Exploring issues that concern Muslim customers in the conduct of e-commerce transactions
| Main Author: | Suhaimi, Mohd Adam |
|---|---|
| Format: | Proceeding Paper |
| Language: | English English |
| Published: |
2018
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/72041/ http://irep.iium.edu.my/72041/2/Tentative%20Program%20for%20DIS%20Research%20Seminar%202018%2010Aug18.pdf http://irep.iium.edu.my/72041/13/72041_Exploring%20issues%20that%20concern%20Muslim%20customers.pdf |
Similar Items
The future of data privacy and security concerns in
Internet of things
by: Solangi, Zulfiqar Ali, et al.
Published: (2018)
by: Solangi, Zulfiqar Ali, et al.
Published: (2018)
Transaction Management techniques and practices in current cloud computing environment: a survey
by: Waqas, Ahmad, et al.
Published: (2015)
by: Waqas, Ahmad, et al.
Published: (2015)
Modeling user’s trust in M-commerce acceptance: A conceptual framework in context of Pakistan
by: Rind, M Malook, et al.
Published: (2016)
by: Rind, M Malook, et al.
Published: (2016)
Critical infrastructure protection of ICT in Muslim world
by: Abdulrahman Ali, Sami Mohammed, et al.
Published: (2016)
by: Abdulrahman Ali, Sami Mohammed, et al.
Published: (2016)
Mobility issues in hierarchical mobile IP
by: Hassan Abdalla Hashim, Aisha, et al.
Published: (2005)
by: Hassan Abdalla Hashim, Aisha, et al.
Published: (2005)
Template based procedural rigging of quadrupeds with custom manipulators
by: Bhatti, Zeeshan, et al.
Published: (2013)
by: Bhatti, Zeeshan, et al.
Published: (2013)
Critical socio-technical issues surrounding mobile computing
by: Mohamed, Norshidah, et al.
Published: (2016)
by: Mohamed, Norshidah, et al.
Published: (2016)
Issues in location based marketing: a review of literature
by: Jaradat, Ahmad, et al.
Published: (2015)
by: Jaradat, Ahmad, et al.
Published: (2015)
The adoption of Knowledge Management Systems (KMS) among academicians in Nigeria universities
by: Salami, Ahmed, et al.
Published: (2019)
by: Salami, Ahmed, et al.
Published: (2019)
Preliminary study for customer’s online shopping satisfaction from security perspective
by: Imtiaz Ali, Najma, et al.
Published: (2018)
by: Imtiaz Ali, Najma, et al.
Published: (2018)
Measuring antecedents of customer satisfaction: an empirical analysis of telecom services in Pakistan
by: Rind, M. M., et al.
Published: (2016)
by: Rind, M. M., et al.
Published: (2016)
ICT in telemedicine: conquering privacy and security issues in health care services
by: Olanrewaju, Rashidah Funke, et al.
Published: (2012)
by: Olanrewaju, Rashidah Funke, et al.
Published: (2012)
Important attributes of customer satisfaction in telecom industry: a survey based study
by: Khan, Nusratullah, et al.
Published: (2017)
by: Khan, Nusratullah, et al.
Published: (2017)
Factors effecting fixed-line telecom services customer retention: A study of Pakistan
by: Rind, M. Malook, et al.
Published: (2016)
by: Rind, M. Malook, et al.
Published: (2016)
Performance analysis of MAC layer scheduling schemes for IMM applications over high speed wireless campus network in IEEE802.11e
by: Alam, Md Korshed, et al.
Published: (2015)
by: Alam, Md Korshed, et al.
Published: (2015)
Performance evaluation of seed values and pause times over high speed Wireless Campus Network in IEEE802.11e
by: Alam Shishir, Md. Khorsed, et al.
Published: (2014)
by: Alam Shishir, Md. Khorsed, et al.
Published: (2014)
User acceptance model for assessing trust on electronic transaction succession
by: Durachman, Yusuf, et al.
Published: (2019)
by: Durachman, Yusuf, et al.
Published: (2019)
Analysis of design principles and requirements for procedural rigging of bipeds and quadrupeds characters with custom manipulators for animation
by: Bhati, Zeeshan, et al.
Published: (2015)
by: Bhati, Zeeshan, et al.
Published: (2015)
Exploring the factors influencing top management involvement and participation in information security
by: Abdul Munir, Rufizah, et al.
Published: (2017)
by: Abdul Munir, Rufizah, et al.
Published: (2017)
Exploring a 'plug and play' smart home system for mobile user
by: Mantoro, Teddy, et al.
Published: (2012)
by: Mantoro, Teddy, et al.
Published: (2012)
Calculating customer experience management index for telecommunication service using genetic algorithm based weighted attributes
by: Khan, Nusratullah, et al.
Published: (2018)
by: Khan, Nusratullah, et al.
