User awareness in the authenticity of mobile Quran apps
Reading Quran has been made easy with the advancement of Mobile Technology. People may have a digital copy of the Holy Quran on their mobile devices. They may read the Quran at their conveniences through smartphones and tablets. Many Mobile Quran Applications (Apps) are available to be downloaded an...
| Main Authors: | Talib, Shuhaili, Abubakar, Adamu, Mahmud, Murni |
|---|---|
| Format: | Proceeding Paper |
| Language: | English English |
| Published: |
2016
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/50103/ http://irep.iium.edu.my/50103/1/Users_Awareness_on_the_Authenticity_of_Mobile_Quran_Apps.doc http://irep.iium.edu.my/50103/2/Buku%20Program%20SAHIH%202016%20%281%29.pdf |
Similar Items
Information security awareness through the use of social media
by: Abdul Molok, Nurul Nuha, et al.
Published: (2015)
by: Abdul Molok, Nurul Nuha, et al.
Published: (2015)
Empirical investigation of the factors influencing the usage mobile government services: case study of Saudi Arabia
by: Zamzami, Ikhlas, et al.
Published: (2016)
by: Zamzami, Ikhlas, et al.
Published: (2016)
Measuring usability of electronic Quran mobile application in pervasive computing environments: user profiling
by: Abd Ghani, Nur Nina Syazwani, et al.
Published: (2017)
by: Abd Ghani, Nur Nina Syazwani, et al.
Published: (2017)
The most favourable mobile messaging apps
among IIUM students
by: Azhar Amanullah, Ayn Nur Azhana, et al.
Published: (2014)
by: Azhar Amanullah, Ayn Nur Azhana, et al.
Published: (2014)
Taxonomies of User Experience (UX) evaluation methods
by: Sugu, Rajeshkumar, et al.
Published: (2013)
by: Sugu, Rajeshkumar, et al.
Published: (2013)
Toward user awareness and acceptance of Sudan E-government: adoption and security perspective
by: Khalifa, Othman Omran, et al.
Published: (2016)
by: Khalifa, Othman Omran, et al.
Published: (2016)
Social networks privacy policy awareness among undergraduate students: the case of Twitter
by: Talib, Shuhaili, et al.
Published: (2014)
by: Talib, Shuhaili, et al.
Published: (2014)
Mobile online services and measuring user satisfaction: study of Kuwait
by: Shah, Asadullah, et al.
Published: (2015)
by: Shah, Asadullah, et al.
Published: (2015)
Critical socio-technical issues surrounding mobile computing
by: Mohamed, Norshidah, et al.
Published: (2016)
by: Mohamed, Norshidah, et al.
Published: (2016)
The semantics in GPS based mobile applications for blind users navigation outdoor
by: Akbar, Israh, et al.
Published: (2019)
by: Akbar, Israh, et al.
Published: (2019)
User experience in mobile application design: utility defined context of use
by: Lubis, Muharman, et al.
Published: (2019)
by: Lubis, Muharman, et al.
Published: (2019)
Exploring a 'plug and play' smart home system for mobile user
by: Mantoro, Teddy, et al.
Published: (2012)
by: Mantoro, Teddy, et al.
Published: (2012)
Context related rich information delivery to mobile users using smart posters
by: Ayu, Media Anugerah
Published: (2012)
by: Ayu, Media Anugerah
Published: (2012)
EloPSO: energy aware elephant swarm optimization for mobile adhoc networks
by: Khan , Burhan ul Islam, et al.
Published: (2014)
by: Khan , Burhan ul Islam, et al.
Published: (2014)
Evaluation of university teaching hospital websites in Nigeria
by: Mahmud, Murni, et al.
Published: (2013)
by: Mahmud, Murni, et al.
Published: (2013)
A secure authentication scheme for bluetooth connection
by: Diallo, Alhassane Saliou, et al.
Published: (2014)
by: Diallo, Alhassane Saliou, et al.
Published: (2014)
A watermarking authentication system for medical images
by: Zeki, Akram M., et al.
Published: (2011)
by: Zeki, Akram M., et al.
Published: (2011)
An empirical investigation of factors influencing user satisfaction with online services of mobile communication providers: study of Kuwait
by: Alzabi, Tami, et al.
Published: (2015)
by: Alzabi, Tami, et al.
Published: (2015)
Exploring the factors influencing top management involvement and participation in information security
by: Abdul Munir, Rufizah, et al.
Published: (2017)
by: Abdul Munir, Rufizah, et al.
Published: (2017)
Features of Islamic websites, perceptions of Muslim users and utilization behavior: a conceptual model
by: Aliyu, Mansur, et al.
