Challenges, alternatives, and paths to sustainability: better public health promotion using social networking pages as key tools
This paper discusses the possibility of promoting public health and implementing educational health services using Facebook. We discuss the challenges and strengths of using such a platform as a tool for public health care systems from two different perspectives, namely, the view of IT developers an...
| Main Authors: | Zaidan , A. A., Zaidan , B. B., Kadhem, Z., Moussa, Larbani, Lakulu, Modi B., Hashim, M. |
|---|---|
| Format: | Article |
| Language: | English English English |
| Published: |
Springer New York LLC
2015
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/50851/ http://irep.iium.edu.my/50851/1/50851_Challenges%2C_alternatives%2C_and_paths_to_sustainability.pdf http://irep.iium.edu.my/50851/2/50851_Challenges%2C_alternatives%2C_and_paths_to_sustainability_SCOPUS.pdf http://irep.iium.edu.my/50851/3/50851_Challenges%2C_alternatives%2C_and_paths_to_sustainability_WOS.pdf |
Similar Items
New system for secure cover file of hidden data in the image page within executable file using statistical Steganography Techniques
by: Islam, Md. Rafiqul, et al.
Published: (2009)
by: Islam, Md. Rafiqul, et al.
Published: (2009)
Knowledge management system framework for collaborative open source software development
by: Lakulu, Modi
Published: (2012)
by: Lakulu, Modi
Published: (2012)
On the multi-agent learning neural and Bayesian methods in skin detector and pornography classifier: an automated anti-pornography system
by: Zaidan , A. A., et al.
Published: (2014)
by: Zaidan , A. A., et al.
Published: (2014)
Challenges of hidden data in the unused area two within executable files
by: Naji, Ahmed Wathik, et al.
Published: (2009)
by: Naji, Ahmed Wathik, et al.
Published: (2009)
Securing peer-to-peer mobile communications using
public key cryptography: new security strategy
by: Al- Bakri, S.H., et al.
Published: (2011)
by: Al- Bakri, S.H., et al.
Published: (2011)
Image skin segmentation based on multi-agent learning Bayesian and neural network
by: Zaidan, A. A., et al.
Published: (2014)
by: Zaidan, A. A., et al.
Published: (2014)
Suitability of using symmetric key to secure multimedia data: an overview,
by: Abomhara, Mohamed, et al.
Published: (2010)
by: Abomhara, Mohamed, et al.
Published: (2010)
Review of intrusion detection systems based on deep learning techniques: coherent taxonomy, challenges, motivations, recommendations, substantial analysis and future directions
by: A. M., Aleesa, et al.
Published: (2020)
by: A. M., Aleesa, et al.
Published: (2020)
Review of intrusion detection systems based on deep learning
techniques: coherent taxonomy, challenges, motivations,
recommendations, substantial analysis and future directions
by: Aleesa, A. M., et al.
Published: (2004)
by: Aleesa, A. M., et al.
Published: (2004)
Better grades for two key subjects
by: Pfordten, Diyana, et al.
Published: (2024)
by: Pfordten, Diyana, et al.
Published: (2024)
أزمة الأموال غير الحقيقية
هل من بديل إسلامي قابل للتطبيق؟ = Non-real money crisis: an Islamic alternative
by: Nasser, Youcef, et al.
Published: (2013)
by: Nasser, Youcef, et al.
Published: (2013)
Developing collaborative system for open source software development community.
by: Lakulu, Modi, et al.
Published: (2012)
by: Lakulu, Modi, et al.
Published: (2012)
Modeling and querying alternative paths in Kuantan
by: Mohamad Salleh, Mazlina
Published: (2007)
by: Mohamad Salleh, Mazlina
Published: (2007)
Decision making tools for resource allocation based on Maqasid Al- Shariah
by: Moussa, Larbani, et al.
Published: (2011)
by: Moussa, Larbani, et al.
Published: (2011)
Decision making tools for resource allocation
based on Maqid Al- Sharah
by: Larbani, Moussa, et al.
Published: (2011)
by: Larbani, Moussa, et al.
Published: (2011)
Evaluating local first page university site using 'U' tool
by: Abd Aziz, Zalilah
Published: (2003)
by: Abd Aziz, Zalilah
Published: (2003)
A Convolutional Neural Network (CNN) Classification Model for Web Page: A Tool for Improving Web Page Category Detection Accuracy
by: Siti Hawa, Apandi, et al.
Published: (2023)
by: Siti Hawa, Apandi, et al.
Published: (2023)
Develpoment of combinatorial optimisation for cutting tool path strategy
by: Alsultaney, Hazem K., et al.
Published: (2009)
by: Alsultaney, Hazem K., et al.
Published: (2009)
Review of the research landscape of multi-criteria evaluation and bench- marking processes for many-objective optimisation methods: coherent taxonomy, challenges and recommended solution
by: Mohammed, R. T., et al.
