Potential use of data mining techniques in information technology consulting operations
The concept of data mining has been around for a while now. It is a process of extraction of useful patterns and information from huge data sets. Many tools and techniques have been developed to make use of the data mining concept in various industries. However before implem...
| Main Authors: | Qadri, Mehran, Ahmad, Zubair, Ibrahim, Jamaludin |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
IJSRP.ORG
2015
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/45399/ http://irep.iium.edu.my/45399/1/2015-Potential_Use_of_Data_Mining_Techniques_in_Information_.pdf |
Similar Items
The role of IT consulting practice: a successful enterprise mobility solution
by: Fakhri, Nurul Fahimah, et al.
Published: (2015)
by: Fakhri, Nurul Fahimah, et al.
Published: (2015)
Comparison of Business Model Canvas (BMC) among the three consulting companies
by: Azhar Amanullah, Ayn Nur Azhana, et al.
Published: (2015)
by: Azhar Amanullah, Ayn Nur Azhana, et al.
Published: (2015)
The knowledge management strategies used as a tool within and through strategic consulting firms to increase the organisational performance
by: Mohamed Mahmoud, Fatimetou Zahra, et al.
Published: (2015)
by: Mohamed Mahmoud, Fatimetou Zahra, et al.
Published: (2015)
Information technology issues and applications in Malaysia : a collection of articles.
Published: (2011)
Published: (2011)
The inclination of Information and Communication Technology (ICT) students towards entrepreneurship
by: Mior Nazri, Mior Nasir, et al.
Published: (2014)
by: Mior Nazri, Mior Nasir, et al.
Published: (2014)
Information security aligned to enterprise management
by: Abdullah, Istikoma, et al.
Published: (2015)
by: Abdullah, Istikoma, et al.
Published: (2015)
In search of a model to explain digital divide in information technology organizations
by: Mohamed, Norshidah, et al.
Published: (2009)
by: Mohamed, Norshidah, et al.
Published: (2009)
Information security in ICT from an Islamic
perspective
by: Ibrahim, Jamaludin, et al.
Published: (2014)
by: Ibrahim, Jamaludin, et al.
Published: (2014)
Steganography: a review of information security research and development in Muslim world
by: Yunus, Yunura Azura, et al.
Published: (2013)
by: Yunus, Yunura Azura, et al.
Published: (2013)
Information technology: a tool for effective SME material management practices
by: Ibrahim, Magaji Umar, et al.
Published: (2019)
by: Ibrahim, Magaji Umar, et al.
Published: (2019)
Impact of NSA-PRISM to National Information Security
Strategy & Policy
by: Khudayer, Aiesha Y., et al.
Published: (2014)
by: Khudayer, Aiesha Y., et al.
Published: (2014)
Employing information security awareness to minimize over-exposure of average Internet user on social networks
by: Binden, Worawit, et al.
Published: (2014)
by: Binden, Worawit, et al.
Published: (2014)
Is disclosure of information technology (IT) internal control weaknesses worthwhile for firms?
by: Kusumaningtias, Rohmawati, et al.
Published: (2020)
by: Kusumaningtias, Rohmawati, et al.
Published: (2020)
Information technology club management system
by: Ibrahim, Mohd Shukri, et al.
Published: (2018)
by: Ibrahim, Mohd Shukri, et al.
Published: (2018)
Attitude towards information privacy issues among students of IIUM
by: Mohamud, Ibrahim Kalif, et al.
Published: (2016)
by: Mohamud, Ibrahim Kalif, et al.
Published: (2016)
A study of feature exraction techniques for classifying topics and sentiments from news posts
by: Al-Dyani, Wafa Zubair Abdullah
Published: (2014)
by: Al-Dyani, Wafa Zubair Abdullah
Published: (2014)
The extreme doubly stochastic quadratic operators on two dimensional simplex
by: Abdulghafor, Rawad Abdulkhaleq Abdulmolla, et al.
Published: (2016)
by: Abdulghafor, Rawad Abdulkhaleq Abdulmolla, et al.
Published: (2016)
Enterprise information architecture of a Malaysian institute of higher learning management information system: an experience
by: Suhaimi, Mohd Adam, et al.
Published: (2014)
by: Suhaimi, Mohd Adam, et al.
Published: (2014)
Managers' perception of Information Management (IM) and Knowledge Management (KM) and the role of information and knowledge managers
by: Abdul Karim, Nor Shahriza, et al.
Published: (2003)
by: Abdul Karim, Nor Shahriza, et al.
Published: (2003)
Evaluation of users' awareness and their reaction on information security
by: Zeki, Akram M., et al.
Published: (2016)
by: Zeki, Akram M., et al.
