Approach for successful knowledge management system deployment for organizations
Globalization and rivalries are the fundamental two difficulties confronting firms who are attempting to support their prosperity or even to remain in the market. Subsequently; interests in technology, process and people wind up plainly important for the association to guarantee to have fancied offe...
| Main Authors: | Gharamah, Abdulrahman, Noordin, Mohamad Fauzan, Imtiaz Ali, Najma, Brohi, Imtiaz Ali |
|---|---|
| Format: | Article |
| Language: | English English |
| Published: |
Science Publishing Corporation Inc
2018
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/64563/ http://irep.iium.edu.my/64563/1/64563_Approach%20for%20Successful%20Knowledge%20Management.pdf http://irep.iium.edu.my/64563/2/64563_Approach%20for%20Successful%20Knowledge%20Management_SCOPUS.pdf |
Similar Items
Preliminary study for customer’s online shopping satisfaction from security perspective
by: Imtiaz Ali, Najma, et al.
Published: (2018)
by: Imtiaz Ali, Najma, et al.
Published: (2018)
Online shopping satisfaction in Malaysia: A framework for security, trust and cybercrime
by: Imtiaz Ali, Najma, et al.
Published: (2016)
by: Imtiaz Ali, Najma, et al.
Published: (2016)
Near field communication enabled mobile payments: preliminary study
by: Brohi, Imtiaz Ali, et al.
Published: (2018)
by: Brohi, Imtiaz Ali, et al.
Published: (2018)
An assessment of proximity technology adoption from a user's perspective
by: Brohi, Imtiaz Ali, et al.
Published: (2018)
by: Brohi, Imtiaz Ali, et al.
Published: (2018)
Health information system (HMS) in Malaysia
by: Ujan, Imran Anwar, et al.
Published: (2018)
by: Ujan, Imran Anwar, et al.
Published: (2018)
Comparison between NFC/RFID and bar code system for halal tags identification: Paired sample t-test evaluation
by: Khosravi, Mohsen, et al.
Published: (2018)
by: Khosravi, Mohsen, et al.
Published: (2018)
Unstructured source artifacts ontology for requirement validation in GDSD
by: Altaf, Sohaib, et al.
Published: (2018)
by: Altaf, Sohaib, et al.
Published: (2018)
Visualization representation benefits of pre-requirement specification tractability
by: Altaf, Sohaib, et al.
Published: (2018)
by: Altaf, Sohaib, et al.
Published: (2018)
A hybrid method using kinect depth and color data stream for hand blobs segmentation
by: Karbasi, Mostafa, et al.
Published: (2017)
by: Karbasi, Mostafa, et al.
Published: (2017)
A review of near field communication process: how do it works?
by: Brohi, Imtiaz Ali, et al.
Published: (2018)
by: Brohi, Imtiaz Ali, et al.
Published: (2018)
Deployment of new dynamic cryptography buffer for SCADA security enhancement
by: Aamir, Shahzad, et al.
Published: (2014)
by: Aamir, Shahzad, et al.
Published: (2014)
Deployment of social nets in multi-layer model to identify Key individuals using majority voting
by: Shah, Asadullah
Published: (2019)
by: Shah, Asadullah
Published: (2019)
Improving the quality of user experience by deploying an open access network framework in a Fiber-To-The Home environment in Malaysia
by: Ismail, Zahid, et al.
Published: (2011)
by: Ismail, Zahid, et al.
Published: (2011)
Integration social media technology and ethical collaborative learning
by: Ataie, Fariba, et al.
Published: (2018)
by: Ataie, Fariba, et al.
Published: (2018)
An innovative Web 2.0-Based collaborative learning framework: activities for the initial development of social negotiation competencies
by: Ataie, Farib, et al.
Published: (2018)
by: Ataie, Farib, et al.
Published: (2018)
Cyber risk management for wireless communication in organization
by: Mutakin, Darul, et al.
Published: (2016)
by: Mutakin, Darul, et al.
Published: (2016)
Modelling the relationship between intelligence, knowledge management and innovation among knowledge workers in Malaysia
by: Abd Karim, Zulkarnain, et al.
Published: (2017)
by: Abd Karim, Zulkarnain, et al.
Published: (2017)
Analysis determinants of social media acceptance in higher educational institution of Pakistan
by: Raza, Ali, et al.
Published: (2018)
by: Raza, Ali, et al.
Published: (2018)
SmartCrowd: novel approach to big crowd management using mobile cloud computing
by: Ali, Mohammed Fazil, et al.
Published: (2015)
by: Ali, Mohammed Fazil, et al.
Published: (2015)
Barriers effecting successful implementation of E-learning in Saudi Arabian universities
by: Naveed, Quadri Noorulhasan, et al.
Published: (2017)
by: Naveed, Quadri Noorulhasan, et al.
