-
1
Spam e-mail: how Malaysian e-mail users deal with it?
Published 2010“…This paper attempts to discuss the spam issue from the Malaysian e-mail users’ perspective. The purpose is to discover how Malaysian users handle the spam e-mail problem. …”
Get full text
Proceeding Paper -
2
Operations strategy of a grocery chain in Malaysia
Published 2013Subjects: “…HF5460 Department stores. Mail order business. Supermarkets. Convenience stores…”
Get full text
Get full text
Proceeding Paper -
3
A novel algorithm to prevent man in the middle attack in LAN environment
Published 2010“…This paper analyzes HTTPS connections against MITM by simulating real MITM attacks on different HTTPS connections such as Gmail, Yahoo Mail and Bank accounts. It was found that with the use of right tools, HTTPS connections can be broken and passwords can be sniffed and viewed in plain text. …”
Get full text
Proceeding Paper -
4
Environmental scanning practice of enterprise 50 Small Medium Enterprise (E50 SMEs) in Malaysia
Published 2011“…Based on the constructs of the measures, a research scale was developed for the study and data were collected via self-administered mail survey among the E50 SMEs in Malaysia. The results showed positive effects of organizational and owner/ manager profile on environmental scanning practice of E50 SMEs. …”
Get full text
Proceeding Paper -
5
Reconstituting the concepts of sustainable stormwater management
Published 2013“…Online journal, forum discussion and e-mail interview were used as methods of data collection in this qualitative research. …”
Get full text
Proceeding Paper -
6
Handwritten Arabic word recognition: A review of common approaches
Published 2008“…However, an automatic recognition of text on scanned images has enabled many applications such as words spotting in large volumes of documents, automatic sorting of postal mail, and convenient editing of previously printed documents. …”
Get full text
Proceeding Paper -
7
Design of robust protocol to enhance QoS in mobile IPV6 environment
Published 2010“…The best-effort delivery works fine with the conventional Internet applications like remote login, electronic mail and file transfer. Nevertheless, the real-time applications like video telephony or virtual conferencing require special QoS. …”
Get full text
Proceeding Paper -
8
Myths and realities of digital reference services: perspectives of libraries from developing countries
Published 2011“…A library that operates traditional services where a user is provided with answers through personal contact, normal mail, or telephone is treated as having zero maturity. …”
Get full text
Proceeding Paper -
9
Audit committees and internal auditors in Malaysia
Published 2007“…Hence, we would like to explore that when the CAE has direct communication with AC such as CAE reports directly to AC and CAE has private meetings with AC; is there an association that (a) AC is responsible for the appointment of CAE, determines remuneration, and department’s budget, and (b) AC periodically approves and evaluates the audit plan, the performance, independence, scope and activities of the internal and external auditors? Mailed questionnaires were used as research instruments and were sent to audit committees and internal auditors working or attached to companies in Kuala Lumpur and Selangor (Malaysia). …”
Get full text
Get full text
Get full text
Proceeding Paper -
10
English literary studies: Islamic perspective and method
Published 2014Get full text
Get full text
Get full text
Proceeding Paper