default search action
Mohd Heikal Husin
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j13]Zaher Ali Al-Sai, Mohd Heikal Husin, Sharifah Mashita Syed-Mohamad, Rosni Abdullah, Raed Abu Zitar, Laith Abualigah, Amir H. Gandomi:
Big Data Maturity Assessment Models: A Systematic Literature Review. Big Data Cogn. Comput. 7(1): 2 (2023) - [j12]Abubakar Mu'azu Ahmed, Nor Athiyah Abdullah, Mohd Heikal Husin, Hassan Bello:
Intention to Participate in MOOCs: Case of University Students in Northwestern Nigeria During COVID-19 Pandemic. Int. J. Interact. Mob. Technol. 17(7): 97-117 (2023) - [j11]Arif Mahmud, Mohd Najwadi Yusoff, Mohd Heikal Husin:
Generation Z's adoption of IoT: protection motivation theory as the underlying model and gender as a moderator. J. Syst. Inf. Technol. 25(2): 133-159 (2023) - 2022
- [j10]Saravanan Sagadevan, Nurul Hashimah Ahamed Hassain Malim, Mohd Heikal Husin:
A Seed-Guided Latent Dirichlet Allocation Approach to Predict the Personality of Online Users Using the PEN Model. Algorithms 15(3): 87 (2022) - [j9]Zaher Ali Al-Sai, Mohd Heikal Husin, Sharifah Mashita Syed-Mohamad, Rasha Moh'd Sadeq Abdin, Nour Damer, Laith Abualigah, Amir H. Gandomi:
Explore Big Data Analytics Applications and Opportunities: A Review. Big Data Cogn. Comput. 6(4): 157 (2022) - [j8]Idris Na'umma Abdullahi, Mohd Heikal Husin, Ahmad Suhaimi Baharudin, Nor Athiyah Abdullah:
Determinants of Facebook adoption and its impact on service-based small and medium enterprise performance in northwestern Nigeria. J. Syst. Inf. Technol. 24(3): 246-267 (2022) - 2021
- [j7]Hala Najwan Sabeh, Mohd Heikal Husin, Daisy Mui Hung Kee, Ahmad Suhaimi Baharudin, Rosni Abdullah:
A Systematic Review of the DeLone and McLean Model of Information Systems Success in an E-Learning Context (2010-2020). IEEE Access 9: 81210-81235 (2021) - 2020
- [j6]Zaher Ali Al-Sai, Rosni Abdullah, Mohd Heikal Husin:
Critical Success Factors for Big Data: A Systematic Literature Review. IEEE Access 8: 118940-118956 (2020) - [j5]Zainun Mustafa, Mohd Heikal Husin, Sharifah Mashita Syed-Mohamad, Nor Athiyah Abdullah:
Global Research Trends in Pro-Environmental Behaviour (PEB) Studies in the Field of Computer Science from 1976-2019: A Bibliometric Analysis. J. Sci. Res. 9(2): 136-145 (2020)
2010 – 2019
- 2019
- [j4]Nurul Atikah Ahmad Rosli, Mohd Heikal Husin:
Initial Exploration on an Effective Social Media Analytics Method and Algorithm for Instagram Hashtags. Int. J. E Bus. Res. 15(3): 1-15 (2019) - [c8]Sharifah Mashita Syed-Mohamad, Mohd Heikal Husin, Wan Mohd Nazmee Wan Zainon:
Visualizing Test-Defect Coverage Information to Support Analytical Reasoning and Testing. ICSCA 2019: 184-188 - [c7]Mahmoud Mohammad Ahmad Ibrahim, Sharifah Mashita Syed-Mohamad, Mohd Heikal Husin:
Managing Quality Assurance Challenges of DevOps through Analytics. ICSCA 2019: 194-198 - 2018
- [r2]Mohd Heikal Husin, Jo Hanisch:
Social Media Policy in the Workplace: User Awareness. Encyclopedia of Social Network Analysis and Mining. 2nd Ed. 2018 - 2017
- [j3]Manmeet Mahinderjit Singh, Ping Jie Ng, Kar Ming Yap, Mohd Heikal Husin, Nurul Hashimah Ahamed Hassain Malim:
Cyberbullying and a Mobile Game App? An Initial Perspective on an Alternative Solution. J. Inf. Process. Syst. 13(3): 559-572 (2017) - [j2]Mohd Heikal Husin, Niloufar Loghmani, Siti Salbiah Zainal Abidin:
Increasing e-government adoption in Malaysia: MyEG case study. J. Syst. Inf. Technol. 19(3/4): 202-227 (2017) - [c6]Lok Li Ching, Nurul Hashimah Ahamed Hassain Malim, Mohd Heikal Husin, Manmeet Mahinderjit Singh:
Smart university: reservation system with contactless technology. ICC 2017: 9:1-9:6 - 2016
- [j1]Mohd Heikal Husin, Nina Evans, Gaye Deegan:
Achieving adoption and effective usage of Web 2.0 among employees within Australian government organizations. J. Syst. Inf. Technol. 18(1): 41-63 (2016) - 2015
- [c5]Cheah Boon Chew, Kam Chiang Wei, Tan Wei Sheng, Manmeet Mahinderjit Singh, Nurul Hashimah Ahamed Hassain Malim, Mohd Heikal Husin:
Security Challenges and Mitigations of NFC-Enabled Attendance System. ICSI (2) 2015: 160-167 - 2014
- [r1]Mohd H. Husin, Jo Hanisch:
Social Media Policy in the Workplace: User Awareness. Encyclopedia of Social Network Analysis and Mining 2014: 1819-1824 - 2013
- [c4]Mohd Heikal Husin, Nina Evans, Gaye Deegan:
A Rating Tool for Effective Social Media Policy Development. ACIS 2013: 10 - 2011
- [c3]Mohd H. Husin, Jo Hanisch:
Social media and organisation policy (someop): finding the perfect balance. ECIS 2011: 253 - [c2]Mohd H. Husin, Jo Hanisch:
Utilising the social media and organisation policy (someop) framework: an example of organisational policy development within a public sector entity. ECIS 2011: 264 - 2010
- [c1]Mohd Heikal Husin, Paula M. C. Swatman:
Removing the barriers to enterprise 2.0. ISTAS 2010: 275-283
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-23 18:31 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint