Smartphone application for physical activity enhancement at workplace: would office workers actually use It?
The proliferation of smartphone into daily life could potentially become an effective medium for the delivery of workplace-based physical activity intervention. Based on Unified Theory of Acceptance and Use of Technology model (UTAUT), this study investigates factors influencing office workers’ inte...
| Main Authors: | Mohd Mohadis, Hazwani, Mohamad Ali, Nazlena |
|---|---|
| Format: | Proceeding Paper |
| Language: | English English English |
| Published: |
The Institute of Electrical and Electronics Engineers, Inc.
2018
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/70782/ http://irep.iium.edu.my/70782/1/70782_Smartphone%20Application%20for%20Physical%20Activity_complete.pdf http://irep.iium.edu.my/70782/7/70782_Smartphone%20application%20for%20physical_SCOPUS.pdf http://irep.iium.edu.my/70782/8/70782_Smartphone%20application%20for%20physical_WOS.pdf |
Similar Items
Mobile security and privacy in smartphone technology
by: Ibrahim, Mohamed, et al.
Published: (2015)
by: Ibrahim, Mohamed, et al.
Published: (2015)
Challenges and limitations in secure
software development adoption - A
qualitative analysis in Malaysian software
industry prospect
by: Ahmed Maher, Zulfikar, et al.
Published: (2020)
by: Ahmed Maher, Zulfikar, et al.
Published: (2020)
Video viewing and streaming enhancement
by: Khalifa, Othman Omran, et al.
Published: (2014)
by: Khalifa, Othman Omran, et al.
Published: (2014)
Encryption method for SCADA security enhancement
by: Shahzad, Aamir, et al.
Published: (2014)
by: Shahzad, Aamir, et al.
Published: (2014)
Enhancement of fast pedestrian detection using HOG features
by: Baghdadi, Ahmad, et al.
Published: (2015)
by: Baghdadi, Ahmad, et al.
Published: (2015)
Detecting false messages in the smartphone fault reporting system
by: Rajoo, Sharmiladevi, et al.
Published: (2020)
by: Rajoo, Sharmiladevi, et al.
Published: (2020)
Evaluation of an enhanced scheme for high-level nested network mobility
by: Ali Mohammed, Mohammed Babiker, et al.
Published: (2015)
by: Ali Mohammed, Mohammed Babiker, et al.
Published: (2015)
Deployment of new dynamic cryptography buffer for SCADA security enhancement
by: Aamir, Shahzad, et al.
Published: (2014)
by: Aamir, Shahzad, et al.
Published: (2014)
Medical, healthcare, and emergency model : Mobile web to enhance patients’ facilities
by: Hameed, Shihab A., et al.
Published: (2010)
by: Hameed, Shihab A., et al.
Published: (2010)
Resolving ethical dilemma in technology enhanced education through smart mobile devices
by: Muhammad, AbdulHafeez, et al.
Published: (2015)
by: Muhammad, AbdulHafeez, et al.
Published: (2015)
How IT can enhance professional practice with regards to smart-phones and social networks?
by: Hassan, Nuradin Ibrahim, et al.
Published: (2016)
by: Hassan, Nuradin Ibrahim, et al.
Published: (2016)
An enhanced macro mobility management scheme in NEMO environment to achieve seamless handoff
by: Hassan Abdalla Hashim, Aisha, et al.
Published: (2013)
by: Hassan Abdalla Hashim, Aisha, et al.
Published: (2013)
Literature Survey on Enhancement of MOM for Intelligent Cross-Platform Communications in Service Oriented Architecture
by: Muhamad Ibrahim, Najhan
Published: (2018)
by: Muhamad Ibrahim, Najhan
Published: (2018)
The usage of smartphone among Malaysian university students
by: Ariff, Aishah, et al.
Published: (2018)
by: Ariff, Aishah, et al.
Published: (2018)
Communication skills: what do employers' expect? (workplace communication skills for engineering graduates)
by: Sivanganam, Lalithambigai
Published: (2002)
by: Sivanganam, Lalithambigai
Published: (2002)
Innovative Web2.0 based collaborative learning and study circle model: integrating Islamic Revealed Knowledge and Human Science
by: Shah, Asadullah
Published: (2014)
by: Shah, Asadullah
Published: (2014)
Calculus and its applications in scale-free networks
by: Mahesar, Abdul Waheed, et al.
Published: (2014)
by: Mahesar, Abdul Waheed, et al.
Published: (2014)
An analysis of scheduling scheme for QoS guaranteed interactive multimedia over high speed wireless campus networks
by: Alam, M.K., et al.
Published: (2013)
by: Alam, M.K., et al.
Published: (2013)
Information security awareness through the use of social media
by: Abdul Molok, Nurul Nuha, et al.
Published: (2015)
by: Abdul Molok, Nurul Nuha, et al.