Published: (2016)
by: Aliyu, Mansur, et al.
Published: (2016)
Issues and security measures of mobile banking apps
by: Hayikader, Sameer, et al.
Published: (2016)
by: Hayikader, Sameer, et al.
Published: (2016)
An analysis of information security awareness within home and work environments
by: Talib, Shuhaili, et al.
Published: (2010)
by: Talib, Shuhaili, et al.
Published: (2010)
Mobility issues in hierarchical mobile IP
by: Hassan Abdalla Hashim, Aisha, et al.
Published: (2005)
by: Hassan Abdalla Hashim, Aisha, et al.
Published: (2005)
Identification of valued users to generate more telecom filigence
by: Khan, N., et al.
Published: (2018)
by: Khan, N., et al.
Published: (2018)
Implementation of server virualization to build energy efficient data centers
by: Uddin, Mueen, et al.
Published: (2014)
by: Uddin, Mueen, et al.
Published: (2014)
Web user' knowledge and their behavior towards security threats and vulnerabilities
by: Aldossary, Alia Ahmed, et al.
Published: (2016)
by: Aldossary, Alia Ahmed, et al.
Published: (2016)
An assessment of proximity technology adoption from a user's perspective
by: Brohi, Imtiaz Ali, et al.
Published: (2018)
by: Brohi, Imtiaz Ali, et al.
Published: (2018)
Netnography approach for UX research
by: Hussein, Idyawati, et al.
Published: (2016)
by: Hussein, Idyawati, et al.
Published: (2016)
Citizen experience towards humanizing digital government: a case in Malaysia
by: Hussein, Idyawati, et al.
Published: (2017)
by: Hussein, Idyawati, et al.
Published: (2017)
Perception analysis of social networks’ privacy policy: Instagram as a case study
by: Talib, Shuhaili, et al.
Published: (2014)
by: Talib, Shuhaili, et al.
Published: (2014)
Modeling user’s trust in M-commerce acceptance: A conceptual framework in context of Pakistan
by: Rind, M Malook, et al.
Published: (2016)
by: Rind, M Malook, et al.
Published: (2016)
Evaluation of nested network mobility approaches
by: Ali Mohammed, Mohammed Babiker, et al.
Published: (2014)
by: Ali Mohammed, Mohammed Babiker, et al.
Published: (2014)
Mobile security and privacy in smartphone technology
by: Ibrahim, Mohamed, et al.
Published: (2015)
by: Ibrahim, Mohamed, et al.
Published: (2015)
Measurable reliability dimensions for Islamic websites
by: Nassr, Rasheed, et al.
Published: (2013)
by: Nassr, Rasheed, et al.
Published: (2013)
Performance study of intra-domain mobility management
by: Rusli, Nazreen, et al.
Published: (2005)
by: Rusli, Nazreen, et al.
Published: (2005)
Consumers' perceptions towards mobile halal application system
by: Abu Bakar, Elistina, et al.
Published: (2014)
by: Abu Bakar, Elistina, et al.
Published: (2014)
Improving the quality of user experience by deploying an open access network framework in a Fiber-To-The Home environment in Malaysia
by: Ismail, Zahid, et al.
Published: (2011)
by: Ismail, Zahid, et al.
Published: (2011)
Randomized text encryption: a new dimension in cryptography
by: Memon, Jamshed, et al.
Published: (2014)
by: Memon, Jamshed, et al.
Published: (2014)
Evaluation of an enhanced scheme for high-level nested network mobility
by: Ali Mohammed, Mohammed Babiker, et al.
Published: (2015)
by: Ali Mohammed, Mohammed Babiker, et al.
Published: (2015)
Near field communication enabled mobile payments: preliminary study
by: Brohi, Imtiaz Ali, et al.
Published: (2018)
by: Brohi, Imtiaz Ali, et al.
Published: (2018)
Similar Items
-
Information security awareness through the use of social media
by: Abdul Molok, Nurul Nuha, et al.
Published: (2015) -
Empirical investigation of the factors influencing the usage mobile government services: case study of Saudi Arabia
by: Zamzami, Ikhlas, et al.
Published: (2016) -
Measuring usability of electronic Quran mobile application in pervasive computing environments: user profiling
by: Abd Ghani, Nur Nina Syazwani, et al.
Published: (2017) -
The most favourable mobile messaging apps
among IIUM students
by: Azhar Amanullah, Ayn Nur Azhana, et al.
Published: (2014) -
Taxonomies of User Experience (UX) evaluation methods
by: Sugu, Rajeshkumar, et al.
Published: (2013)