Computer assisted alerts using mental model approach for customer service improvement
Warning alerts are specially designed to protect user rights and safety to avoid serious damage caused by overlooking the essence of warning alerts. Today’s world of Information Communication Technology (ICT) needs improvement and to review the decisions of security experts in terms of improving war...
| Main Authors: | Ghaffar, Abid, Wahiddin, Mohamed Ridza, Shaikh, Asadullah |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Scientific Research Publishing
2013
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/32452/ http://irep.iium.edu.my/32452/1/JSEA_2013101213553912.pdf |
Similar Items
Car rental management sytem with SMS alert
by: Fazreeny, Adnan
Published: (2013)
by: Fazreeny, Adnan
Published: (2013)
Multi-layered alert filtration and feedback cycle using Brahms model
by: Ghaffar, Abid, et al.
Published: (2016)
by: Ghaffar, Abid, et al.
Published: (2016)
Learning management system through assignment box alert
by: Noraziah, Ahmad, et al.
Published: (2011)
by: Noraziah, Ahmad, et al.
Published: (2011)
UMP medical refrigerator alert system using sms notification
by: Rushdan AmrI, Abdul Rashid
Published: (2015)
by: Rushdan AmrI, Abdul Rashid
Published: (2015)
Geofence alerts application with GPS tracking for children monitoring (CTS)
by: Mohd Izham, Mohd Jaya, et al.
Published: (2021)
by: Mohd Izham, Mohd Jaya, et al.
Published: (2021)
Internet of Things (IoT) Based Fire Alert Monitoring System for Car Parking
by: Anis Farihan, Mat Raffei, et al.
Published: (2020)
by: Anis Farihan, Mat Raffei, et al.
Published: (2020)
Study and Implementation of Internet of Things (IoT) Based Vehicle Safety
Alert and Tracking System
by: Sarasvathi, Nahalingham, et al.
Published: (2018)
by: Sarasvathi, Nahalingham, et al.
Published: (2018)
A False Alert Reduction And An Alert Score Assessment Framework For Intrusion Alerts
by: Al-Saedi, Karim Hashim Kraidi
Published: (2013)
by: Al-Saedi, Karim Hashim Kraidi
Published: (2013)
Combinatorial Rules Approach to Improve Priority Rules Scheduler in Grid Computing Environment
by: Zafril Rizal, M Azmi, et al.
Published: (2012)
by: Zafril Rizal, M Azmi, et al.
Published: (2012)
Decoy state quantum key distribution
by: Ali, Sellami, et al.
Published: (2009)
by: Ali, Sellami, et al.
Published: (2009)
Quantum key distribution using decoy state protocol
by: Ali, Sellami, et al.
Published: (2009)
by: Ali, Sellami, et al.
Published: (2009)
Traffic Sign Board Recognition and Voice Alert System using CNN
by: Yogesh, C.M., et al.
Published: (2024)
by: Yogesh, C.M., et al.
Published: (2024)
CAL (computer assisted) learning for English idioms / Tan Yee Loon
by: Tan , Yee Loon
Published: (2001)
by: Tan , Yee Loon
Published: (2001)
Temperature alert alarm system (TAAS)
by: Norhidayah, Masstor
Published: (2015)
by: Norhidayah, Masstor
Published: (2015)
Security alert through path analysis
by: Lo, Kelvin, Yir Siang
Published: (2013)
by: Lo, Kelvin, Yir Siang
Published: (2013)
Cloud computing: Analysis of various services
by: Khan, Nawsher, et al.
Published: (2012)
by: Khan, Nawsher, et al.
Published: (2012)
Network intrusion alert correlation challenges and techniques
by: Md. Siraj, Maheyzah, et al.
Published: (2008)
by: Md. Siraj, Maheyzah, et al.
Published: (2008)
Conditional statements
by: Shaikh, Asadullah, et al.
Published: (2011)
by: Shaikh, Asadullah, et al.
Published: (2011)
Switch statement
by: Shaikh, Asadullah, et al.
Published: (2011)
by: Shaikh, Asadullah, et al.
Published: (2011)
10 c’s of social networking, interconnections and
the impact on social networking
by: Shah, Asadullah, et al.
Published: (2013)
by: Shah, Asadullah, et al.
Published: (2013)
Read data from a file
by: Shah, Asadullah, et al.
Published: (2011)
by: Shah, Asadullah, et al.
Published: (2011)
Object oriented programming
by: Shah, Asadullah, et al.
Published: (2011)
by: Shah, Asadullah, et al.
Published: (2011)
Structures (struct) and files
by: Shah, Asadullah, et al.
Published: (2011)
by: Shah, Asadullah, et al.
Published: (2011)
Arrays
by: Shah, Asadullah, et al.
Published: (2011)
by: Shah, Asadullah, et al.
Published: (2011)
Exercise of array
by: Shah, Asadullah, et al.
Published: (2011)
by: Shah, Asadullah, et al.
Published: (2011)
Customization approach and software quality mapping model to improve SaaS customization
by: Ali, Abdulrazzaq Qasem
Published: (2020)
by: Ali, Abdulrazzaq Qasem
Published: (2020)
Student academic alert system / Lee Foo Yee
by: Lee , Foo Yee
Published: (2003)
by: Lee , Foo Yee
Published: (2003)
Geofence alerts application with gps tracking for children monitoring
by: Mohd Izham, Mohd Jaya, et al.
Published: (2021)
by: Mohd Izham, Mohd Jaya, et al.
Published: (2021)
OpinionSeer: Text visualization on hotel customer reviews of services and physical environment
by: Lee, Angela Siew Hoong *, et al.
Published: (2018)
by: Lee, Angela Siew Hoong *, et al.
Published: (2018)
Using computer analysis of student writing to improve lesson planning
by: Fooks, Ian, et al.
Published: (2018)
by: Fooks, Ian, et al.
Published: (2018)
Bubble sort algorithm
by: Shah, Asadullah, et al.
Published: (2011)
by: Shah, Asadullah, et al.
Published: (2011)
Review of arrays
by: Shah, Asadullah, et al.
Published: (2011)
by: Shah, Asadullah, et al.
Published: (2011)
An ethical assessment of computer ethics using scenario approach
by: Masrom, Maslin, et al.
Published: (2010)
by: Masrom, Maslin, et al.
Published: (2010)
Computation Offloading – an Effective Approach to Enhance Smartphone Capabilities
by: Muhammad Wasif, Nabeel Qureshi, et al.
Published: (2015)
by: Muhammad Wasif, Nabeel Qureshi, et al.
Published: (2015)
Factors Influencing the Continuous Use of Cloud Computing Services in Organization Level
by: Al-Sharafi, Mohammed A., et al.
Published: (2017)
by: Al-Sharafi, Mohammed A., et al.
Published: (2017)
An integrated model to evaluate the effects of cloud computing services on SMEs performance
by: Ruzaini, Abdullah Arshah, et al.
Published: (2018)
by: Ruzaini, Abdullah Arshah, et al.
Published: (2018)
A model for computing skyline data items in cloud incomplete databases
by: Gulzar, Yonis, et al.
Published: (2020)
by: Gulzar, Yonis, et al.
Published: (2020)
A new scheduling technique to improve data management in cloud computing
by: Khan, Nawsher
Published: (2013)
by: Khan, Nawsher
Published: (2013)
The Effect of Security and Privacy Perceptions on Customers' Trust to Accept Internet Banking Services An Extension of TAM
by: Mohamrned A, Al-Sharafi, et al.
Published: (2016)
by: Mohamrned A, Al-Sharafi, et al.
Published: (2016)
Modifiers for class data
by: Shaikh, Muniba, et al.
Published: (2011)
by: Shaikh, Muniba, et al.
Published: (2011)
Similar Items
-
Car rental management sytem with SMS alert
by: Fazreeny, Adnan
Published: (2013) -
Multi-layered alert filtration and feedback cycle using Brahms model
by: Ghaffar, Abid, et al.
Published: (2016) -
Learning management system through assignment box alert
by: Noraziah, Ahmad, et al.
Published: (2011) -
UMP medical refrigerator alert system using sms notification
by: Rushdan AmrI, Abdul Rashid
Published: (2015) -
Geofence alerts application with GPS tracking for children monitoring (CTS)
by: Mohd Izham, Mohd Jaya, et al.
Published: (2021)