Maqasid-based protection assessment model for user-generated content / Sharifah Aliman
Social media applications allow users to not only generate their own content (user-generated content(UGC)) but also to share with other social media users. Due to the dynamics and real-time publications of social media, many social media users lack the ability to think deeply or to acknowledge the n...
| Main Author: | Aliman, Sharifah |
|---|---|
| Format: | Thesis |
| Language: | English |
| Published: |
2017
|
| Subjects: | |
| Online Access: | https://ir.uitm.edu.my/id/eprint/21614/ |
Similar Items
Maqasid-based protection assessment model for user generated content / Sharifah Aliman
by: Aliman, Sharifah
Published: (2017)
by: Aliman, Sharifah
Published: (2017)
Presage criteria for blog credibility assessment using Rasch analysis / Sharifah Aliman, Saadiah Yahya and Syed Ahmad Aljunid
by: Aliman, Sharifah, et al.
Published: (2011)
by: Aliman, Sharifah, et al.
Published: (2011)
Directors' shareholdings and executive equity-based compensation influence on fraudulent financial reporting: Malaysia case / Noralizah Mohd Aliman
by: Mohd Aliman, Noralizah
Published: (2013)
by: Mohd Aliman, Noralizah
Published: (2013)
EMG-Multiplication / Sharifah Najihah Syed Mohamed
by: Sharifah Najihah, Syed Mohamed
Published: (2003)
by: Sharifah Najihah, Syed Mohamed
Published: (2003)
Agent technology in web based time scheduling / Sharifah Fazlinda Shaik Ismail
by: Sharifah Fazlinda, Shaik Ismail
Published: (2001)
by: Sharifah Fazlinda, Shaik Ismail
Published: (2001)
Video content adaptation based on user preferences and network bandwidth / Badariyah Bakhtiar
by: Bakhtiar, Badariyah
Published: (2007)
by: Bakhtiar, Badariyah
Published: (2007)
Reengineering of FSKTM (Human Resource Module) / Sharifah Maryam Wan Mohamad Akbar
by: Sharifah Maryam, Wan Mohamad Akbar
Published: (2003)
by: Sharifah Maryam, Wan Mohamad Akbar
Published: (2003)
Sistem waktu solat dan Tahun Hijrah (Laman Nurani) / Sharifah Haslinda Sayed Boniamin
by: Sharifah Haslinda , Sayed Boniamin
Published: (2000)
by: Sharifah Haslinda , Sayed Boniamin
Published: (2000)
Exploring students’ complaints behaviour for telecommunication industry in Malaysia / Syahmi Harudin, Siti Daleela Mohd Wahid and Nor Khasimah Aliman
by: Mohd Wahid, Siti Daleela, et al.
Published: (2013)
by: Mohd Wahid, Siti Daleela, et al.
Published: (2013)
User interface for networking subject based on component display theory using ADEPT model / Nornisra Ismail
by: Ismail, Nornisra
Published: (2005)
by: Ismail, Nornisra
Published: (2005)
Counselling appointment booking through telegram bot for UiTM Jasin / Sharifah Amirah Zulaikha Syed Ahmad Kamal
by: Syed Ahmad Kamal, Sharifah Amirah Zulaikha
Published: (2018)
by: Syed Ahmad Kamal, Sharifah Amirah Zulaikha
Published: (2018)
Sharifah food inventory management system
by: Tan, Yuan Jie
Published: (2022)
by: Tan, Yuan Jie
Published: (2022)
User access control and security model
by: Crysdian, Cahyo, et al.
Published: (2000)
by: Crysdian, Cahyo, et al.
Published: (2000)
A preliminary study of course information on i-Learn perspectives : focusing in accessibility, contents and user interface parameter / Noor Saadah Sulaiman
by: Sulaiman, Noor Saadah
Published: (2007)
by: Sulaiman, Noor Saadah
Published: (2007)
Bridging the gap between user requirements and user interface design / Bainaiah Misiran
by: Misiran, Bainaiah
Published: (2005)
by: Misiran, Bainaiah
Published: (2005)
The development and implementation of web content adaptation and negotiation based on user, device and network profiles / Harizah Sazali
by: Sazali, Harizah
Published: (2006)
by: Sazali, Harizah
Published: (2006)
Improving Automated Programming Assessments: User Experience Evaluation Using FaSt-generator
by: Rohaida, Romli, et al.
Published: (2015)
by: Rohaida, Romli, et al.
Published: (2015)
Impact of overcurrent protection coordination on the location of the distributed generation sources
by: Noor Zaihah, Jamal, et al.
Published: (2018)
by: Noor Zaihah, Jamal, et al.
Published: (2018)
PolyAQG Framework: Auto-generating assessment questions
by: Tan, Tee Hean *, et al.
Published: (2021)
by: Tan, Tee Hean *, et al.
Published: (2021)
Cryptanalysis of two non-anonymous buyer-seller watermarking protocols for content protection
by: Goi, Bok Min, et al.
