The role of IT consulting practice: a successful enterprise mobility solution
Mobile technologies are progressing to advance and reform the technology landscape promotes a global connectivity where people can access information in a real time from anywhere. This revolution has changed the way business is conducted including Information Technology (IT) consulting orga...
| Main Authors: | Fakhri, Nurul Fahimah, Ibrahim, Jamaludin |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Research Publish Journals
2015
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/45388/ http://irep.iium.edu.my/45388/1/2015-The_Role_of_IT_Consulting_Practice-_A_Successful_Entreprise_Mobility_Solution.pdf |
Similar Items
Information security aligned to enterprise management
by: Abdullah, Istikoma, et al.
Published: (2015)
by: Abdullah, Istikoma, et al.
Published: (2015)
Potential use of data mining techniques in information technology consulting operations
by: Qadri, Mehran, et al.
Published: (2015)
by: Qadri, Mehran, et al.
Published: (2015)
Comparison of Business Model Canvas (BMC) among the three consulting companies
by: Azhar Amanullah, Ayn Nur Azhana, et al.
Published: (2015)
by: Azhar Amanullah, Ayn Nur Azhana, et al.
Published: (2015)
The knowledge management strategies used as a tool within and through strategic consulting firms to increase the organisational performance
by: Mohamed Mahmoud, Fatimetou Zahra, et al.
Published: (2015)
by: Mohamed Mahmoud, Fatimetou Zahra, et al.
Published: (2015)
Cloud computing: cloud adoption in professional practice
by: Nazri, Nadhirah, et al.
Published: (2015)
by: Nazri, Nadhirah, et al.
Published: (2015)
Mobile Quran app security vulnerabilities
by: Talib, Shuhaili, et al.
Published: (2015)
by: Talib, Shuhaili, et al.
Published: (2015)
Towards successful improvement of students’ residential management processes using the enterprise architecture maturity model
by: Moses, Golooba, et al.
Published: (2012)
by: Moses, Golooba, et al.
Published: (2012)
Comparison of key enablers for the successful comercialization of bioinformatics products in Malaysia and Singapore
by: Nagaretham, Revathi, et al.
Published: (2012)
by: Nagaretham, Revathi, et al.
Published: (2012)
Enterprise information architecture of a Malaysian institute of higher learning management information system: an experience
by: Suhaimi, Mohd Adam, et al.
Published: (2014)
by: Suhaimi, Mohd Adam, et al.
Published: (2014)
A study of the use of mobile phones by older persons
by: Kurniawan, Sri, et al.
Published: (2006)
by: Kurniawan, Sri, et al.
Published: (2006)
1 touch I-care system: collaborative web-based solution
by: Ahmad Dahlan, Abdul Rahman, et al.
Published: (2011)
by: Ahmad Dahlan, Abdul Rahman, et al.
Published: (2011)
Web-based e-learning systems acceptance and success: a review of contributing factors from the instructors’ perception
by: Oyefolahan, Ishaq Oyebisi, et al.
Published: (2014)
by: Oyefolahan, Ishaq Oyebisi, et al.
Published: (2014)
Research methodologies: a practical approach
by: Shah, Asadullah, et al.
Published: (2011)
by: Shah, Asadullah, et al.
Published: (2011)
HCI practice in Malaysia : a reflection of ICT professionals' perspective
by: Hussein, Idyawati, et al.
Published: (2010)
by: Hussein, Idyawati, et al.
Published: (2010)
Positive impact of smartphone application: whatsapp &
facebook for online business
by: Ibrahim, Jamaludin, et al.
Published: (2014)
by: Ibrahim, Jamaludin, et al.
Published: (2014)
Steganography: a review of information security research and development in Muslim world
by: Yunus, Yunura Azura, et al.
Published: (2013)
by: Yunus, Yunura Azura, et al.
Published: (2013)
Employing information security awareness to minimize over-exposure of average Internet user on social networks
by: Binden, Worawit, et al.
Published: (2014)
by: Binden, Worawit, et al.
Published: (2014)
How much privacy we still have on social network?
by: Chewae, Mafaisu, et al.
Published: (2015)
by: Chewae, Mafaisu, et al.
Published: (2015)
User Experience Design (UXD): a survey of user interface development practices in Malaysia
by: Hussein, Idyawati, et al.
Published: (2012)
by: Hussein, Idyawati, et al.
Published: (2012)
Information security in ICT from an Islamic
perspective
by: Ibrahim, Jamaludin, et al.
Published: (2014)
by: Ibrahim, Jamaludin, et al.
Published: (2014)
Impact of NSA-PRISM to National Information Security
Strategy & Policy
by: Khudayer, Aiesha Y., et al.
