The evolution of mobile market has pushed organization and application developers to always catch... more The evolution of mobile market has pushed organization and application developers to always catching up with the latest innovation of mobile technology. In terms of mobile application architecture, it is always been a dilemma whether to build an application as a native application or web-based application. This paper discusses about the suitability of mobile application architecture for educational purpose applications such as e-learning. It will focus on native application with a comparison of web-based application. This paper also discusses the importance of hybrid development approach as an alternative strategy in the development of mobile application.
Mobile messaging applications is rapid adopted globally. They allow mobile users to send messages... more Mobile messaging applications is rapid adopted globally. They allow mobile users to send messages to individuals or groups for very minimal fee, even some are totally free as long as the smartphones are connected to internet. WhatsApp is one of the top mobile messaging applications among a handful number of applications that have entered the market. The goal of this paper is to investigate the most favourable mobile messaging apps among IIUM students and to provide a feature comparison between a few selected mobile messaging applications. Despite the obvious of being a free application, this paper intends to investigate the other factors causing the widespread adoption of this mobile application especially among students. An online survey was distributed to 52 students from IIUM by using Google Docs to validate which mobile messaging applications are mostly used. Keywords: Mobile messaging apps, mobile instant messaging, smartphones, SMS, WhatsApp, features, IIUM
The use of wireless and mobile devices especially smartphones has become the norm nowadays. The e... more The use of wireless and mobile devices especially smartphones has become the norm nowadays. The emerging and advancement of wireless and mobile devices has brought the issue of security breaches and attacks back into focus. Many users are not aware of the security issues related to wireless and mobile devices. This has resulted in devices becoming attractive targets for malicious attack. In this paper, we discuss and analyze the factors of attack on mobile and wireless platforms and give in-depth overview of the attack mechanism. It is hoped that users will become aware and alert about the security issues and subsequently take the necessary action and precaution to protect themselves.
Wireless Sensor Networks (WSNs) have established themselves as the modern and future standard whe... more Wireless Sensor Networks (WSNs) have established themselves as the modern and future standard when it comes to networking applications. Wireless Sensor Networks (WSNs) are self-configured, infrastructure-less and consist of numerous nodes, which form the network structure. They have seen a variety of use in modern measurement and environmental analysis applications over the recent years and such applications of wireless sensor networks are being continuously studied and developed for even better overall performance. The nature and setup of wireless sensor networks allows for some important applications such as monitoring physical and environmental conditions like temperature, sound, vibrations, pressure and motion. As per the wireless sensor network structure, these measurements are then transferred to sinks and base stations from the nodes, for further study and analysis, basically the usage of data. This wireless sensor network standard does come with a few of its own problems, wh...
Humans have created a lot of garbage on earth surface to which we can see, but up in the atmosphe... more Humans have created a lot of garbage on earth surface to which we can see, but up in the atmosphere, unbelievably the amount of junk human have created in space is equally colossal. The main topic of this paper is to discuss space debris particularly in LEO orbit. The discussion starts with the satellites basic characteristics and move on to debris history and development. Some previous studies and researches done with regard to the debris conditions are discussed. Statistics on the debris growth and its impact to the active satellite and space craft’s located in LEO orbit are presented. Finally, the paper mentioned on space debris removal system. The main question this paper tries to address is why LEO orbit has the most number of debris and the impact of the growth to the future.
The main aim of this study is to examine the role of specific organizational climate and individu... more The main aim of this study is to examine the role of specific organizational climate and individual acceptance factors on knowledge management behavior within an organizational context. A hypothetical conceptual research framework was developed based on knowledge creation theory and previous studies. Data were collected from 74 corporate practitioners in Malaysia using a self-administered online questionnaire. Though the linear regression analysis supports all proposed hypotheses, according to stepwise multiple regressions analysis decentralized decision making structure and Information Technology support emerged as the significant predictors of KM behavior.
Bulletin of Electrical Engineering and Informatics, 2018
In this paper, we investigated the knowledge management (KM) behavior of executives in Malaysia w... more In this paper, we investigated the knowledge management (KM) behavior of executives in Malaysia who work in different sectors and involved in Information Technology (IT) related fields. We proposed a conceptual framework based on the Theory of Reasoned Action (TRA), the Theory of Planned Behavior (TPB) and Unified Theory of Acceptance and Use of Technology (UTAUT) to study their intention and involvement in KM initiatives. The knowledge creation theory (SECI process) was employed to operationalize KM intention and KM behavior. We proposed six independent variables that represent the social-cultural nature of KM as the antecedence of KM intention. These variables are trust, management support, decentralization, IT support, performance expectancy (PE), and effort expectancy (EE). Seventy-four executives from both private and government-linked organizations responded to our online questionnaire. SmartPLS3 was used to run the analysis. The reliability was ensured with the factor loading...