Published: (2020)
by: Mohammed, R. T., et al.
Published: (2020)
On multi-agent learning neural and Bayesian methods in skin detector and pornography classifier: an automated anti-pornography system
by: Zaidan, Aws Alaa, et al.
Published: (2014)
by: Zaidan, Aws Alaa, et al.
Published: (2014)
Key Success and Failure Paths in Fashion Marketing Strategies
by: Woodside, Arch
Published: (2010)
by: Woodside, Arch
Published: (2010)
Wonderful solutions and habitual domains for challenging problems in changeable spaces: from theoretical framework to applications
by: Larbani, Moussa, et al.
Published: (2016)
by: Larbani, Moussa, et al.
Published: (2016)
Using affinity set on finding the key attributes of delayed diagnosis
by: Larbani, Moussa, et al.
Published: (2009)
by: Larbani, Moussa, et al.
Published: (2009)
Image skin segmentation based on multi-agent learning Bayesian and neural network
by: Aos Alaa, Zaidan, et al.
Published: (2014)
by: Aos Alaa, Zaidan, et al.
Published: (2014)
Assessing the costs of alternative development paths in Australian cities.
by: Newman, Peter, et al.
Published: (2009)
by: Newman, Peter, et al.
Published: (2009)
Optimizing security and flexibility by designing a high security system for e-government servers
by: Abdul Talib, Yurita Yakimin, et al.
Published: (2009)
by: Abdul Talib, Yurita Yakimin, et al.
Published: (2009)
The Key Factors of Critical Path Method in Manufacturing Industry Project
by: Dg Mohd Al Hafidz Bin Ishak,
Published: (2021)
by: Dg Mohd Al Hafidz Bin Ishak,
Published: (2021)
Analysis for McEliece and Niederreiter Encryptions: An Alternative to Public Key Encryption
by: Chaw, Lian Foong
Published: (2018)
by: Chaw, Lian Foong
Published: (2018)
An experimental validation and optimisation tool path strategy for thin walled structure
by: Alsultaney, Hazem K., et al.
Published: (2011)
by: Alsultaney, Hazem K., et al.
Published: (2011)
Novel framework for hidden data in the image page within
executable file using computation between advanced encryption standard and distortion techniques
by: Naji, Ahmed Wathik, et al.
Published: (2009)
by: Naji, Ahmed Wathik, et al.
Published: (2009)
Marketing Communication on Facebook Pages: How Are Facebook Pages Facilitating Marketing Communications?
by: Khin, Aung Chit
Published: (2009)
by: Khin, Aung Chit
Published: (2009)
Novel simulation framework of three-dimensional skull bio-metric measurement
by: Hameed, Shihab A., et al.
Published: (2009)
by: Hameed, Shihab A., et al.
Published: (2009)
Taxes to Promote Alternative Energy
by: Pearce, Prafula
Published: (2017)
by: Pearce, Prafula
Published: (2017)
Multiobjective problems with fuzzy parameters and games against nature
by: Larbani, Moussa
Published: (2010)
by: Larbani, Moussa
Published: (2010)
Solving bimatrix games with fuzzy payoffs by introducing Nature as a third player
by: Larbani, Moussa
Published: (2009)
by: Larbani, Moussa
Published: (2009)
A Laplace's principle based approach for solving fuzzy matrix games
by: Larbani, Moussa
Published: (2010)
by: Larbani, Moussa
Published: (2010)
Non cooperative fuzzy games in normal form: a survey
by: Larbani, Moussa
Published: (2009)
by: Larbani, Moussa
Published: (2009)
A study on the performance of students of the kulliyyah of economics and management sciences in quantitative subjects
by: Larbani, Moussa
Published: (2012)
by: Larbani, Moussa
Published: (2012)
Teachers’ perceptions of the organisational climate: a tool for promoting instructional improvement
by: Aldridge, Jill, et al.
Published: (2017)
by: Aldridge, Jill, et al.
Published: (2017)
Security improvement of credit card online purchasing system
by: Naji, Ahmed Wathik, et al.
Published: (2011)
by: Naji, Ahmed Wathik, et al.
Published: (2011)
Similar Items
-
New system for secure cover file of hidden data in the image page within executable file using statistical Steganography Techniques
by: Islam, Md. Rafiqul, et al.
Published: (2009) -
Knowledge management system framework for collaborative open source software development
by: Lakulu, Modi
Published: (2012) -
On the multi-agent learning neural and Bayesian methods in skin detector and pornography classifier: an automated anti-pornography system
by: Zaidan , A. A., et al.
Published: (2014) -
Challenges of hidden data in the unused area two within executable files
by: Naji, Ahmed Wathik, et al.
Published: (2009) -
Securing peer-to-peer mobile communications using
public key cryptography: new security strategy
by: Al- Bakri, S.H., et al.
Published: (2011)