Multi-layered alert filtration and feedback cycle using Brahms model
Customer service improvement is directly related with organizational standards and productivity. Employees' activities have certain objectives to be followed but sometimes outcomes are different than expected. Human error while performing regular job activities cause sufficient losses and diffi...
| Main Authors: | Ghaffar, Abid, Wahiddin, Mohamed Ridza, Shaikh, Asadullah, Ahmad, Akhlaq |
|---|---|
| Format: | Proceeding Paper |
| Language: | English English |
| Published: |
The Institute of Electrical and Electronics Engineers, Inc.
2016
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/51273/ http://irep.iium.edu.my/51273/1/51273_Multi-layered.pdf http://irep.iium.edu.my/51273/4/51273_multi-layered_scopus.pdf |
Similar Items
Scale free network analysis of a large crowd through their
spatio-temporal activities
by: Ahmad, Akhlaq, et al.
Published: (2016)
by: Ahmad, Akhlaq, et al.
Published: (2016)
Context-aware services based on spatio-temporal zoning and crowdsourcing
by: Ahmad, Akhlaq, et al.
Published: (2018)
by: Ahmad, Akhlaq, et al.
Published: (2018)
Computer assisted alerts using mental model approach for customer service improvement
by: Ghaffar, Abid, et al.
Published: (2013)
by: Ghaffar, Abid, et al.
Published: (2013)
Evaluating the effect of using IP version and physical media on the ICMP throughput of a LAN
by: Dar, Humaira, et al.
Published: (2013)
by: Dar, Humaira, et al.
Published: (2013)
Research methodologies: a practical approach
by: Shah, Asadullah, et al.
Published: (2011)
by: Shah, Asadullah, et al.
Published: (2011)
Requirement Model for CIAC Services Feedback System (CSFS)
by: Abdulwahid, Eissa Hamood
Published: (2012)
by: Abdulwahid, Eissa Hamood
Published: (2012)
Multi-modal association learning using spike-timing dependent plasticity (STDP)
by: Ibrahim, Mohammed Fadhil
Published: (2014)
by: Ibrahim, Mohammed Fadhil
Published: (2014)
A Decentralized Multi-Factor User Authentication Scheme For The Internet Of Things System
by: Chiadighikaobi, Ikenna Rene
Published: (2024)
by: Chiadighikaobi, Ikenna Rene
Published: (2024)
Web based multi criteria decision making using AHP method
by: Al-Azab, F. G. M., et al.
Published: (2010)
by: Al-Azab, F. G. M., et al.
Published: (2010)
Web-based e-learning systems acceptance and success: a review of contributing factors from the instructors’ perception
by: Oyefolahan, Ishaq Oyebisi, et al.
Published: (2014)
by: Oyefolahan, Ishaq Oyebisi, et al.
Published: (2014)
Positive impact of smartphone application: whatsapp &
facebook for online business
by: Ibrahim, Jamaludin, et al.
Published: (2014)
by: Ibrahim, Jamaludin, et al.
Published: (2014)
Mobile Quran app security vulnerabilities
by: Talib, Shuhaili, et al.
Published: (2015)
by: Talib, Shuhaili, et al.
Published: (2015)
Information security in ICT from an Islamic
perspective
by: Ibrahim, Jamaludin, et al.
Published: (2014)
by: Ibrahim, Jamaludin, et al.
Published: (2014)
The role of IT consulting practice: a successful enterprise mobility solution
by: Fakhri, Nurul Fahimah, et al.
Published: (2015)
by: Fakhri, Nurul Fahimah, et al.
Published: (2015)
The knowledge management strategies used as a tool within and through strategic consulting firms to increase the organisational performance
by: Mohamed Mahmoud, Fatimetou Zahra, et al.
Published: (2015)
by: Mohamed Mahmoud, Fatimetou Zahra, et al.
Published: (2015)
Comparison of Business Model Canvas (BMC) among the three consulting companies
by: Azhar Amanullah, Ayn Nur Azhana, et al.
Published: (2015)
by: Azhar Amanullah, Ayn Nur Azhana, et al.
Published: (2015)
Potential use of data mining techniques in information technology consulting operations
by: Qadri, Mehran, et al.
Published: (2015)
by: Qadri, Mehran, et al.
Published: (2015)
Cloud computing: cloud adoption in professional practice
by: Nazri, Nadhirah, et al.
Published: (2015)
by: Nazri, Nadhirah, et al.
Published: (2015)
Information security aligned to enterprise management
by: Abdullah, Istikoma, et al.
Published: (2015)
by: Abdullah, Istikoma, et al.
Published: (2015)
How much privacy we still have on social network?
by: Chewae, Mafaisu, et al.
Published: (2015)
by: Chewae, Mafaisu, et al.
Published: (2015)
Enterprise information architecture of a Malaysian institute of higher learning management information system: an experience
by: Suhaimi, Mohd Adam, et al.
