Author of the publication

Analysis of Applying Enterprise Service Bus Architecture as a Cloud Interoperability and Resource Sharing Platform.

, , and . KMO, volume 172 of Advances in Intelligent Systems and Computing, page 581-588. Springer, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A framework for integrated risk management process using survival analysis approach in information security., , and . IAS, page 185-190. IEEE, (2010)Constructing Conceptual Model for Security Culture in Health Information Systems Security Effectiveness., , and . WorldCIST, volume 206 of Advances in Intelligent Systems and Computing, page 213-220. Springer, (2013)Healthcare practitioner behaviours that influence unsafe use of hospital information systems., , , , , , and . Health Informatics J., (2020)Development of Malaysian Digital Forensics Investigator Competency Identification Methods., , and . AMLTA, volume 322 of Communications in Computer and Information Science, page 554-565. Springer, (2012)Data Anonymization According to the Combination of Attributes on Social Network Sites., , and . SSCC, volume 377 of Communications in Computer and Information Science, page 272-280. Springer, (2013)Ethical awareness of computer use among undergraduate students., , and . SIGCAS Comput. Soc., 39 (1): 27-40 (2009)Examining Factors Influencing IT Outsourcing Success in Malaysian Organizations., , , and . ACIS, (2006)Safety Use of Hospital Information Systems: A Preliminary Investigation., and . KMO, volume 224 of Lecture Notes in Business Information Processing, page 707-721. Springer, (2015)Effectiveness of Using Integrated Algorithm in Preserving Privacy of Social Network Sites Users., , and . DICTAP (2), volume 167 of Communications in Computer and Information Science, page 237-249. Springer, (2011)Classification of Third-Party Applications on Facebook to Mitigate Users' Information Leakage., , and . WorldCIST (1), volume 569 of Advances in Intelligent Systems and Computing, page 144-154. Springer, (2017)