Mitigating vulnerability of adolescent girls via innovative usage of digital technologies: insights from a field trial / Chiranjeeb Ghosh… [et al.]
Adolescents and young adults, between the ages of 10 to 24, comprise approximately 30 percent of India's population. These youths, 365 millionstrong, will shape the future of the nation. Although the Government of India has been spending enormous amount of money in a relentless mannerover decad...
| Main Authors: | Ghosh, Chiranjeeb, Paul, Sanjoy, Kuntagod, Nataraj S., Maitra, Anutosh, Bhat, Indrani |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Penerbit UiTM (UiTM Press)
2016
|
| Subjects: | |
| Online Access: | https://ir.uitm.edu.my/id/eprint/17553/ |
Similar Items
Web user' knowledge and their behavior towards security threats and vulnerabilities
by: Aldossary, Alia Ahmed, et al.
Published: (2016)
by: Aldossary, Alia Ahmed, et al.
Published: (2016)
Manifestation and mitigation of node misbehaviour in adhoc networks
by: Khan, Burhan ul Islam, et al.
Published: (2014)
by: Khan, Burhan ul Islam, et al.
Published: (2014)
Critical insight for MAPReduce optimization in Hadoop
by: Khan, Burhan ul Islam, et al.
Published: (2014)
by: Khan, Burhan ul Islam, et al.
Published: (2014)
Power usage effectiveness metrics to measure efficiency and performance of data centers
by: Uddin, Mueen, et al.
Published: (2014)
by: Uddin, Mueen, et al.
Published: (2014)
A methodology for modelling and analysis of secure systems using security patterns and mitigation use cases
by: Maher, Zulfikar Ahmad, et al.
Published: (2018)
by: Maher, Zulfikar Ahmad, et al.
Published: (2018)
The usage of smartphone among Malaysian university students
by: Ariff, Aishah, et al.
Published: (2018)
by: Ariff, Aishah, et al.
Published: (2018)
Empirical investigation of the factors influencing the usage mobile government services: case study of Saudi Arabia
by: Zamzami, Ikhlas, et al.
Published: (2016)
by: Zamzami, Ikhlas, et al.
Published: (2016)
Prevalence of mobile usage among university students: a case study of International Islamic University Malaysia
by: Qadri, Mehran, et al.
Published: (2015)
by: Qadri, Mehran, et al.
Published: (2015)
Micro-Class teaching of the tourism English course:
the smart education in China vocational colleges / Liao Danlu & Fong Pang Chew
by: Liao, Danlu, et al.
Published: (2017)
by: Liao, Danlu, et al.
Published: (2017)
A framework for the assessment of ICT maturity in becoming a WCU / Mas Anom Abdul Rashid and Mohd Noor Azman Othman
by: Abdul Rashid, Mas Anom, et al.
Published: (2005)
by: Abdul Rashid, Mas Anom, et al.
Published: (2005)
An exploratory study on the usage of electronic medical records (EMR) among private clinics in Kuching, Sarawak / Suhaida Halamy, Norlida Ismailly and Zainon Bibi
by: Halamy, Suhaida, et al.
Published: (2010)
by: Halamy, Suhaida, et al.
Published: (2010)
Communication in Chordal Ring Networks
by: Matroud, Atheer Abbas
Published: (2006)
by: Matroud, Atheer Abbas
Published: (2006)
Evaluation on accessibility of Information and Communication Technology (ICT) among oil palm smallholders in Johor / Amirul Arif Ab Aziz
by: Ab Aziz, Amirul Arif
Published: (2018)
by: Ab Aziz, Amirul Arif
Published: (2018)
Social media usage and awareness of cyber security issues among youths
by: Ahmad, F., et al.
Published: (2020)
by: Ahmad, F., et al.
Published: (2020)
Alert Notification Service (ANS) on event for UiTM KJM / Mashitah Mazlan
by: Mazlan, Mashitah
Published: (2018)
by: Mazlan, Mashitah
Published: (2018)
Corporate memory: A memory compaction mechanism towards Malaysia's leading companies' transparent governance/ Aiman Putra Amran... [et al.]
by: Amran, Aiman Putra, et al.
Published: (2015)
by: Amran, Aiman Putra, et al.
Published: (2015)
Mobile Quran app security vulnerabilities
by: Talib, Shuhaili, et al.
Published: (2015)
by: Talib, Shuhaili, et al.
Published: (2015)
Usage information: Depends on you / Hasfarini Hassim and Darlina Darmansah
by: Hassim, Hasfarini, et al.
Published: (2015)
by: Hassim, Hasfarini, et al.
Published: (2015)
Training: Google Apps 101
by: Yaali, Syarel Azill, et al.
Published: (2017)
by: Yaali, Syarel Azill, et al.
