The factors influenced by stakeholder identification in E-learning systems: A survey
Identifying the appropriate stakeholder is an integral part of the requirements engineering process and the primary factor influencing system success. The E-learning system is a significant platform with a variety of stakeholders that must be identified. After the launch of the E-learning system, is...
| Main Authors: | H. Elneel, Duha Awad, Kahtan, Hasan, Abdul Sahli, Fakharudin, Abdulhak, Mansoor, Al-Ahmad, Ahmad Salah, A lzoubi, Yehia Ibrahim |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Science Direct
2023
|
| Subjects: | |
| Online Access: | http://umpir.ump.edu.my/id/eprint/36968/ http://umpir.ump.edu.my/id/eprint/36968/1/The%20factors%20influenced%20by%20stakeholder%20identification%20in%20E-learning%20systems-%20A%20survey.pdf |
Similar Items
Investigating internet of things impact on e-Learning system: An overview
by: Elneel, Duha Awad H., et al.
Published: (2023)
by: Elneel, Duha Awad H., et al.
Published: (2023)
Stakeholder identification overview and challenges in requirements engineering prospective
by: Elneel, Duha Awad, et al.
Published: (2022)
by: Elneel, Duha Awad, et al.
Published: (2022)
Test case selection for penetration testing in mobile cloud computing applications: A proposed technique
by: Al-Ahmad, Ahmad Salah, et al.
Published: (2018)
by: Al-Ahmad, Ahmad Salah, et al.
Published: (2018)
Web Phishing Classification Model using Artificial Neural Network and Deep Learning Neural Network
by: Noor Hazirah, Hassan, et al.
Published: (2023)
by: Noor Hazirah, Hassan, et al.
Published: (2023)
Fuzz test case generation for penetration testing in mobile cloud computing applications
by: Al-Ahmad, Ahmad Salah, et al.
Published: (2018)
by: Al-Ahmad, Ahmad Salah, et al.
Published: (2018)
Cloud computing review: Features and issues
by: Al-Ahmad, Ahmad Salah, et al.
Published: (2018)
by: Al-Ahmad, Ahmad Salah, et al.
Published: (2018)
Model for phishing websites classification using artificial neural network
by: Hassan, N. H., et al.
Published: (2021)
by: Hassan, N. H., et al.
Published: (2021)
Modelling Of Biogas Production From Banana Stem Waste With Neural Networks Learning Strategies To Optimse The Production
by: Abdul Sahli, Fakharudin, et al.
Published: (2017)
by: Abdul Sahli, Fakharudin, et al.
Published: (2017)
An improved memory-based collaborative filtering method based on the TOPSIS technique
by: Al-Bashiri, Hael, et al.
Published: (2018)
by: Al-Bashiri, Hael, et al.
Published: (2018)
Implementing artificial neural networks and genetic algorithms to solve modeling and optimisation of blogas production
by: Fakharudin, Abdul Sahli, et al.
Published: (2013)
by: Fakharudin, Abdul Sahli, et al.
Published: (2013)
Software Requirements Prioritisation: A Systematic Literature Review on Significance, Stakeholders, Techniques and Challenges
by: Hujainah, Fadhl, et al.
Published: (2018)
by: Hujainah, Fadhl, et al.
Published: (2018)
Modelling and optimisation of oil palm trunk core biodelignification using neural network and genetic algorithm
by: Abdul Sahli, Fakharudin, et al.
Published: (2019)
by: Abdul Sahli, Fakharudin, et al.
Published: (2019)
2DCBS: A Model for Developing Dependable Component-Based Software
by: Kahtan, Hasan, et al.
Published: (2016)
by: Kahtan, Hasan, et al.
Published: (2016)
Quality model for web services from multi-stakeholders' perspective
by: Balfagih, Z., et al.
Published: (2009)
by: Balfagih, Z., et al.
Published: (2009)
Model optimization using artificial intelligence algorithms for biological food waste degradation
by: N., Zainol, et al.
Published: (2020)
by: N., Zainol, et al.
Published: (2020)
Artificial Neural Network Modelling of Biogas Production Processes
by: Abdul Sahli, Fakharudin, et al.
Published: (2018)
by: Abdul Sahli, Fakharudin, et al.
Published: (2018)
Application of Fuzzy Logic Controller for Safe Braking System: An Anti-Theft Tracking
by: Kahtan, Hasan, et al.
Published: (2018)
by: Kahtan, Hasan, et al.
Published: (2018)
Modelling of biogas production process with evolutionary artificial neural network and genetic algorithm
by: Fakharudin, Abdul Sahli
Published: (2017)
by: Fakharudin, Abdul Sahli
Published: (2017)
Development of images segmentation using image thresholder and batch processing technique on the blood smears
by: Al-Shoukry, Suhad, et al.
Published: (2022)
by: Al-Shoukry, Suhad, et al.
Published: (2022)
Automotive anti-theft system using fuzzy logic method
by: Kahtan, Hasan, et al.