Published: (2018)
A customer methodology for developing green cellular phone: a case of University Malaysia Pahang Students
by: Uddin, Mueen, et al.
Published: (2015)
by: Uddin, Mueen, et al.
Published: (2015)
A model of factors influencing cloud computing adoption among faculty members and students of higher educational institutions of Bangladesh
by: Rahman, Mohammad Musudur, et al.
Published: (2018)
by: Rahman, Mohammad Musudur, et al.
Published: (2018)
A study to investigate state of ethical Development in E-learning
by: Muhammad, AbdulHafeez, et al.
Published: (2016)
by: Muhammad, AbdulHafeez, et al.
Published: (2016)
Implementation e-government initiatives among Malaysian local authorities
by: Abu Bakar, Ahmad Bakeri, et al.
Published: (2013)
by: Abu Bakar, Ahmad Bakeri, et al.
Published: (2013)
Assimilating e-learning barriers using an interpretive structural modelling (ISM)
by: Naveed, Quadri Noorulhasan, et al.
Published: (2017)
by: Naveed, Quadri Noorulhasan, et al.
Published: (2017)
The system architecture of E-braille by using the microcontroller and external controller unit
by: Burhan, Muhammad Mansor, et al.
Published: (2016)
by: Burhan, Muhammad Mansor, et al.
Published: (2016)
Barriers effecting successful implementation of E-learning in Saudi Arabian universities
by: Naveed, Quadri Noorulhasan, et al.
Published: (2017)
by: Naveed, Quadri Noorulhasan, et al.
Published: (2017)
The suitability of native application for university e-learning compared to web-based application
by: Sari, Maya Novia, et al.
Published: (2015)
by: Sari, Maya Novia, et al.
Published: (2015)
Toward user awareness and acceptance of Sudan E-government: adoption and security perspective
by: Khalifa, Othman Omran, et al.
Published: (2016)
by: Khalifa, Othman Omran, et al.
Published: (2016)
An overview and proposal for analysis of the effectiveness of human factors in Dubai e-banking system
by: Abdulghafor, Rawad, et al.
Published: (2017)
by: Abdulghafor, Rawad, et al.
Published: (2017)
Prioritizing barriers of e-learning for effective teaching-learning using Fuzzy Analytic Hierarchy Process (FAHP)
by: Naveed, Quadri Noorulhasan, et al.
Published: (2018)
by: Naveed, Quadri Noorulhasan, et al.
Published: (2018)
Social commerce in e-business of Pakistan: opportunities, challenges and solutions
by: Solangi, Yasir Ali, et al.
Published: (2018)
by: Solangi, Yasir Ali, et al.
Published: (2018)
Enhancement of fast pedestrian detection using HOG features
by: Baghdadi, Ahmad, et al.
Published: (2015)
by: Baghdadi, Ahmad, et al.
Published: (2015)
Interactive multi-media applications: quality of service
guaranteed under huge traffic
by: Yalli, Jameel, et al.
Published: (2014)
by: Yalli, Jameel, et al.
Published: (2014)
An analysis of scheduling scheme for QoS guaranteed interactive multimedia over high speed wireless campus networks
by: Alam, M.K., et al.
Published: (2013)
by: Alam, M.K., et al.
Published: (2013)
A scheduling algorithm for bandwidth aggregation in heterogeneous wireless network
by: Masud, M.H., et al.
Published: (2014)
by: Masud, M.H., et al.
Published: (2014)
A review on scheduling schemes of high speed wireless campus network for Interactive Multimedia transmission
by: Alam, Md. Khorshed, et al.
Published: (2013)
by: Alam, Md. Khorshed, et al.
Published: (2013)
Performance evaluation of PAPR reduction with SER and BER by modified clipping & filtering in 3GPP LTE downlink
by: Arafat, M. Y. Arafat, et al.
Published: (2014)
by: Arafat, M. Y. Arafat, et al.
Published: (2014)
An analysis of resource sharing scheme in heterogeneous wireless campus network
by: Masud, M.H., et al.
Published: (2013)
by: Masud, M.H., et al.
Published: (2013)
Similar Items
-
The future of data privacy and security concerns in
Internet of things
by: Solangi, Zulfiqar Ali, et al.
Published: (2018) -
Transaction Management techniques and practices in current cloud computing environment: a survey
by: Waqas, Ahmad, et al.
Published: (2015) -
Modeling user’s trust in M-commerce acceptance: A conceptual framework in context of Pakistan
by: Rind, M Malook, et al.
Published: (2016) -
Critical infrastructure protection of ICT in Muslim world
by: Abdulrahman Ali, Sami Mohammed, et al.
Published: (2016) -
Mobility issues in hierarchical mobile IP
by: Hassan Abdalla Hashim, Aisha, et al.
Published: (2005)