Published: (2014)
by: Suhaimi, Mohd Adam, et al.
Published: (2014)
Privacy concern and perceived benefits towards privacy and election in Indonesia
by: Lubis, Muharman, et al.
Published: (2014)
by: Lubis, Muharman, et al.
Published: (2014)
Steganography: a review of information security research and development in Muslim world
by: Yunus, Yunura Azura, et al.
Published: (2013)
by: Yunus, Yunura Azura, et al.
Published: (2013)
Decision to cast a vote: an ordinal regression statistical analysis
by: Lubis, Muharman, et al.
Published: (2014)
by: Lubis, Muharman, et al.
Published: (2014)
Designing persuasive application to encourage physical activity at workplace among older workers
by: Mohd Mohadis, Hazwani, et al.
Published: (2016)
by: Mohd Mohadis, Hazwani, et al.
Published: (2016)
A study of smartphone usage and barriers among the elderly
by: Mohd Mohadis, Hazwani, et al.
Published: (2014)
by: Mohd Mohadis, Hazwani, et al.
Published: (2014)
Using socio-ecological model to inform the design of persuasive applications
by: Mohd Mohadis, Hazwani, et al.
Published: (2015)
by: Mohd Mohadis, Hazwani, et al.
Published: (2015)
Motivators and barriers for physical activity in older workers: a socio-ecological exploration
by: Mohd Mohadis, Hazwani, et al.
Published: (2016)
by: Mohd Mohadis, Hazwani, et al.
Published: (2016)
Knowledge management practice in private sector: building
the way for Saudi Arabia strategic growth and transformation to knowledge-based economy
by: Gharamah, Abdulrahman, et al.
Published: (2018)
by: Gharamah, Abdulrahman, et al.
Published: (2018)
Impersonate affecting users' attitude toward facebook in Egypt
by: Hassan El Hoby, Hany Mohamed, et al.
Published: (2016)
by: Hassan El Hoby, Hany Mohamed, et al.
Published: (2016)
Attitude towards information privacy issues among students of IIUM
by: Mohamud, Ibrahim Kalif, et al.
Published: (2016)
by: Mohamud, Ibrahim Kalif, et al.
Published: (2016)
The mediating effect of teamwork toward organizational readiness for Business Intelligence (BI) implementation
by: Anjariny, Ahmed H., et al.
Published: (2016)
by: Anjariny, Ahmed H., et al.
Published: (2016)
The extreme doubly stochastic quadratic operators on two dimensional simplex
by: Abdulghafor, Rawad Abdulkhaleq Abdulmolla, et al.
Published: (2016)
by: Abdulghafor, Rawad Abdulkhaleq Abdulmolla, et al.
Published: (2016)
Evaluation of users' awareness and their reaction on information security
by: Zeki, Akram M., et al.
Published: (2016)
by: Zeki, Akram M., et al.
Published: (2016)
Web users’ knowledge and their behavior towards security threats and vulnerabilities
by: Aldossary, Alia Ahmed, et al.
Published: (2016)
by: Aldossary, Alia Ahmed, et al.
Published: (2016)
Mixed Reality CAD System
by: Abdullah, Che Zulkhairi, et al.
Published: (2015)
by: Abdullah, Che Zulkhairi, et al.
Published: (2015)
Web-based physical activity interventions for older adults: A review
by: Mohd Mohadis, Hazwani, et al.
Published: (2015)
by: Mohd Mohadis, Hazwani, et al.
Published: (2015)
i-Tube: Revolutionize the way of delivering Islamic edutainment content
by: Ahmad Dahlan, Abdul Rahman, et al.
Published: (2017)
by: Ahmad Dahlan, Abdul Rahman, et al.
Published: (2017)
Skala ketagihan internet Chen (CIAS)
by: Al-Ani, Ali Sabri Radeef, et al.
Published: (2020)
by: Al-Ani, Ali Sabri Radeef, et al.
Published: (2020)
Aplikasi-aplikasi yang digunakan sepanjang tempoh perintah kawalan pergerakan (PKP)
by: Abu Bakar, Irni Izwah
Published: (2020)
by: Abu Bakar, Irni Izwah
Published: (2020)
Similar Items
-
Scale free network analysis of a large crowd through their
spatio-temporal activities
by: Ahmad, Akhlaq, et al.
Published: (2016) -
Context-aware services based on spatio-temporal zoning and crowdsourcing
by: Ahmad, Akhlaq, et al.
Published: (2018) -
Computer assisted alerts using mental model approach for customer service improvement
by: Ghaffar, Abid, et al.
Published: (2013) -
Evaluating the effect of using IP version and physical media on the ICMP throughput of a LAN
by: Dar, Humaira, et al.
Published: (2013) -
Research methodologies: a practical approach
by: Shah, Asadullah, et al.
Published: (2011)