Published: (2017)
by: Kahtan, Hasan, et al.
Published: (2017)
Sustainable supply chain management: issues & challenges identification
by: Arwa, Mukhtar, et al.
Published: (2018)
by: Arwa, Mukhtar, et al.
Published: (2018)
eSurvia : a web-based survey tool using fuzzy conjoint analysis
by: Ayu, Media Anugerah, et al.
Published: (2011)
by: Ayu, Media Anugerah, et al.
Published: (2011)
A semi-automated requirements prioritisation technique for scalable requirements with stakeholder quantification and prioritisation
by: Hujainah, Fadhl Mohammed Omar
Published: (2019)
by: Hujainah, Fadhl Mohammed Omar
Published: (2019)
Stakeholder quantification and prioritisation research: A systematic literature review
by: Hujainah, Fadhl, et al.
Published: (2018)
by: Hujainah, Fadhl, et al.
Published: (2018)
A survey of arabic text mining
by: Salloum, Said A., et al.
Published: (2017)
by: Salloum, Said A., et al.
Published: (2017)
Heart disease diagnosis system using fuzzy logic
by: Hasan, Kahtan, et al.
Published: (2018)
by: Hasan, Kahtan, et al.
Published: (2018)
A survey of statistical approaches for query expansion
by: Raza, Muhammad Ahsan, et al.
Published: (2018)
by: Raza, Muhammad Ahsan, et al.
Published: (2018)
Multi-objective model optimisation using genetic algorithms for pleurotus sp. cultivation
by: Norazwina, Zainol, et al.
Published: (2020)
by: Norazwina, Zainol, et al.
Published: (2020)
E-Learning: Introduction To Personal Computers/ Anwar Ahmad
by: Anwar, Ahmad
Published: (2001)
by: Anwar, Ahmad
Published: (2001)
A Survey of Petri Net Tools
by: Thong, Weng Jie, et al.
Published: (2015)
by: Thong, Weng Jie, et al.
Published: (2015)
Application of Travelling Salesman Problem for Minimizing Travel Distance of a Two-Day Trip in Kuala Lumpur via Go KL City Bus
by: Wan Nor Ashikin, Wan Ahmad Fatthi, et al.
Published: (2019)
by: Wan Nor Ashikin, Wan Ahmad Fatthi, et al.
Published: (2019)
A Systematic Survey on the Research of AI-predictive Models for Wastewater Treatment Processes
by: Mohan, Varun Geetha, et al.
Published: (2023)
by: Mohan, Varun Geetha, et al.
Published: (2023)
A detailed survey on various aspects of SQL Injection: vulnerabilities, innovative attacks, and remedies
by: Diallo , Abdoulaye Kindy, et al.
Published: (2011)
by: Diallo , Abdoulaye Kindy, et al.
Published: (2011)
Interaction Protocol For Agent-Based E-Learning System
by: Latif, N.A., et al.
Published: (2009)
by: Latif, N.A., et al.
Published: (2009)
A Study on the Factors That Influence the Consumers’ Trust on E-commerce Adoption
by: YiYi, Thaw, et al.
Published: (2009)
by: YiYi, Thaw, et al.
Published: (2009)
Large-scale Kinetic Parameter Identification of Metabolic Network Model of E. coli using PSO
by: Azrag, M. A. K., et al.
Published: (2015)
by: Azrag, M. A. K., et al.
Published: (2015)
Multi-frame super-resolution: a survey
by: Khattab, Mahmoud, et al.
Published: (2019)
by: Khattab, Mahmoud, et al.
Published: (2019)
A Better Way for Exon Identification in DNA Splicing
by: Ahmad, Muneer, et al.
Published: (2010)
by: Ahmad, Muneer, et al.
Published: (2010)
A taxonomy and survey of semantic approaches for query expansion
by: Raza, Muhammad Ahsan, et al.
Published: (2019)
by: Raza, Muhammad Ahsan, et al.
Published: (2019)
A detailed survey on various aspects of SQL injection in web applications: vulnerabilities, innovative attacks and remedies
by: Diallo , Abdoulaye Kindy, et al.
Published: (2013)
by: Diallo , Abdoulaye Kindy, et al.
Published: (2013)
Similar Items
-
Investigating internet of things impact on e-Learning system: An overview
by: Elneel, Duha Awad H., et al.
Published: (2023) -
Stakeholder identification overview and challenges in requirements engineering prospective
by: Elneel, Duha Awad, et al.
Published: (2022) -
Test case selection for penetration testing in mobile cloud computing applications: A proposed technique
by: Al-Ahmad, Ahmad Salah, et al.
Published: (2018) -
Web Phishing Classification Model using Artificial Neural Network and Deep Learning Neural Network
by: Noor Hazirah, Hassan, et al.
Published: (2023) -
Fuzz test case generation for penetration testing in mobile cloud computing applications
by: Al-Ahmad, Ahmad Salah, et al.
Published: (2018)