Formulating a Policy on IT Provision
| Main Author: | Oxley, A. |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
2010
|
| Subjects: | |
| Online Access: | http://scholars.utp.edu.my/id/eprint/1620/ http://scholars.utp.edu.my/id/eprint/1620/1/Dummy_file.docx |
Similar Items
The Formulation of Comprehensive Information Security Culture Dimensions for Information Security Policy Compliance Study
by: Nasir, Akhyari, et al.
Published: (2018)
by: Nasir, Akhyari, et al.
Published: (2018)
Cloud Computing: Architecture for Efficient Provision of Services
by: Khan, Nawsher, et al.
Published: (2012)
by: Khan, Nawsher, et al.
Published: (2012)
Blockchain-enabled cybersecurity provision for scalable heterogeneous network: A comprehensive survey
by: Islam, Md. Shohidul, et al.
Published: (2024)
by: Islam, Md. Shohidul, et al.
Published: (2024)
A class of its own
by: Oxley, A.
Published: (2007)
by: Oxley, A.
Published: (2007)
Just a Few Words
by: Oxley, A.
Published: (2005)
by: Oxley, A.
Published: (2005)
Designing a Computer Literacy Course
by: Oxley, A.
Published: (2010)
by: Oxley, A.
Published: (2010)
Grid computing is a work in progress
by: Oxley, A.
Published: (2009)
by: Oxley, A.
Published: (2009)
Successfully implementing a learner-centred culture
by: Oxley, A.
Published: (2008)
by: Oxley, A.
Published: (2008)
A Coupling and Cohesion Metrics Suite for Object-Oriented Software
by: Husein, S., et al.
Published: (2009)
by: Husein, S., et al.
Published: (2009)
Are Your IT Staff Working Too Hard?
by: Oxley, A.
Published: (2008)
by: Oxley, A.
Published: (2008)
The RFID invasion – The solutions?
by: Oxley, A.
Published: (2005)
by: Oxley, A.
Published: (2005)
The Benefits of Using ITIL in the Enterprise
by: Oxley, A.
Published: (2005)
by: Oxley, A.
Published: (2005)
Are we invited to the nanotechnology party?
by: Oxley, A.
Published: (2009)
by: Oxley, A.
Published: (2009)
Are Your IT Staff Working Too Hard?
by: Oxley, A.
Published: (2008)
by: Oxley, A.
Published: (2008)
On the move
by: Oxley, A.
Published: (2007)
by: Oxley, A.
Published: (2007)
Web 2.0 Applications of Geographic and Geospatial Information
by: Oxley, A.
Published: (2009)
by: Oxley, A.
Published: (2009)
Will VR ever be immersive?
by: Oxley, A.
Published: (2008)
by: Oxley, A.
Published: (2008)
Advanced Web Application Development
by: Oxley, A.
Published: (2007)
by: Oxley, A.
Published: (2007)
It’s no game
by: Oxley, A.
Published: (2007)
by: Oxley, A.
Published: (2007)
The Quality of E-learning
by: Oxley, A.
Published: (2007)
by: Oxley, A.
Published: (2007)
The Application of New Software Development
by: Oxley, A.
Published: (2006)
by: Oxley, A.
Published: (2006)
Calculating Earthworks Volumes – an Exercise in Geometric Algorithms
by: Oxley, A.
Published: (1989)
by: Oxley, A.
Published: (1989)
Surface Fitting by Triangulation
by: Oxley, A.
Published: (1985)
by: Oxley, A.
Published: (1985)
Traffic analysis for QoS provisioning in Bluetooth ad hoc network
by: H., Hasbullah, et al.
Published: (2008)
by: H., Hasbullah, et al.
Published: (2008)
Information Extraction for Counter-Terrorism: A Survey on Link Analysis
by: Zamin, N., et al.
Published: (2010)
by: Zamin, N., et al.
Published: (2010)
QoS provisioning for real time services for IPv6 Diffserv network using IXP-2400 Intel network processor
by: Saleem, K., et al.
Published: (2007)
by: Saleem, K., et al.
Published: (2007)
AI powered asthma prediction towards treatment formulation: an android app approach
by: Murad, Saydul Akbar, et al.
Published: (2022)
by: Murad, Saydul Akbar, et al.
Published: (2022)
A flexible bandwidth resource provisioning system with agent-enhanced SLA negotiation
by: Chieng, David, et al.
Published: (2004)
by: Chieng, David, et al.
Published: (2004)
An integrated approach to formulate a value-based software process tailoring framework
by: Zakaria, Noor Azura, et al.
Published: (2016)
by: Zakaria, Noor Azura, et al.
Published: (2016)
Proposed Development Methodology for Higher Education and Library Mash-ups
by: Ibrahim, Rabiu, et al.
Published: (2010)
by: Ibrahim, Rabiu, et al.
Published: (2010)
POTENTIAL GROUPER FEED FORMULATION BASED ON EVOLUTIONARY ALGORITHM CONCEPT WITH A UNIQUE SELECTION OPERATOR
by: Soong, Cai Juan, et al.
Published: (2018)
by: Soong, Cai Juan, et al.
Published: (2018)
Natinonal Education Policy Information System for EPRD Education Planning and Policy Research Division Ministry of Education, Malaysia / Tan Chim Tat
by: Tan, Chim Tat
Published: (2002)
by: Tan, Chim Tat
Published: (2002)
Comparative Analysis of Freemium Policies and Procedure between Major Mobile Platforms
by: Muhamad Idaham, Umar Ong, et al.
Published: (2014)
by: Muhamad Idaham, Umar Ong, et al.
Published: (2014)
A LANGUAGE TO REPRESENT SECURITY POLICY FOR MULTI-AGENCY HEALTH INFORMATION SYSTEM
by: Intan najua, kamal nasir, et al.
Published: (2008)
by: Intan najua, kamal nasir, et al.
Published: (2008)
Challenges and Trends of Automatic Text Summarization
by: Foong, Oi Mean, et al.
Published: (2010)
by: Foong, Oi Mean, et al.
Published: (2010)
Users' perception of the information security policy at Universiti Teknologi Malaysia
by: Sharif, Haniza
Published: (2009)
by: Sharif, Haniza
Published: (2009)
Will virtual reality ever be immersive?
by: A., Oxley
Published: (2008)
by: A., Oxley
Published: (2008)
Projecting named entity tags from a resource rich language to a resource poor language
by: Zamin, Norshuhani, et al.
Published: (2012)
by: Zamin, Norshuhani, et al.
Published: (2012)
Information Security Policy Compliance Behavior Based on Comprehensive Dimensions of Information Security Culture: A Conceptual Framework
by: Nasir, Akhyari, et al.
Published: (2017)
by: Nasir, Akhyari, et al.
Published: (2017)
Hybrid Resource Allocation Method for Grid Computing
by: Shah, S.N.M., et al.
Published: (2010)
by: Shah, S.N.M., et al.
Published: (2010)
Similar Items
-
The Formulation of Comprehensive Information Security Culture Dimensions for Information Security Policy Compliance Study
by: Nasir, Akhyari, et al.
Published: (2018) -
Cloud Computing: Architecture for Efficient Provision of Services
by: Khan, Nawsher, et al.
Published: (2012) -
Blockchain-enabled cybersecurity provision for scalable heterogeneous network: A comprehensive survey
by: Islam, Md. Shohidul, et al.
Published: (2024) -
A class of its own
by: Oxley, A.
Published: (2007) -
Just a Few Words
by: Oxley, A.
Published: (2005)