Published: (2014)
by: Khudayer, Aiesha Y., et al.
Published: (2014)
Managers' perception of Information Management (IM) and Knowledge Management (KM) and the role of information and knowledge managers
by: Abdul Karim, Nor Shahriza, et al.
Published: (2003)
by: Abdul Karim, Nor Shahriza, et al.
Published: (2003)
Information technology: a tool for effective SME material management practices
by: Ibrahim, Magaji Umar, et al.
Published: (2019)
by: Ibrahim, Magaji Umar, et al.
Published: (2019)
Knowledge management practice in private sector: building
the way for Saudi Arabia strategic growth and transformation to knowledge-based economy
by: Gharamah, Abdulrahman, et al.
Published: (2018)
by: Gharamah, Abdulrahman, et al.
Published: (2018)
Durian Farm Threats Identification through Convolution Neural
Networks and Multimedia Mobile Development
by: Yusoff, Aiman, et al.
by: Yusoff, Aiman, et al.
An evaluation of information system success based on students’ perspective: The case of Hadramount University
by: Fadhel, Ibrahim Eskandar Ibrahim
Published: (2015)
by: Fadhel, Ibrahim Eskandar Ibrahim
Published: (2015)
Understanding components of IT risks and enterprise risk management
by: Ahlan, Abdul Rahman, et al.
Published: (2011)
by: Ahlan, Abdul Rahman, et al.
Published: (2011)
User attitude, organizational learning and dynamic capability in government-to-business success
by: Kassim, Erne Suzila, et al.
Published: (2010)
by: Kassim, Erne Suzila, et al.
Published: (2010)
Critical success factors for IS project implementation in Malaysian institutions of higher learning
by: Handayani, Dini, et al.
Published: (2010)
by: Handayani, Dini, et al.
Published: (2010)
Implementation of input-process-output model for measuring information system project success
by: Subiyakto, A'ang, et al.
Published: (2014)
by: Subiyakto, A'ang, et al.
Published: (2014)
Managers perceptions towards the success of E-performance reporting system
by: Subiyakto, A'ang, et al.
Published: (2017)
by: Subiyakto, A'ang, et al.
Published: (2017)
An alternative method for determining critical success factors of information system project
by: Subiyakto, A'ang, et al.
Published: (2014)
by: Subiyakto, A'ang, et al.
Published: (2014)
Attitude towards information privacy issues among students of IIUM
by: Mohamud, Ibrahim Kalif, et al.
Published: (2016)
by: Mohamud, Ibrahim Kalif, et al.
Published: (2016)
Malaysia National Library and knowledge management initiative
by: Yaacob, Nurul Ibtisam, et al.
Published: (2011)
by: Yaacob, Nurul Ibtisam, et al.
Published: (2011)
Producer mobility support scheme for indirection-based mobility approach in named data networking
by: Hussaini, Muktar
Published: (2020)
by: Hussaini, Muktar
Published: (2020)
Mobile user location prediction: genetic algorithm-based approach
by: Mantoro, Teddy, et al.
Published: (2010)
by: Mantoro, Teddy, et al.
Published: (2010)
Malaysia petrol subsidize authorization card system
by: Ahmad Dahlan, Abdul Rahman, et al.
Published: (2011)
by: Ahmad Dahlan, Abdul Rahman, et al.
Published: (2011)
Introducing learner infrastructural capabilities into information systems success model using e-learning
by: Atanda, Balogun Naeem, et al.
Published: (2017)
by: Atanda, Balogun Naeem, et al.
Published: (2017)
A coherent framework for understanding the success of an information system project: a revised version
by: Jaya Putra, Sopiyanshah, et al.
Published: (2016)
by: Jaya Putra, Sopiyanshah, et al.
Published: (2016)
Information and communication technology adoption among small and medium enterprises in the northern region of Malaysia
by: Mathivannan, Jaganathan
Published: (2019)
by: Mathivannan, Jaganathan
Published: (2019)
Similar Items
-
Information security aligned to enterprise management
by: Abdullah, Istikoma, et al.
Published: (2015) -
Potential use of data mining techniques in information technology consulting operations
by: Qadri, Mehran, et al.
Published: (2015) -
Comparison of Business Model Canvas (BMC) among the three consulting companies
by: Azhar Amanullah, Ayn Nur Azhana, et al.
Published: (2015) -
The knowledge management strategies used as a tool within and through strategic consulting firms to increase the organisational performance
by: Mohamed Mahmoud, Fatimetou Zahra, et al.
Published: (2015) -
Cloud computing: cloud adoption in professional practice
by: Nazri, Nadhirah, et al.
Published: (2015)