The evolution of mobile market has pushed organization and application developers to always catch... more The evolution of mobile market has pushed organization and application developers to always catching up with the latest innovation of mobile technology. In terms of mobile application architecture, it is always been a dilemma whether to build an application as a native application or web-based application. This paper discusses about the suitability of mobile application architecture for educational purpose applications such as e-learning. It will focus on native application with a comparison of web-based application. This paper also discusses the importance of hybrid development approach as an alternative strategy in the development of mobile application.
Mobile messaging applications is rapid adopted globally. They allow mobile users to send messages... more Mobile messaging applications is rapid adopted globally. They allow mobile users to send messages to individuals or groups for very minimal fee, even some are totally free as long as the smartphones are connected to internet. WhatsApp is one of the top mobile messaging applications among a handful number of applications that have entered the market. The goal of this paper is to investigate the most favourable mobile messaging apps among IIUM students and to provide a feature comparison between a few selected mobile messaging applications. Despite the obvious of being a free application, this paper intends to investigate the other factors causing the widespread adoption of this mobile application especially among students. An online survey was distributed to 52 students from IIUM by using Google Docs to validate which mobile messaging applications are mostly used. Keywords: Mobile messaging apps, mobile instant messaging, smartphones, SMS, WhatsApp, features, IIUM
The use of wireless and mobile devices especially smartphones has become the norm nowadays. The e... more The use of wireless and mobile devices especially smartphones has become the norm nowadays. The emerging and advancement of wireless and mobile devices has brought the issue of security breaches and attacks back into focus. Many users are not aware of the security issues related to wireless and mobile devices. This has resulted in devices becoming attractive targets for malicious attack. In this paper, we discuss and analyze the factors of attack on mobile and wireless platforms and give in-depth overview of the attack mechanism. It is hoped that users will become aware and alert about the security issues and subsequently take the necessary action and precaution to protect themselves.
Wireless Sensor Networks (WSNs) have established themselves as the modern and future standard whe... more Wireless Sensor Networks (WSNs) have established themselves as the modern and future standard when it comes to networking applications. Wireless Sensor Networks (WSNs) are self-configured, infrastructure-less and consist of numerous nodes, which form the network structure. They have seen a variety of use in modern measurement and environmental analysis applications over the recent years and such applications of wireless sensor networks are being continuously studied and developed for even better overall performance. The nature and setup of wireless sensor networks allows for some important applications such as monitoring physical and environmental conditions like temperature, sound, vibrations, pressure and motion. As per the wireless sensor network structure, these measurements are then transferred to sinks and base stations from the nodes, for further study and analysis, basically the usage of data. This wireless sensor network standard does come with a few of its own problems, wh...
Humans have created a lot of garbage on earth surface to which we can see, but up in the atmosphe... more Humans have created a lot of garbage on earth surface to which we can see, but up in the atmosphere, unbelievably the amount of junk human have created in space is equally colossal. The main topic of this paper is to discuss space debris particularly in LEO orbit. The discussion starts with the satellites basic characteristics and move on to debris history and development. Some previous studies and researches done with regard to the debris conditions are discussed. Statistics on the debris growth and its impact to the active satellite and space craft’s located in LEO orbit are presented. Finally, the paper mentioned on space debris removal system. The main question this paper tries to address is why LEO orbit has the most number of debris and the impact of the growth to the future.
The main aim of this study is to examine the role of specific organizational climate and individu... more The main aim of this study is to examine the role of specific organizational climate and individual acceptance factors on knowledge management behavior within an organizational context. A hypothetical conceptual research framework was developed based on knowledge creation theory and previous studies. Data were collected from 74 corporate practitioners in Malaysia using a self-administered online questionnaire. Though the linear regression analysis supports all proposed hypotheses, according to stepwise multiple regressions analysis decentralized decision making structure and Information Technology support emerged as the significant predictors of KM behavior.
Bulletin of Electrical Engineering and Informatics, 2018
In this paper, we investigated the knowledge management (KM) behavior of executives in Malaysia w... more In this paper, we investigated the knowledge management (KM) behavior of executives in Malaysia who work in different sectors and involved in Information Technology (IT) related fields. We proposed a conceptual framework based on the Theory of Reasoned Action (TRA), the Theory of Planned Behavior (TPB) and Unified Theory of Acceptance and Use of Technology (UTAUT) to study their intention and involvement in KM initiatives. The knowledge creation theory (SECI process) was employed to operationalize KM intention and KM behavior. We proposed six independent variables that represent the social-cultural nature of KM as the antecedence of KM intention. These variables are trust, management support, decentralization, IT support, performance expectancy (PE), and effort expectancy (EE). Seventy-four executives from both private and government-linked organizations responded to our online questionnaire. SmartPLS3 was used to run the analysis. The reliability was ensured with the factor loading...
Uploads