Article |
2021 |
Freemium multi-sided platform business model: mosque kitchen as a source of free food, employment and empowerment of B40s food-preneurs. Journal of Information Systems and Digital Technologies
, 3
(2)
pp.1-10
|
2020 |
Redesign business model options for "University of the Future" and staying relevant in the fourth industrial revolution age. Journal of Information Systems and Digital Technologies (JISDT)
, 2
(1)
pp.47-59
|
2019 |
The case study of Emergency Response Plan (ERP) implementation during the Malaysia Airlines (MAS) flight MH370 disappearance. Malaysian Journal of Computing
, 4
(2)
pp.270-277
|
2018 |
Redesigning the University of the Future (UotF) through humanizing education and industry revolution 4.0. International Journal of Interdisciplinary Research and Innovations,
, 6
(4 (October-December))
pp.464-472
|
2017 |
Cyberterrorism definition patterns and mitigation
strategies: A literature review. International Journal of Science and Research (IJSR)
, 6
(1)
pp.180-186
|
2016 |
Big data and its impact on IT consultancy. International Journal of Computer Science and Information Technology Research
, 4
(2 (April-June))
pp.211-216
|
2016 |
Critical infrastructure protection of ICT in Muslim world. International Journal of Science and Research (IJSR)
, 5
(12)
pp.325-329
|
2016 |
Cyber risk management for wireless communication in organization. International Journal of Scientific and Research Publications
, Volume 6
(Issue 1)
pp.403-407
|
2016 |
How IT can enhance professional practice with regards to smart-phones and social networks?. International Journal of Management and Commerce Innovations
, Vol. 4
(Issue 1)
pp.211-214
|
2016 |
Information security for professional counseling in organization. International Journal of Management and Commerce Innovations
, 4
(1 (April-September))
pp.167-173
|
2016 |
Issues and security measures of mobile banking apps. International Journal of Scientific and Research Publications
, 6
(1)
pp.36-41
|
2015 |
The role of IT consulting practice: a successful enterprise mobility solution . International Journal of Management and Commerce Innovations
, 3
(1)
pp.197-203
|
2015 |
The knowledge management strategies used as a tool within and through strategic consulting firms to increase the organisational performance . International Journal of Scientific and Research Publications
, 5
(2)
pp.1-5
|
2015 |
Comparison of Business Model Canvas (BMC) among the three consulting companies . International Journal of Computer Science and Information Technology Research
, 3
(2)
pp.462-471
|
2015 |
Potential use of data mining techniques in information technology consulting operations . International Journal of Scientific and Research Publications
, 5
(5)
pp.1-4
|
2015 |
Cloud computing: cloud adoption in professional practice . International Journal of Science and Research (IJSR)
, 4
(5)
pp.1532-1536
|
2015 |
Information security aligned to enterprise management. Middle East Journal of Business
, 10
(1)
pp.62-66
|
2015 |
Survey on mobile and wireless security awareness: user perspectives. International Journal of Science and Research (IJSR)
, 4
(1)
pp.1287-1292
|
2015 |
How much privacy we still have on social network? . International Journal of Scientific and Research Publications
, 5
(1)
pp.1-5
|
2015 |
Disaster preparedness in universities . International Journal of Computer Trends and Technology (IJCTT)
, 19
(1)
pp.1-4
|
2015 |
Mobile security and privacy in smartphone technology. International Journal of Computer Science and Information Technology Research
, 3
(4)
pp.345-350
|
2015 |
Prevalence of mobile usage among university students: a case study of International Islamic University Malaysia. International Journal of Scientific and Research Publications
, 5
(12)
pp.655-659
|
2014 |
Information security in ICT from an Islamic
perspective. International Journal of Science and Research (IJSR)
, 13
(12)
pp.773-778
|
2014 |
Risk management at universities: illegal residents in hostels & fire cases
. International Journal of Computer Trends and Technology (IJCTT)
, 7
(1)
pp.15-20
|
2014 |
An overview on cyber security awareness in Muslim countries. International Journal of Information and Communication Technology Research
, 4
(1)
pp.21-24
|
2014 |
Employing information security awareness to minimize over-exposure of average Internet user on social networks. International Journal of Scientific and Research Publications
, 4
(1)
pp.1-6
|
2014 |
Impact of NSA-PRISM to National Information Security
Strategy & Policy. International Journal of Information and Communication Technology Research
, 4
(1)
pp.25-31
|
2014 |
Positive impact of smartphone application: whatsapp &
facebook for online business . International Journal of Scientific and Research Publications
, 4
(12)
pp.1-4
|
2014 |
Business intelligence as a knowledge management tool in providing financial consultancy services. American Journal of Information Systems
, 2
(2)
pp.26-32
|
2014 |
