries.
International Journal of Information and Communication Technology Research,
4
(1)
pp. 21-24
|
2014 |
Business intelligence as a knowledge management tool in providing financial consultancy services.
American Journal of Information Systems,
2
(2)
pp. 26-32
|
2014 |
Employing information security awareness to minimize over-exposure of average Internet user on social networks.
International Journal of Scientific and Research Publications,
4
(1)
pp. 1-6
|
2014 |
Impact of NSA-PRISM to National Information Security
Strategy & Policy.
International Journal of Information and Communication Technology Research,
4
(1)
pp. 25-31
|
2014 |
Information security in ICT from an Islamic
perspective.
International Journal of Science and Research (IJSR),
13
(12)
pp. 773-778
|
2014 |
Persuasive technology contributions toward enhance information security awareness in an organization.
International Journal of Computer Trends and Technology (IJCTT),
10
(4)
pp. 180-186
|
2014 |
Positive impact of smartphone application: whatsapp &
facebook for online business .
International Journal of Scientific and Research Publications,
4
(12)
pp. 1-4
|
2014 |
Risk management at universities: illegal residents in hostels & fire cases
.
International Journal of Computer Trends and Technology (IJCTT),
7
(1)
pp. 15-20
|
2013 |
A study: cryptology techniques and methodologies.
International Journal of Science and Research (IJSR),
2
(12)
pp. 352-357
|
2013 |
Combinatoric Drag–Pattern-Graphical-Password (DPGP).
Journal of Emerging Trends in Computing and Information Sciences,
4
(12)
pp. 939-943
|
2013 |
Exploring persuasive technology to enhance delivery of professional services.
International Journal of Humanities and Social Science,
3
(12)
pp. 223-228
|
2013 |
IT security consultancy in Malaysia: hindrances and impacts.
Middle East Journal of Business,
8
(3)
pp. 17-22
|
2013 |
Knowledge management strategies as a competitive advantage for delivering professional e-government services.
Journal of Education and Vocational Research,
4
(5)
pp. 134-138
|
2013 |
Steganography: a review of information security research and development in Muslim world.
American Journal of Engineering Research (AJER),
2
(11)
pp. 122-128
|
2012 |
An investigation into privacy and security in online social networking sites among IIUM students.
World of Computer Science and Information Technology Journal (WCSIT),
2
(2)
pp. 57-61
|
2012 |
Ethical communication in IT project from an Islamic perspective.
World of Computer Science and Information Technology Journal,
2
(4)
pp. 142-146
|
2012 |
Impact of parallel projects management .
International Journal of Humanities and Social Science,
2
(23)
pp. 88-91
|
2012 |
Improving information security in e-banking by using biometric fingerprint : a case of major bank in Malaysia.
International Journal of Computer Science and Information Security (IJCSIS),
10
(3)
pp. 1-6
|
2011 |
Awareness of social engineering among IIUM students.
World of Computer Science and Information Technology Journal (WCSIT),
1
(9)
pp. 409-413
|
2011 |
Using biometric techniques to secure online student assessment: Comparative study.
International Journal of Computer Science and Information Security,
()
pp.
|
2021 |
Business model shifts: masjid kitchens as soup kitchens, jobs employment and empowering asnaf entrepreneurs, and income generation for the masjid.
In: International Conference on Information Technology for the Muslim World (ICT4M 2021),
|
2021 |
Cooperative behavior (ta’awun) between mosques and civic organizations in empowering asnafpreneurs through IIUM m-kitchen® project.
In: 2nd Kedah International Zakat Conference 2021 (KEIZAC 2021),
|
2021 |
Value Proposition Design: Multi-sided Platform Business Model.
In: 3rd National Symposium on Human-Computer Interaction,
|
2021 |
Value Proposition Design: Multi-sided Platform Business Model.
In: 3rd National Symposium on Human-Computer Interaction,
|
2018 |
A conceptual digital transformation design for International Islamic University Malaysia to ‘University of the Future’.
In: International Conference on Information and Communication Technology for the Muslim World 2018 (ICT4M),
|
2018 |
Cyber security maturity model and Maqasid al-Shari'ah.
In: 2018 International Conference on Information and Communication Technology for the Muslim World (ICT4M),
|
2017 |
Designing business models options for “University
of the Future”.
In: 4th International Colloquium on Information Science and Technology (CiSt'16),
|
2016 |
Persuasive technology for improving information security awareness and behavior: literature review.
In: 2016 6th International Conference on Information and Communication Technology for The Muslim World (ICT4M 2016),
|
2015 |
A cybersecurity capability maturity model based on Maqasid Shari’ah(MS-C2M2).
In: International Conference on Maqasid Al-Shari'ah in Public Policy and Governance,
|
2015 |
Alternative business models for soup kitchen.
In: 6th International Conference on Management, Finance & Entrepreneurship (ICMFE-2015),
|
2014 |
eHalal4All program - promoting a halal rural products and services globally by harnessing the Network-of-Mosques(NoM) capabilities.
In: International Halal Conference 2014 (INHAC 2014) ,
|
2014 |
eSoulKitchen program - enhancing societal wellbeing and wealth creation for Orang Asli community at Pos Selim, Perak.
In: 2014 The 5th International Conference on Information & Communication Technology for the Muslim World (ICT4M 2014),
|
2013 |
Critical information security challenges: an appraisal.
In: The 4th International Conference on Information & Communication Technology for the Muslim World (ICT4M),
|
2013 |
Development of Al-Mu’awwidhah computing for personal data
protection against abnormal attacks.
In: The 4th International Conference on Information & Communication Technology for the Muslim World (ICT4M),
|
2013 |
Mitigating privacy issues on Facebook by implementing information security awareness with Islamic perspectives.
In: The 4th International Conference on Information & Communication Technology for the Muslim World (ICT4M),
|
2013 |
Risk Management in Parallel Projects: Analysis & Best Practices and Implications to Generic DBrain (gDBrain) Research Project.
In: The 4th International Conference on Information & Communication Technology for the Muslim World (ICT4M),
|