The effect of web-based social networking on consultancy
Social networking has become a fact that we cannot live without even if we try. It has become a day to day activity or even yet a chore. Where we share our life experiences. We have all become its slave! Social networks bring many benefits to the user and the world at large. These advantages from an...
| Main Authors: | Shaikh, Humaiz, Maher, Zulfikar Ahmad, Raza, Ali, Abdullah, Mirza Manirajah, Shah, Asadullah |
|---|---|
| Format: | Proceeding Paper |
| Language: | English English English |
| Published: |
Institute of Electrical and Electronics Engineers Inc.
2019
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/68557/ http://irep.iium.edu.my/68557/1/68557_The%20effect%20of%20web-based%20social%20networking.pdf http://irep.iium.edu.my/68557/2/68557_The%20effect%20of%20web-based%20social%20networking_SCOPUS.pdf http://irep.iium.edu.my/68557/3/68557_The%20effect%20of%20web-based%20social%20networking_WOS.pdf |
Similar Items
Beyond traditional audits: the implications of information technology on auditing
by: Shaikh, Humaiz, et al.
Published: (2018)
by: Shaikh, Humaiz, et al.
Published: (2018)
Factors affecting secure software development practices among developers- an investigation
by: Ahmed Maher, Zulfikar, et al.
Published: (2019)
by: Ahmed Maher, Zulfikar, et al.
Published: (2019)
A conceptual framework for determining acceptance of Internet of Things (IoT) in higher education institutions of Pakistan
by: Shaikh, Humaiz, et al.
Published: (2019)
by: Shaikh, Humaiz, et al.
Published: (2019)
A methodology for modelling and analysis of secure systems using security patterns and mitigation use cases
by: Maher, Zulfikar Ahmad, et al.
Published: (2018)
by: Maher, Zulfikar Ahmad, et al.
Published: (2018)
A review on optimization of vehicle frontal crashworthiness
for passenger safety
by: Ahmed Khatri, Naveed, et al.
Published: (2018)
by: Ahmed Khatri, Naveed, et al.
Published: (2018)
A conceptual framework for measuring acceptance of
contactless payment methods
by: Raza, Ali, et al.
Published: (2019)
by: Raza, Ali, et al.
Published: (2019)
A review of near field communication process: how do it works?
by: Brohi, Imtiaz Ali, et al.
Published: (2018)
by: Brohi, Imtiaz Ali, et al.
Published: (2018)
Relation mining using cross correlation of multi domain social networks
by: Noor, Fozia, et al.
Published: (2015)
by: Noor, Fozia, et al.
Published: (2015)
Predicting the fraud volume in personal computer using different web browsers
by: Z, Nuha, et al.
Published: (2017)
by: Z, Nuha, et al.
Published: (2017)
Analysis determinants of social media acceptance in higher educational institution of Pakistan
by: Raza, Ali, et al.
Published: (2018)
by: Raza, Ali, et al.
Published: (2018)
Innovative Web2.0 based collaborative learning and study circle model: integrating Islamic Revealed Knowledge and Human Science
by: Shah, Asadullah
Published: (2014)
by: Shah, Asadullah
Published: (2014)
Detecting changes in context using time series analysis of social network
by: Nusratullah , Kajal, et al.
Published: (2015)
by: Nusratullah , Kajal, et al.
Published: (2015)
Challenges and limitations in secure
software development adoption - A
qualitative analysis in Malaysian software
industry prospect
by: Ahmed Maher, Zulfikar, et al.
Published: (2020)
by: Ahmed Maher, Zulfikar, et al.
Published: (2020)
Detecting change from social networks using temporal analysis of email data
by: Nusratullah, Kajal, et al.
Published: (2018)
by: Nusratullah, Kajal, et al.
Published: (2018)
Big data and its impact on IT consultancy
by: Mohamed, Habab, et al.
Published: (2016)
by: Mohamed, Habab, et al.
Published: (2016)
A Web 2.0-based collaborative learning to promote the practices of Islam as a way of life
by: Ataie, Fariba, et al.
Published: (2019)
by: Ataie, Fariba, et al.
Published: (2019)
A framework for for the analysis of determinants of social media acceptance in higher educational institutions of Pakistan
by: Soomro, Ali Raza, et al.
Published: (2015)
by: Soomro, Ali Raza, et al.
Published: (2015)
Deployment of social nets in multi-layer model to identify Key individuals using majority voting
by: Shah, Asadullah
Published: (2019)
by: Shah, Asadullah
Published: (2019)
Offline printed Sindhi optical text recognition: survey
by: Solangi, Yasir Ali, et al.
Published: (2019)
by: Solangi, Yasir Ali, et al.
Published: (2019)
A review of slicing techniques in software engineering
by: Shah, Asadullah, et al.