Persuasive technology contributions toward enhance information security awareness in an organization. International Journal of Computer Trends and Technology (IJCTT)
, 10
(4)
pp.180-186
|
2013 |
A study: cryptology techniques and methodologies. International Journal of Science and Research (IJSR)
, 2
(12)
pp.352-357
|
2013 |
Knowledge management strategies as a competitive advantage for delivering professional e-government services. Journal of Education and Vocational Research
, 4
(5)
pp.134-138
|
2013 |
Combinatoric Drag–Pattern-Graphical-Password (DPGP). Journal of Emerging Trends in Computing and Information Sciences
, 4
(12)
pp.939-943
|
2013 |
Steganography: a review of information security research and development in Muslim world. American Journal of Engineering Research (AJER)
, 2
(11)
pp.122-128
|
2013 |
IT security consultancy in Malaysia: hindrances and impacts. Middle East Journal of Business
, 8
(3)
pp.17-22
|
2013 |
Exploring persuasive technology to enhance delivery of professional services. International Journal of Humanities and Social Science
, 3
(12)
pp.223-228
|
2012 |
Impact of parallel projects management . International Journal of Humanities and Social Science
, 2
(23)
pp.88-91
|
2012 |
An investigation into privacy and security in online social networking sites among IIUM students. World of Computer Science and Information Technology Journal (WCSIT)
, 2
(2)
pp.57-61
|
2012 |
Ethical communication in IT project from an Islamic perspective. World of Computer Science and Information Technology Journal
, 2
(4)
pp.142-146
|
2012 |
Improving information security in e-banking by using biometric fingerprint : a case of major bank in Malaysia. International Journal of Computer Science and Information Security (IJCSIS)
, 10
(3)
pp.1-6
|
2011 |
Using biometric techniques to secure online student assessment: Comparative study. International Journal of Computer Science and Information Security
|
2011 |
Awareness of social engineering among IIUM students. World of Computer Science and Information Technology Journal (WCSIT)
, 1
(9)
pp.409-413
|
Conference or Workshop Item |
2021 |
Value Proposition Design: Multi-sided Platform Business Model.
In: 3rd National Symposium on Human-Computer Interaction
|
2021 |
Business model shifts: masjid kitchens as soup kitchens, jobs employment and empowering asnaf entrepreneurs, and income generation for the masjid.
In: International Conference on Information Technology for the Muslim World (ICT4M 2021)
|
2021 |
Cooperative behavior (ta’awun) between mosques and civic organizations in empowering asnafpreneurs through IIUM m-kitchen® project.
In: 2nd Kedah International Zakat Conference 2021 (KEIZAC 2021)
|
2018 |
A conceptual digital transformation design for International Islamic University Malaysia to ‘University of the Future’.
In: International Conference on Information and Communication Technology for the Muslim World 2018 (ICT4M)
|
2018 |
Cyber security maturity model and Maqasid al-Shari'ah.
In: 2018 International Conference on Information and Communication Technology for the Muslim World (ICT4M)
|
2017 |
Designing business models options for “University
of the Future”.
In: 4th International Colloquium on Information Science and Technology (CiSt'16)
|
2016 |
Persuasive technology for improving information security awareness and behavior: literature review.
In: 2016 6th International Conference on Information and Communication Technology for The Muslim World (ICT4M 2016)
|
2015 |
Alternative business models for soup kitchen.
In: 6th International Conference on Management, Finance & Entrepreneurship (ICMFE-2015)
|
2015 |
A cybersecurity capability maturity model based on Maqasid Shari’ah(MS-C2M2).
In: International Conference on Maqasid Al-Shari'ah in Public Policy and Governance
|
2014 |
eSoulKitchen program - enhancing societal wellbeing and wealth creation for Orang Asli community at Pos Selim, Perak.
In: 2014 The 5th International Conference on Information & Communication Technology for the Muslim World (ICT4M 2014)
|
2014 |
eHalal4All program - promoting a halal rural products and services globally by harnessing the Network-of-Mosques(NoM) capabilities.
In: International Halal Conference 2014 (INHAC 2014)
|
2013 |
Mitigating privacy issues on Facebook by implementing information security awareness with Islamic perspectives.
In: The 4th International Conference on Information & Communication Technology for the Muslim World (ICT4M)
|
2013 |
Development of Al-Mu’awwidhah computing for personal data
protection against abnormal attacks.
In: The 4th International Conference on Information & Communication Technology for the Muslim World (ICT4M)
|
2013 |
Risk Management in Parallel Projects: Analysis & Best Practices and Implications to Generic DBrain (gDBrain) Research Project.
In: The 4th International Conference on Information & Communication Technology for the Muslim World (ICT4M)
|
2013 |
Critical information security challenges: an appraisal.
In: The 4th International Conference on Information & Communication Technology for the Muslim World (ICT4M)
|