Published: (2017)
Innovative Web2.0 based collaborative learning and study circle model: integrating Islamic Revealed Knowledge and Human Science
by: Shah, Asadullah
Published: (2014)
by: Shah, Asadullah
Published: (2014)
Calculus and its applications in scale-free networks
by: Mahesar, Abdul Waheed, et al.
Published: (2014)
by: Mahesar, Abdul Waheed, et al.
Published: (2014)
An analysis of scheduling scheme for QoS guaranteed interactive multimedia over high speed wireless campus networks
by: Alam, M.K., et al.
Published: (2013)
by: Alam, M.K., et al.
Published: (2013)
Information security awareness through the use of social media
by: Abdul Molok, Nurul Nuha, et al.
Published: (2015)
by: Abdul Molok, Nurul Nuha, et al.
Published: (2015)
Development of wearable pulse oximetry for telehealth monitoring system
by: Khalifa, Othman Omran, et al.
Published: (2014)
by: Khalifa, Othman Omran, et al.
Published: (2014)
A scheduling algorithm for bandwidth aggregation in heterogeneous wireless network
by: Masud, M.H., et al.
Published: (2014)
by: Masud, M.H., et al.
Published: (2014)
Adaptive multi-rate video transcoding method
by: Fadlallah, Fadlallah Ali, et al.
Published: (2014)
by: Fadlallah, Fadlallah Ali, et al.
Published: (2014)
Analysis of design principles and requirements for procedural rigging of bipeds and quadrupeds characters with custom manipulators for animation
by: Bhati, Zeeshan, et al.
Published: (2015)
by: Bhati, Zeeshan, et al.
Published: (2015)
The most favourable mobile messaging apps
among IIUM students
by: Azhar Amanullah, Ayn Nur Azhana, et al.
Published: (2014)
by: Azhar Amanullah, Ayn Nur Azhana, et al.
Published: (2014)
A novel scheme of binding update no sense drop BCE in LMA
by: Geaiger, Mohamed, et al.
Published: (2014)
by: Geaiger, Mohamed, et al.
Published: (2014)
Node status detection and information diffusion in router network using scale-free network
by: Mahesar, Abdul Waheed, et al.
Published: (2014)
by: Mahesar, Abdul Waheed, et al.
Published: (2014)
r-TOLA: an architecture for real time open learning application for universities
by: Olanrewaju, Rashidah Funke, et al.
Published: (2014)
by: Olanrewaju, Rashidah Funke, et al.
Published: (2014)
Video viewing and streaming enhancement
by: Khalifa, Othman Omran, et al.
Published: (2014)
by: Khalifa, Othman Omran, et al.
Published: (2014)
A computer vision-based alarming system for
real-time detection of driver sleep
by: Khalifa, Othman Omran, et al.
Published: (2014)
by: Khalifa, Othman Omran, et al.
Published: (2014)
Robust and secure image steganography based on elliptic curve cryptography
by: Ahmed, Diaa Eldein Mustafa, et al.
Published: (2014)
by: Ahmed, Diaa Eldein Mustafa, et al.
Published: (2014)
Budaya digital merentasi sempadan: hambatan kepada budaya tempatan
by: Saidin, Aznan Zuhid
Published: (2014)
by: Saidin, Aznan Zuhid
Published: (2014)
Introducing autonomy in internet of things
by: Ashraf , Qazi Mamoon, et al.
Published: (2015)
by: Ashraf , Qazi Mamoon, et al.
Published: (2015)
Real-Time personalized stress detection from physiological signals
by: Syazani, Muhammad, et al.
Published: (2015)
by: Syazani, Muhammad, et al.
Published: (2015)
Performance evaluation of human identification based on ECG signal
by: Amiruddin, Ainunjariah, et al.
Published: (2015)
by: Amiruddin, Ainunjariah, et al.
Published: (2015)
Wireless energy harvesting for portable devices using split ring resonator
by: Zainal ‘Abidin, Balqis Mohamed, et al.
Published: (2015)
by: Zainal ‘Abidin, Balqis Mohamed, et al.
Published: (2015)
Performance analysis of MAC layer scheduling schemes for IMM applications over high speed wireless campus network in IEEE802.11e
by: Alam, Md Korshed, et al.
Published: (2015)
by: Alam, Md Korshed, et al.
Published: (2015)
Similar Items
-
Web user' knowledge and their behavior towards security threats and vulnerabilities
by: Aldossary, Alia Ahmed, et al.
Published: (2016) -
Manifestation and mitigation of node misbehaviour in adhoc networks
by: Khan, Burhan ul Islam, et al.
Published: (2014) -
Critical insight for MAPReduce optimization in Hadoop
by: Khan, Burhan ul Islam, et al.
Published: (2014) -
Power usage effectiveness metrics to measure efficiency and performance of data centers
by: Uddin, Mueen, et al.
Published: (2014) -
A methodology for modelling and analysis of secure systems using security patterns and mitigation use cases
by: Maher, Zulfikar Ahmad, et al.
Published: (2018)