The relationship between personality and decision-making: a systematic literature review
Context From a point of view, software development is a set of decisions that need to be made while the software is developed. Many alternatives should be considered, such as the technology to employ, or the most important features to implement. However, many factors can influence one’s decision-ma...
| Main Authors: | Mendes, Fabiana Freitas, Mendes, Emilia, Salleh, Norsaremah |
|---|---|
| Format: | Article |
| Language: | English English English |
| Published: |
Elsevier B.V.
2019
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/73208/ http://irep.iium.edu.my/73208/1/73208_The%20relationship%20between%20personality.pdf http://irep.iium.edu.my/73208/2/73208_The%20relationship%20between%20personality_SCOPUS.pdf http://irep.iium.edu.my/73208/3/73208_The%20relationship%20between%20personality_WOS.pdf |
Similar Items
Issues in location based marketing: a review of literature
by: Jaradat, Ahmad, et al.
Published: (2015)
by: Jaradat, Ahmad, et al.
Published: (2015)
A systematic mapping study of mobile application testing techniques
by: Zein, Samer, et al.
Published: (2016)
by: Zein, Samer, et al.
Published: (2016)
Sentiment analysis for Malay language: systematic literature review
by: Handayani, Dini, et al.
Published: (2018)
by: Handayani, Dini, et al.
Published: (2018)
Protecting personal medical information: Asian perspectives
by: Samsuri, Suhaila, et al.
Published: (2013)
by: Samsuri, Suhaila, et al.
Published: (2013)
Modelling of intelligent intrusion detection system: making a case for snort
by: Olanrewaju, Rashidah Funke, et al.
Published: (2018)
by: Olanrewaju, Rashidah Funke, et al.
Published: (2018)
Real-Time personalized stress detection from physiological signals
by: Syazani, Muhammad, et al.
Published: (2015)
by: Syazani, Muhammad, et al.
Published: (2015)
Literature Survey on Enhancement of MOM for Intelligent Cross-Platform Communications in Service Oriented Architecture
by: Muhamad Ibrahim, Najhan
Published: (2018)
by: Muhamad Ibrahim, Najhan
Published: (2018)
Predicting the fraud volume in personal computer using different web browsers
by: Z, Nuha, et al.
Published: (2017)
by: Z, Nuha, et al.
Published: (2017)
Privacy models for protecting personal medical information: a preliminary study
by: Samsuri, Suhaila, et al.
Published: (2011)
by: Samsuri, Suhaila, et al.
Published: (2011)
Application of GIS-planning decision support system in predicting development impact assessment
by: Asmawi, M. Zainora, et al.
Published: (2011)
by: Asmawi, M. Zainora, et al.
Published: (2011)
A systematic review of modalities in computer-based interventions (CBIs) for language comprehension and decoding skills of children
with autism spectrum disorder (ASD)
by: Khowaja, Kamran, et al.
Published: (2020)
by: Khowaja, Kamran, et al.
Published: (2020)
Disparity between theory & practice beyond the worst-case competitive analysis
by: Iqbal, Javeria, et al.
Published: (2019)
by: Iqbal, Javeria, et al.
Published: (2019)
The relation between extreme doubly stochastic operators and extreme doubly stochastic matrices.
by: Shahidi, Farruh
Published: (2012)
by: Shahidi, Farruh
Published: (2012)
Similarities and dissimilarities between character frequencies of written text of Melayu, English and Indonesian languages
by: Shah, Asadullah, et al.
Published: (2013)
by: Shah, Asadullah, et al.
Published: (2013)
A review on multimedia communications cryptography
by: Salem, Yasser, et al.
Published: (2011)
by: Salem, Yasser, et al.
Published: (2011)
A review of slicing techniques in software engineering
by: Shah, Asadullah, et al.
Published: (2015)
by: Shah, Asadullah, et al.
Published: (2015)
A review of programming code assessment approaches
by: Ul Qayyum, Noor, et al.
Published: (2019)
by: Ul Qayyum, Noor, et al.
Published: (2019)
A review on optimization of vehicle frontal crashworthiness
for passenger safety
by: Ahmed Khatri, Naveed, et al.
Published: (2018)
by: Ahmed Khatri, Naveed, et al.
Published: (2018)
A review of near field communication process: how do it works?
by: Brohi, Imtiaz Ali, et al.
Published: (2018)
by: Brohi, Imtiaz Ali, et al.
Published: (2018)
Frequency modulated continuous wave radar systems for detection and tracking: a review
by: Ibrahimy, Abdullah Faruq Ibn, et al.
Published: (2020)
by: Ibrahimy, Abdullah Faruq Ibn, et al.