Published: (2007)
by: Goi, Bok Min, et al.
Published: (2007)
Protection of the texts using Base64 and MD5
by: Taha, Imad, et al.
Published: (2012)
by: Taha, Imad, et al.
Published: (2012)
Protection of text using SHA1 and Base64
by: Taha, Imad, et al.
Published: (2012)
by: Taha, Imad, et al.
Published: (2012)
A Review of Data Quality Assessment: Data Quality Dimensions from User’s Perspective
by: Ruzaini, Abdullah Arshah, et al.
Published: (2018)
by: Ruzaini, Abdullah Arshah, et al.
Published: (2018)
Culture and user-interface design for older users in Malaysia
by: Hisham, Syariffanor, et al.
Published: (2007)
by: Hisham, Syariffanor, et al.
Published: (2007)
Heuristic Based Placement Technique for Distributed Generation
by: Omar, Aliman
Published: (2011)
by: Omar, Aliman
Published: (2011)
Graphical user interface test case generation for android apps using Q-learning / Husam N. S. Yasin
by: Husam , N. S. Yasin
Published: (2021)
by: Husam , N. S. Yasin
Published: (2021)
A XML based, user-centered privacy model in pervasive
computing systems
by: Dehghantanha, Ali, et al.
Published: (2009)
by: Dehghantanha, Ali, et al.
Published: (2009)
Modeling user's intention to use e-government to citizen services in Malaysia
by: Namroush, Salahedin Ali
Published: (2011)
by: Namroush, Salahedin Ali
Published: (2011)
Comparative study on content-based image retrieval CBIR)
by: Taha, Imad, et al.
Published: (2012)
by: Taha, Imad, et al.
Published: (2012)
Designing the user interface : recommendations for effective online game interface design focusing on early adult's user / Maziani Malek
by: Malek, Maziani
Published: (2006)
by: Malek, Maziani
Published: (2006)
Supporting Maintenance of Web Applications Using User-Centered Technique
by: Siti Nor Asikin, Kamalzaman, et al.
Published: (2012)
by: Siti Nor Asikin, Kamalzaman, et al.
Published: (2012)
'Maqasid al-shariah' in Islamic banks before value- based intermediation implementation / Sharifah Faigah Syed Alwi … [et al.]
by: Syed Alwi, Sharifah Faigah, et al.
Published: (2021)
by: Syed Alwi, Sharifah Faigah, et al.
Published: (2021)
Graphical user interfaces
by: Shah, Asadullah, et al.
Published: (2011)
by: Shah, Asadullah, et al.
Published: (2011)
An automated signature generation method for zero-day polymorphic worms based on multilayer perceptron model
by: Mohammed, Mohssen M. Z. E., et al.
Published: (2013)
by: Mohammed, Mohssen M. Z. E., et al.
Published: (2013)
Case-based retrieval on question items generation
by: Subroto, Imam Much
Published: (2007)
by: Subroto, Imam Much
Published: (2007)
A review of user authentication model for online banking system based on mobile IMEI number
by: Hammood, Waleed A., et al.
Published: (2020)
by: Hammood, Waleed A., et al.
Published: (2020)
Image based static hand gesture recognition as
user input using self organizing maps / Fakhzan Firdaus Abdullah
by: Abdullah, Fakhzan Firdaus
Published: (2006)
by: Abdullah, Fakhzan Firdaus
Published: (2006)
The performance measurement model of mosques in Malaysia based on the maqasid shariah index approach / Muhd Fauzi Abd. Rahman, Nor’azam Mastuki and Sharifah Norzehan Syed Yusof.
by: Abd. Rahman, Muhd Fauzi, et al.
Published: (2016)
by: Abd. Rahman, Muhd Fauzi, et al.
Published: (2016)
Discrete Wavelet Transform (DWT) Based Dual Watermarking For Authentication And Copyright Protection
by: Lim, Chen Gen
Published: (2023)
by: Lim, Chen Gen
Published: (2023)
Dual Image Watermarking Based On Human Visual Characteristics For Authentication And Copyright Protection
by: Wong, Shu Jie
Published: (2023)
by: Wong, Shu Jie
Published: (2023)
Similar Items
-
Maqasid-based protection assessment model for user generated content / Sharifah Aliman
by: Aliman, Sharifah
Published: (2017) -
Presage criteria for blog credibility assessment using Rasch analysis / Sharifah Aliman, Saadiah Yahya and Syed Ahmad Aljunid
by: Aliman, Sharifah, et al.
Published: (2011) -
Directors' shareholdings and executive equity-based compensation influence on fraudulent financial reporting: Malaysia case / Noralizah Mohd Aliman
by: Mohd Aliman, Noralizah
Published: (2013) -
EMG-Multiplication / Sharifah Najihah Syed Mohamed
by: Sharifah Najihah, Syed Mohamed
Published: (2003) -
Agent technology in web based time scheduling / Sharifah Fazlinda Shaik Ismail
by: Sharifah Fazlinda, Shaik Ismail
Published: (2001)