Published: (2015)
Development of wearable pulse oximetry for telehealth monitoring system
by: Khalifa, Othman Omran, et al.
Published: (2014)
by: Khalifa, Othman Omran, et al.
Published: (2014)
A scheduling algorithm for bandwidth aggregation in heterogeneous wireless network
by: Masud, M.H., et al.
Published: (2014)
by: Masud, M.H., et al.
Published: (2014)
Adaptive multi-rate video transcoding method
by: Fadlallah, Fadlallah Ali, et al.
Published: (2014)
by: Fadlallah, Fadlallah Ali, et al.
Published: (2014)
Analysis of design principles and requirements for procedural rigging of bipeds and quadrupeds characters with custom manipulators for animation
by: Bhati, Zeeshan, et al.
Published: (2015)
by: Bhati, Zeeshan, et al.
Published: (2015)
The most favourable mobile messaging apps
among IIUM students
by: Azhar Amanullah, Ayn Nur Azhana, et al.
Published: (2014)
by: Azhar Amanullah, Ayn Nur Azhana, et al.
Published: (2014)
A novel scheme of binding update no sense drop BCE in LMA
by: Geaiger, Mohamed, et al.
Published: (2014)
by: Geaiger, Mohamed, et al.
Published: (2014)
Node status detection and information diffusion in router network using scale-free network
by: Mahesar, Abdul Waheed, et al.
Published: (2014)
by: Mahesar, Abdul Waheed, et al.
Published: (2014)
r-TOLA: an architecture for real time open learning application for universities
by: Olanrewaju, Rashidah Funke, et al.
Published: (2014)
by: Olanrewaju, Rashidah Funke, et al.
Published: (2014)
A computer vision-based alarming system for
real-time detection of driver sleep
by: Khalifa, Othman Omran, et al.
Published: (2014)
by: Khalifa, Othman Omran, et al.
Published: (2014)
Robust and secure image steganography based on elliptic curve cryptography
by: Ahmed, Diaa Eldein Mustafa, et al.
Published: (2014)
by: Ahmed, Diaa Eldein Mustafa, et al.
Published: (2014)
Budaya digital merentasi sempadan: hambatan kepada budaya tempatan
by: Saidin, Aznan Zuhid
Published: (2014)
by: Saidin, Aznan Zuhid
Published: (2014)
Introducing autonomy in internet of things
by: Ashraf , Qazi Mamoon, et al.
Published: (2015)
by: Ashraf , Qazi Mamoon, et al.
Published: (2015)
Real-Time personalized stress detection from physiological signals
by: Syazani, Muhammad, et al.
Published: (2015)
by: Syazani, Muhammad, et al.
Published: (2015)
Performance evaluation of human identification based on ECG signal
by: Amiruddin, Ainunjariah, et al.
Published: (2015)
by: Amiruddin, Ainunjariah, et al.
Published: (2015)
Wireless energy harvesting for portable devices using split ring resonator
by: Zainal ‘Abidin, Balqis Mohamed, et al.
Published: (2015)
by: Zainal ‘Abidin, Balqis Mohamed, et al.
Published: (2015)
Performance analysis of MAC layer scheduling schemes for IMM applications over high speed wireless campus network in IEEE802.11e
by: Alam, Md Korshed, et al.
Published: (2015)
by: Alam, Md Korshed, et al.
Published: (2015)
A review on scheduling schemes of high speed wireless campus network for Interactive Multimedia transmission
by: Alam, Md. Khorshed, et al.
Published: (2013)
by: Alam, Md. Khorshed, et al.
Published: (2013)
Comparison of X-band satellite link measurements with radar derived rain attenuation in the tropics
by: Badron, Khairayu, et al.
Published: (2014)
by: Badron, Khairayu, et al.
Published: (2014)
Pervasive learning using cloud computing
by: Shah, Asadullah
Published: (2015)
by: Shah, Asadullah
Published: (2015)
An empirical investigation of factors influencing user satisfaction with online services of mobile communication providers: study of Kuwait
by: Alzabi, Tami, et al.
Published: (2015)
by: Alzabi, Tami, et al.
Published: (2015)
Contribution of cloud computing in the reduction of carbon dioxide emission
by: Khan, Nusratullah, et al.
Published: (2014)
by: Khan, Nusratullah, et al.
Published: (2014)
Similar Items
-
Mobile security and privacy in smartphone technology
by: Ibrahim, Mohamed, et al.
Published: (2015) -
Challenges and limitations in secure
software development adoption - A
qualitative analysis in Malaysian software
industry prospect
by: Ahmed Maher, Zulfikar, et al.
Published: (2020) -
Video viewing and streaming enhancement
by: Khalifa, Othman Omran, et al.
Published: (2014) -
Encryption method for SCADA security enhancement
by: Shahzad, Aamir, et al.
Published: (2014) -
Enhancement of fast pedestrian detection using HOG features
by: Baghdadi, Ahmad, et al.
Published: (2015)