Published: (2016)
Collaboration, communities, well-beings and information systems
Published: (2011)
Published: (2011)
Technology and foreign language learning and teaching
Published: (2012)
Published: (2012)
Cloud computing: cloud adoption in professional practice
by: Nazri, Nadhirah, et al.
Published: (2015)
by: Nazri, Nadhirah, et al.
Published: (2015)
Using socio-ecological model to inform the design of persuasive applications
by: Mohd Mohadis, Hazwani, et al.
Published: (2015)
by: Mohd Mohadis, Hazwani, et al.
Published: (2015)
Information technology and government-to business: what are the values derived?
by: Kassim, Erne Suzila, et al.
Published: (2010)
by: Kassim, Erne Suzila, et al.
Published: (2010)
Seeking access to health information: the dilemma of woman community in rural Malaysia
by: Abu Bakar, Ahmad Bakeri, et al.
Published: (2009)
by: Abu Bakar, Ahmad Bakeri, et al.
Published: (2009)
The current state of information management and knowledge management in the Malaysian construction industry
by: Noordin, Mohamad Fauzan, et al.
Published: (2012)
by: Noordin, Mohamad Fauzan, et al.
Published: (2012)
Real time information sharing and remote sensing for disaster management and prevention
by: Ahmad Dahlan, Abdul Rahman, et al.
Published: (2011)
by: Ahmad Dahlan, Abdul Rahman, et al.
Published: (2011)
An information retrieval system for Quranic texts: a proposed system design
by: Noordin, Mohamad Fauzan, et al.
Published: (2006)
by: Noordin, Mohamad Fauzan, et al.
Published: (2006)
Assessing audience response systems using task-technology fit
by: Mantikayan, Jonathan Mamangkiang, et al.
Published: (2013)
by: Mantikayan, Jonathan Mamangkiang, et al.
Published: (2013)
How much privacy we still have on social network?
by: Chewae, Mafaisu, et al.
Published: (2015)
by: Chewae, Mafaisu, et al.
Published: (2015)
Encouraging knowledge sharing using web 2.0 technologies in higher education: a survey
by: Oyefolahan, Ishaq Oyebisi
Published: (2014)
by: Oyefolahan, Ishaq Oyebisi
Published: (2014)
The evaluation of information security of hospital information system (his) using cobit 5 framework: case study at Soreang Hospital, Indonesia
by: Nistrina, Khilda
Published: (2019)
by: Nistrina, Khilda
Published: (2019)
A confirmatory factor analysis of the information technology governance effectiveness: evidence from Malaysia
by: Jasber, Kaur, et al.
Published: (2011)
by: Jasber, Kaur, et al.
Published: (2011)
AGW 616 - MANAGEMENT INFORMATION SYSTEM APRIL 08.
by: PPP, Pusat Pengajian Pengurusan
Published: (2008)
by: PPP, Pusat Pengajian Pengurusan
Published: (2008)
Positive impact of smartphone application: whatsapp &
facebook for online business
by: Ibrahim, Jamaludin, et al.
Published: (2014)
by: Ibrahim, Jamaludin, et al.
Published: (2014)
Weather Information System for Farmers Based on WAP Technology
by: Abolohom, Abdullatif Abdullah Ahmed
Published: (2009)
by: Abolohom, Abdullatif Abdullah Ahmed
Published: (2009)
The relationship between innovation and information technology on organizational performance
by: Noor Azinuddin, Ahmad
Published: (2015)
by: Noor Azinuddin, Ahmad
Published: (2015)
The Determinants of Information Technology Audit in Iraq Listed Companies
by: Karim, Haitham M
Published: (2011)
by: Karim, Haitham M
Published: (2011)
Data redundancy reduction scheme for data aggregation in wireless sensor network
by: Adawy, Mohammad Ibrahim
Published: (2020)
by: Adawy, Mohammad Ibrahim
Published: (2020)
Similar Items
-
The role of IT consulting practice: a successful enterprise mobility solution
by: Fakhri, Nurul Fahimah, et al.
Published: (2015) -
Comparison of Business Model Canvas (BMC) among the three consulting companies
by: Azhar Amanullah, Ayn Nur Azhana, et al.
Published: (2015) -
The knowledge management strategies used as a tool within and through strategic consulting firms to increase the organisational performance
by: Mohamed Mahmoud, Fatimetou Zahra, et al.
Published: (2015) -
Information technology issues and applications in Malaysia : a collection of articles.
Published: (2011) -
The inclination of Information and Communication Technology (ICT) students towards entrepreneurship
by: Mior Nazri, Mior Nasir, et al.
Published: (2014)