Published: (2017)
Social media and knowledge management disruptive technology
by: Noordin, Mohamad Fauzan, et al.
Published: (2018)
by: Noordin, Mohamad Fauzan, et al.
Published: (2018)
The adoption of Knowledge Management Systems (KMS) among academicians in Nigeria universities
by: Salami, Ahmed, et al.
Published: (2019)
by: Salami, Ahmed, et al.
Published: (2019)
Information security for professional counseling in organization
by: Mohamed, Abdikadir Yusuf, et al.
Published: (2016)
by: Mohamed, Abdikadir Yusuf, et al.
Published: (2016)
Critical infrastructure protection of ICT in Muslim world
by: Abdulrahman Ali, Sami Mohammed, et al.
Published: (2016)
by: Abdulrahman Ali, Sami Mohammed, et al.
Published: (2016)
Evaluation of nested network mobility approaches
by: Ali Mohammed, Mohammed Babiker, et al.
Published: (2014)
by: Ali Mohammed, Mohammed Babiker, et al.
Published: (2014)
Knowledge management practice in private sector: building
the way for Saudi Arabia strategic growth and transformation to knowledge-based economy
by: Gharamah, Abdulrahman, et al.
Published: (2018)
by: Gharamah, Abdulrahman, et al.
Published: (2018)
Adopting a knowledge management concept in securing the privacy of electronic medical record systems
by: Samsuri, Suhaila, et al.
Published: (2013)
by: Samsuri, Suhaila, et al.
Published: (2013)
A review of programming code assessment approaches
by: Ul Qayyum, Noor, et al.
Published: (2019)
by: Ul Qayyum, Noor, et al.
Published: (2019)
Green computing knowledge among students in a Ugandan university
by: Semakula, Isa, et al.
Published: (2016)
by: Semakula, Isa, et al.
Published: (2016)
Web user' knowledge and their behavior towards security threats and vulnerabilities
by: Aldossary, Alia Ahmed, et al.
Published: (2016)
by: Aldossary, Alia Ahmed, et al.
Published: (2016)
Netnography approach for UX research
by: Hussein, Idyawati, et al.
Published: (2016)
by: Hussein, Idyawati, et al.
Published: (2016)
A comparative review of ISMS implementation based on ISO 27000 Series in organizations of different business sectors
by: Hamdi, Zaidatulnajla, et al.
Published: (2019)
by: Hamdi, Zaidatulnajla, et al.
Published: (2019)
Transitional approaches for PERN migration to SDN
by: Abdul Rahman, Abdul Malik, et al.
Published: (2016)
by: Abdul Rahman, Abdul Malik, et al.
Published: (2016)
Differential image compression for telemedicine: a novel approach
by: Khan, Adnan Alam, et al.
Published: (2011)
by: Khan, Adnan Alam, et al.
Published: (2011)
Visualization of job availability based on text analytics localization approach
by: Mohamad Zamani, Nur Azmina, et al.
Published: (2019)
by: Mohamad Zamani, Nur Azmina, et al.
Published: (2019)
Factors influence novice programmers toward test first approach
by: Yahya, Norzariyah, et al.
Published: (2019)
by: Yahya, Norzariyah, et al.
Published: (2019)
Innovative Web2.0 based collaborative learning and study circle model: integrating Islamic Revealed Knowledge and Human Science
by: Shah, Asadullah
Published: (2014)
by: Shah, Asadullah
Published: (2014)
Behaviour visualization for malicious-attacker node collusion in MANET based on probabilistic approach
by: Olanrewaju, Rashidah Funke, et al.
Published: (2015)
by: Olanrewaju, Rashidah Funke, et al.
Published: (2015)
Metaheuristic approaches for gateway placement optimization in wireless mesh networks: a survey
by: M. Ahmed, Awadallah, et al.
Published: (2014)
by: M. Ahmed, Awadallah, et al.
Published: (2014)
Thermal imaging-based human emotion detection: GLCM feature extraction approach
by: Md Yusof, Hazlina
Published: (2015)
by: Md Yusof, Hazlina
Published: (2015)
Similar Items
-
Preliminary study for customer’s online shopping satisfaction from security perspective
by: Imtiaz Ali, Najma, et al.
Published: (2018) -
Online shopping satisfaction in Malaysia: A framework for security, trust and cybercrime
by: Imtiaz Ali, Najma, et al.
Published: (2016) -
Near field communication enabled mobile payments: preliminary study
by: Brohi, Imtiaz Ali, et al.
Published: (2018) -
An assessment of proximity technology adoption from a user's perspective
by: Brohi, Imtiaz Ali, et al.
Published: (2018) -
Health information system (HMS) in Malaysia
by: Ujan, Imran Anwar, et al.
Published: (2018)