Evaluation of usability problems of labor portal in Saudi Arabia
The purpose of this research was to evaluate the quality of Labor portal. Ministry of Labor focused on over the past years to establish a database of the labor market in the Kingdom of Saudi Arabia. The data includes workers in Saudi private sector, whether Saudis or expatriates where mechanizatio...
| Main Authors: | Alzuabi, Haifa Fahad, Alshaikhli, Imad Fakhri Taha |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Helvetic Editions LTD, Switzerland
2013
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/30098/ http://irep.iium.edu.my/30098/1/Evaluation-of-Usability-Problems-of-Labor-Portal-in-Saudi-Arabia.pdf |
Similar Items
Effectiveness and performance of e-government in Saudi Arabia
by: Taha Alshaikhli, Haifa, et al.
Published: (2017)
by: Taha Alshaikhli, Haifa, et al.
Published: (2017)
Quality evaluation of “safeer” portal for Saudi students studying abroad
by: Taha, Imad, et al.
Published: (2012)
by: Taha, Imad, et al.
Published: (2012)
An improved genetic algorithm for solving the multiprocessor scheduling problem
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2011)
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2011)
Brain & heart from computer science perspective
by: Taha Alshaikhli, Imad Fakhri
Published: (2014)
by: Taha Alshaikhli, Imad Fakhri
Published: (2014)
Scientific research in view of Quran and the creation of Allah s.w.t.
by: Taha Alshaikhli, Imad Fakhri
Published: (2018)
by: Taha Alshaikhli, Imad Fakhri
Published: (2018)
Scientific research in view of Quran and the creation of Allah s w t
by: Taha Alshaikhli, Imad Fakhri
Published: (2019)
by: Taha Alshaikhli, Imad Fakhri
Published: (2019)
Structure of research proposal
by: Taha Alshaikhli, Imad Fakhri
Published: (2017)
by: Taha Alshaikhli, Imad Fakhri
Published: (2017)
A practical method for the analysis of genetic algorithms
by: Alshaikhli, Imad Fakhri Taha
Published: (2011)
by: Alshaikhli, Imad Fakhri Taha
Published: (2011)
A case study of health information system workflow on mitigating opioid drug abuse in Saudi Arabia's healthcare system / Alogaili Fahad Abdulrahman
by: Alogaili, Fahad Abdulrahman
Published: (2021)
by: Alogaili, Fahad Abdulrahman
Published: (2021)
Investigation of adoption behaviour for social commerce
in the Kingdom of Saudi Arabia
by: Aldhahery, Muhammad, et al.
Published: (2019)
by: Aldhahery, Muhammad, et al.
Published: (2019)
MOIM: a novel design of cryptographic hash function
by: Alahmad, Mohammad, et al.
Published: (2013)
by: Alahmad, Mohammad, et al.
Published: (2013)
Broad view of cryptographic hash functions
by: Alahmad, Mohammad, et al.
Published: (2013)
by: Alahmad, Mohammad, et al.
Published: (2013)
Protection of the digital holy Quran using SAB hash function
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2013)
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2013)
Dynamic linear feedback shift registers: a review
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2014)
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2014)
Accident detection system and method for accident detection
by: Alkandari, Abdulrahman, et al.
Published: (2014)
by: Alkandari, Abdulrahman, et al.
Published: (2014)
Design and analysis of a new hash function gear
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2014)
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2014)
A review of steganographic methods and techniques
by: Beroual, Abdessalam, et al.
Published: (2018)
by: Beroual, Abdessalam, et al.
Published: (2018)
Dynamic fuzzy logic traffic light integrated system with accident detection and action
by: Taha Alshaikhli, Imad Fakhri, et al.
Published: (2017)
by: Taha Alshaikhli, Imad Fakhri, et al.
Published: (2017)
Minimum capabilities and requirements for establishing a national cert for AGC
by: Taha Alshaikhli, Imad Fakhri, et al.