Published: (2020)
Fishing community wireless network concept in Kuala Rompin, Pahang, Malaysia
by: Hashim, Wahidah, et al.
Published: (2019)
by: Hashim, Wahidah, et al.
Published: (2019)
A Review on energy consumption optimization techniques in IoT based smart building environments
by: Shah, Abdul Salam, et al.
Published: (2019)
by: Shah, Abdul Salam, et al.
Published: (2019)
A review on scheduling schemes of high speed wireless campus network for Interactive Multimedia transmission
by: Alam, Md. Khorshed, et al.
Published: (2013)
by: Alam, Md. Khorshed, et al.
Published: (2013)
Evaluating power efficient algorithms for efficiency and carbon emissions in cloud data centers: a review
by: Uddin, Mueen, et al.
Published: (2015)
by: Uddin, Mueen, et al.
Published: (2015)
A comparative review of ISMS implementation based on ISO 27000 Series in organizations of different business sectors
by: Hamdi, Zaidatulnajla, et al.
Published: (2019)
by: Hamdi, Zaidatulnajla, et al.
Published: (2019)
Approximate methods for minimum vertex cover fail to provide optimal results on small graph instances: A review
by: Fayaz, Muhammad, et al.
Published: (2018)
by: Fayaz, Muhammad, et al.
Published: (2018)
The influence of IT leaders' leadership behaviour on IT governance performance in higher education: a literature review
by: Waheed, Hussain, et al.
Published: (2018)
by: Waheed, Hussain, et al.
Published: (2018)
Innovative Web2.0 based collaborative learning and study circle model: integrating Islamic Revealed Knowledge and Human Science
by: Shah, Asadullah
Published: (2014)
by: Shah, Asadullah
Published: (2014)
Calculus and its applications in scale-free networks
by: Mahesar, Abdul Waheed, et al.
Published: (2014)
by: Mahesar, Abdul Waheed, et al.
Published: (2014)
An analysis of scheduling scheme for QoS guaranteed interactive multimedia over high speed wireless campus networks
by: Alam, M.K., et al.
Published: (2013)
by: Alam, M.K., et al.
Published: (2013)
Information security awareness through the use of social media
by: Abdul Molok, Nurul Nuha, et al.
Published: (2015)
by: Abdul Molok, Nurul Nuha, et al.
Published: (2015)
Development of wearable pulse oximetry for telehealth monitoring system
by: Khalifa, Othman Omran, et al.
Published: (2014)
by: Khalifa, Othman Omran, et al.
Published: (2014)
A scheduling algorithm for bandwidth aggregation in heterogeneous wireless network
by: Masud, M.H., et al.
Published: (2014)
by: Masud, M.H., et al.
Published: (2014)
Adaptive multi-rate video transcoding method
by: Fadlallah, Fadlallah Ali, et al.
Published: (2014)
by: Fadlallah, Fadlallah Ali, et al.
Published: (2014)
Analysis of design principles and requirements for procedural rigging of bipeds and quadrupeds characters with custom manipulators for animation
by: Bhati, Zeeshan, et al.
Published: (2015)
by: Bhati, Zeeshan, et al.
Published: (2015)
The most favourable mobile messaging apps
among IIUM students
by: Azhar Amanullah, Ayn Nur Azhana, et al.
Published: (2014)
by: Azhar Amanullah, Ayn Nur Azhana, et al.
Published: (2014)
A novel scheme of binding update no sense drop BCE in LMA
by: Geaiger, Mohamed, et al.
Published: (2014)
by: Geaiger, Mohamed, et al.
Published: (2014)
Node status detection and information diffusion in router network using scale-free network
by: Mahesar, Abdul Waheed, et al.
Published: (2014)
by: Mahesar, Abdul Waheed, et al.
Published: (2014)
r-TOLA: an architecture for real time open learning application for universities
by: Olanrewaju, Rashidah Funke, et al.
Published: (2014)
by: Olanrewaju, Rashidah Funke, et al.
Published: (2014)
Video viewing and streaming enhancement
by: Khalifa, Othman Omran, et al.
Published: (2014)
by: Khalifa, Othman Omran, et al.
Published: (2014)
Similar Items
-
Issues in location based marketing: a review of literature
by: Jaradat, Ahmad, et al.
Published: (2015) -
A systematic mapping study of mobile application testing techniques
by: Zein, Samer, et al.
Published: (2016) -
Sentiment analysis for Malay language: systematic literature review
by: Handayani, Dini, et al.
Published: (2018) -
Protecting personal medical information: Asian perspectives
by: Samsuri, Suhaila, et al.
Published: (2013) -
Modelling of intelligent intrusion detection system: making a case for snort
by: Olanrewaju, Rashidah Funke, et al.
Published: (2018)