Search Results - Ismail, Zuraini
- Showing 1 - 20 results of 31
- Go to Next Page
-
1
Antecedents influencing IT outsourcing success by Ismail, Zuraini, Hussin, Husnayati, Abdul Karim, Noor Shahriza, Suhaimi, Mohd Adam
Published 2008Get full text
Get full text
Get full text
Book Chapter -
2
Examining IT outsourcing success constructs by Ismail, Zuraini, Hussin, Husnayati, Abdul Karim, Noor Shahriza, Suhaimi, Mohd Adam
Published 2008Get full text
Get full text
Get full text
Book Chapter -
3
Paradigm shift: outsourcing decision Bandwagon by Ismail, Zuraini, Hussin, Husnayati, Abdul Karim, Noor Shahriza, Suhaimi, Mohd Adam
Published 2008Get full text
Get full text
Get full text
Book Chapter -
4
Examining factors influencing IT outsourcing success in Malaysian organizations by Hussin, Husnayati, Ismail, Zuraini, Suhaimi, Mohd. Adam, Abdul Karim, Noor Shahriza
Published 2006Get full text
Get full text
Conference or Workshop Item -
5
Development of an instrument to measure smart card technology acceptance by Taherdoost, Hamed, Masrom, Maslin, Ismail, Zuraini
Published 2009Get full text
Get full text
Get full text
Conference or Workshop Item -
6
Moderating Impact of IT Outsourcing Arrangements in a Muslim Country by Ismail, Zuraini
Published 2006Get full text
Get full text
Get full text
Conference or Workshop Item -
7
Users’ perception on the information security policy of the institutions of higher learning by Sharif, Haniza, Ismail, Zuraini, Masrom, Maslin
Published 2009Get full text
Get full text
Get full text
Conference or Workshop Item -
8
Towards sustainability of EA practices: A systematic review by Hussein, Surya Sumarni, Ismail, Zuraini, Mat Taib, Mohamad Zainuddi
Published 2016Get full text
Get full text
Conference or Workshop Item -
9
-
10
Health Information Security Guidelines for Healthcare Information Systems by Narayanan Samy , Ganthan, Ahmad , Rabiah, Ismail , Zuraini
Published 2011Get full text
Get full text
Conference or Workshop Item -
11
-
12
Analyzing accuracy and accessibility in ICT ethical scenario context by Masrom, Maslin, Ismail, Zuraini, Anuar, Rashidah Nural, Hussein, Ramlah, Mohamed, Norshidah
Published 2010Get full text
Get full text
Get full text
Conference or Workshop Item -
13
-
14
-
15
Privacy models for protecting personal medical information: a preliminary study by Samsuri, Suhaila, Ismail, Zuraini, Ahmad, Rabiah
Published 2011Get full text
Get full text
Get full text
Proceeding Paper -
16
-
17
Knowledge sharing role in IT outsourcing by Ismail, Zuraini, Hussin, Husnayati, Suhaimi, Mohd. Adam, Abdul Karim, Nor Shahriza
Published 2005Get full text
Get full text
Conference or Workshop Item -
18
Research in progress - evaluation of smart card acceptance : security, technology and usage by Taherdoost, Hamed, Masrom, Maslin, Ismail, Zuraini
Published 2009Get full text
Get full text
Get full text
Conference or Workshop Item -
19
User-centered evaluation of privacy models for protecting personal medical information by Samsuri, Suhaila, Ismail, Zuraini, Ahmad, Rabiah
Published 2011Get full text
Get full text
Get full text
Proceeding Paper -
20