Published: (2017)
by: Taha Alshaikhli, Imad Fakhri, et al.
Published: (2017)
Protection of the digital holy Quran using IT techniques
by: Alahmad, Mohammad, et al.
Published: (2017)
by: Alahmad, Mohammad, et al.
Published: (2017)
Designing a smart city in Kuwait: an initial study
by: Alkandari, Abdulrahman, et al.
Published: (2012)
by: Alkandari, Abdulrahman, et al.
Published: (2012)
Comparative study on 4G/LTE cryptographic algorithms based on different factors
by: Ghanim, Alyaa, et al.
Published: (2014)
by: Ghanim, Alyaa, et al.
Published: (2014)
Model for the evaluation of usability of scientific workflows
by: Amelia, Abd Rahman
Published: (2019)
by: Amelia, Abd Rahman
Published: (2019)
A new algorithm for human face detection using skin color tone
by: Zangana, Hewa Majeed, et al.
Published: (2013)
by: Zangana, Hewa Majeed, et al.
Published: (2013)
Comparative study of some symmetric ciphers in mobile systems
by: Jassim, Khalid Fadhil, et al.
Published: (2014)
by: Jassim, Khalid Fadhil, et al.
Published: (2014)
Analysis of confidentiality algorithms in different mobile generations
by: Jassim, Khalid Fadhil, et al.
Published: (2017)
by: Jassim, Khalid Fadhil, et al.
Published: (2017)
Analysis the components of SNOW 3G and ZUC ciphers in mobile systems
by: Jassim, Khalid Fadhil, et al.
Published: (2018)
by: Jassim, Khalid Fadhil, et al.
Published: (2018)
Statistical analysis of the eSTREAM competition winners
by: Mohamed Eljadi, Fardous, et al.
Published: (2016)
by: Mohamed Eljadi, Fardous, et al.
Published: (2016)
Mobile technology generations and cryptographic algorithms: analysis study
by: Jassim, Khalid Fadhil, et al.
Published: (2016)
by: Jassim, Khalid Fadhil, et al.
Published: (2016)
Comparative study between traffic control methods
Using simulation software
by: Taha Alshaikhli , Imad Fakhri, et al.
Published: (2013)
by: Taha Alshaikhli , Imad Fakhri, et al.
Published: (2013)
A study on the effects of EEG and ECG signals while listening to Qur'an recitation
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2014)
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2014)
Detection and restoration of cracked digitized paintings and
manuscripts using image processing - a survey
by: Farajalla Ali, Nawafil Abdulwahab, et al.
Published: (2017)
by: Farajalla Ali, Nawafil Abdulwahab, et al.
Published: (2017)
Online feature selection based on input significance analysis (ISA) for evolving connectionist systems (ECos)
by: Hassan, Raini, et al.
Published: (2017)
by: Hassan, Raini, et al.
Published: (2017)
Rational drug design using genetic algorithm: case of malaria disease
by: Al-Safi, Hassen Mohammed, et al.
Published: (2012)
by: Al-Safi, Hassen Mohammed, et al.
Published: (2012)
Internal structure of computer systems
by: Shah, Asadullah, et al.
Published: (2011)
by: Shah, Asadullah, et al.
Published: (2011)
Interfaces and protocols
by: Shah, Asadullah, et al.
Published: (2011)
by: Shah, Asadullah, et al.
Published: (2011)
Similar Items
-
Effectiveness and performance of e-government in Saudi Arabia
by: Taha Alshaikhli, Haifa, et al.
Published: (2017) -
Quality evaluation of “safeer” portal for Saudi students studying abroad
by: Taha, Imad, et al.
Published: (2012) -
An improved genetic algorithm for solving the multiprocessor scheduling problem
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2011) -
Brain & heart from computer science perspective
by: Taha Alshaikhli, Imad Fakhri
Published: (2014) -
Scientific research in view of Quran and the creation of Allah s.w.t.
by: Taha Alshaikhli, Imad Fakhri
Published: (2018)