Published: (2015)
by: Shah, Asadullah, et al.
Published: (2015)
Security and privacy for IoT and fog computing paradigm
by: Rauf, Abdul, et al.
Published: (2018)
by: Rauf, Abdul, et al.
Published: (2018)
Node status detection and information diffusion in router network using scale-free network
by: Mahesar, Abdul Waheed, et al.
Published: (2014)
by: Mahesar, Abdul Waheed, et al.
Published: (2014)
Artifact evaluation in information systems design science research: social constructivism environment
by: Ataie, Farib, et al.
Published: (2017)
by: Ataie, Farib, et al.
Published: (2017)
Manifestation and mitigation of node misbehaviour in adhoc networks
by: Khan, Burhan ul Islam, et al.
Published: (2014)
by: Khan, Burhan ul Islam, et al.
Published: (2014)
EloPSO: energy aware elephant swarm optimization for mobile adhoc networks
by: Khan , Burhan ul Islam, et al.
Published: (2014)
by: Khan , Burhan ul Islam, et al.
Published: (2014)
A 10 C’s of social networking, interconnections and the impact on social networking
by: Dar, Humaira, et al.
Published: (2013)
by: Dar, Humaira, et al.
Published: (2013)
Visualization: a tool to study nodes in multi-dimensional networks
by: Noor, Fozia, et al.
Published: (2019)
by: Noor, Fozia, et al.
Published: (2019)
Key individual identification using dimensional relevance in the stratum of networks
by: Shah, Asadullah, et al.
Published: (2019)
by: Shah, Asadullah, et al.
Published: (2019)
Prediction-based resource allocation model for real time tasks
by: Qureshi, Muhammad Shuaib, et al.
Published: (2018)
by: Qureshi, Muhammad Shuaib, et al.
Published: (2018)
Calculus and its applications in scale-free networks
by: Mahesar, Abdul Waheed, et al.
Published: (2014)
by: Mahesar, Abdul Waheed, et al.
Published: (2014)
A review of programming code assessment approaches
by: Ul Qayyum, Noor, et al.
Published: (2019)
by: Ul Qayyum, Noor, et al.
Published: (2019)
Pervasive learning using cloud computing
by: Shah, Asadullah
Published: (2015)
by: Shah, Asadullah
Published: (2015)
Metrics for computing performance of data center for instigating Energy Efficient Data center
by: Shah, Asadullah
Published: (2014)
by: Shah, Asadullah
Published: (2014)
Sliding mode control for 2 degrees of freedom upper limb rehabilitation robotics system under uncertainties
by: Ahmed, Syed Faiz, et al.
Published: (2019)
by: Ahmed, Syed Faiz, et al.
Published: (2019)
Predicting the fraud volume in the advent of internet enabled handheld devices
by: Zammarah, Nuha Abdullah, et al.
Published: (2015)
by: Zammarah, Nuha Abdullah, et al.
Published: (2015)
A conceptual framework for measuring the acceptance of pervasive learning
by: Koondhar, Muhammad Yaqoob, et al.
Published: (2015)
by: Koondhar, Muhammad Yaqoob, et al.
Published: (2015)
Social networks privacy policy awareness among undergraduate students: the case of Twitter
by: Talib, Shuhaili, et al.
Published: (2014)
by: Talib, Shuhaili, et al.
Published: (2014)
Perception analysis of social networks’ privacy policy: Instagram as a case study
by: Talib, Shuhaili, et al.
Published: (2014)
by: Talib, Shuhaili, et al.
Published: (2014)
How IT can enhance professional practice with regards to smart-phones and social networks?
by: Hassan, Nuradin Ibrahim, et al.
Published: (2016)
by: Hassan, Nuradin Ibrahim, et al.
Published: (2016)
An assessment of proximity technology adoption from a user's perspective
by: Brohi, Imtiaz Ali, et al.
Published: (2018)
by: Brohi, Imtiaz Ali, et al.
Published: (2018)
Similar Items
-
Beyond traditional audits: the implications of information technology on auditing
by: Shaikh, Humaiz, et al.
Published: (2018) -
Factors affecting secure software development practices among developers- an investigation
by: Ahmed Maher, Zulfikar, et al.
Published: (2019) -
A conceptual framework for determining acceptance of Internet of Things (IoT) in higher education institutions of Pakistan
by: Shaikh, Humaiz, et al.
Published: (2019) -
A methodology for modelling and analysis of secure systems using security patterns and mitigation use cases
by: Maher, Zulfikar Ahmad, et al.
Published: (2018) -
A review on optimization of vehicle frontal crashworthiness
for passenger safety
by: Ahmed Khatri, Naveed, et al.
Published: (2018)