- Conference name: 2nd International Conference on Information and Communication Technology 2018 (ICICTM 2018)
- Start Date: 2018-05-03
- End Date: 2018-05-05
- Country: Malaysia
- Website: http://www.icictm.org/
Table of Contents
Articles
Analysis of Factors Affecting Motivation of Manager Work |
![]() ![]() |
Togu Harlen Lbn. Raja, ![]() ![]() DOI: 10.14419/ijet.v7i4.29.21586 |
Trust, Technology Awareness and Satisfaction Effect into the Intention to Use Cryptocurrency among Generation Z in Malaysia |
![]() ![]() |
Omar Alaeddin, ![]() ![]() DOI: 10.14419/ijet.v7i4.29.21588 |
The Implementation of Musharakah Financing in Indonesia; a Legal Regulatory Perspective |
![]() ![]() |
Gunawan Widjaja ![]() DOI: 10.14419/ijet.v7i4.29.21589 |
Islamic Ethics in Business Management: the Case of Transacting Parties |
![]() ![]() |
Chaibou Issoufou ![]() DOI: 10.14419/ijet.v7i4.29.21590 |
Significant Elements of Islamic Capital Market |
![]() |
Chaibou Issoufou ![]() DOI: 10.14419/ijet.v7i4.29.21592 |
Corporate Governance and Leadership from an Islamic Perspective |
![]() ![]() |
Khaliq Ahmad ![]() DOI: 10.14419/ijet.v7i4.29.21593 |
Smart Phones and Brand Equity: a Study of Malaysian Consumer Buying Behavior |
![]() ![]() |
Gholam Reza Zandi, ![]() ![]() ![]() ![]() DOI: 10.14419/ijet.v7i4.29.21594 |
The Preferences of Muslim Consumers’ Behaviour on Halal Food based on the Utility Maximization Theory |
![]() ![]() |
Weni Hawariyuni, ![]() ![]() DOI: 10.14419/ijet.v7i4.29.21670 |
The Maneuver Capability of Malaysian Chinese Business During the Era of New Economic Policy |
![]() ![]() |
Abdul Halim Sidek ![]() DOI: 10.14419/ijet.v7i4.29.21674 |
The Impact of Online Business on Malaysian Taxation |
![]() ![]() |
Morni Hayati Jaafar Sidik ![]() DOI: 10.14419/ijet.v7i4.29.21676 |
The Repurchase Intention Development: the Case of Birds Nest Market Consumers in China |
![]() ![]() |
Nik Khadijah Nik Abdul Rahman, ![]() ![]() ![]() DOI: 10.14419/ijet.v7i4.29.21678 |
Factors Affecting Institutional Performance: a Case of Azad Jammu Kashmir Colleges |
![]() ![]() |
Mushtaq Haider Malik, ![]() ![]() ![]() DOI: 10.14419/ijet.v7i4.29.21680 |
Capital Structure Determinants of Firms at Bursa Malaysia |
![]() ![]() |
Abdul Razak Abdul Hadi, ![]() ![]() ![]() ![]() DOI: 10.14419/ijet.v7i4.29.21688 |
M-Commerce Role of Device Features towards Intention to Use of |
![]() ![]() |
Shamsudin M.F, ![]() ![]() ![]() ![]() DOI: 10.14419/ijet.v7i4.29.21694 |
Exploring the Barriers to Internationalisation for Malaysian SMEs |
![]() ![]() |
Muhammad Asyraf Hasim, ![]() ![]() ![]() DOI: 10.14419/ijet.v7i4.29.21695 |
Measuring the Effectiveness of Zakat in Alleviating Pakistan’s Poverty: a Revisit |
![]() ![]() |
Naziruddin Abdullah ![]() DOI: 10.14419/ijet.v7i4.29.21703 |
Proposing a Theoretical Framework of the Successful Factors of Microenterprises in Indonesia |
![]() ![]() |
Weni Hawariyuni, ![]() ![]() DOI: 10.14419/ijet.v7i4.29.21705 |
Voluntary Disclosure Practices in the Family Business Context: the Case of Listed Family-Controlled Companies in Malaysia |
![]() ![]() |
Syeliya Md Zaini ![]() DOI: 10.14419/ijet.v7i4.29.21706 |
Are Current Shariah Governance Systems Efficient? |
![]() ![]() |
Mazhar Hallak Kantakji, ![]() ![]() ![]() ![]() DOI: 10.14419/ijet.v7i4.29.21708 |
Investigating the Agricultural Applications of Acryl Amide based Hydrogel |
![]() ![]() |
M. A. Radwan, ![]() ![]() ![]() ![]() DOI: 10.14419/ijet.v7i4.29.21711 |
The Effectiveness of Using Malay Affixes for Handling Unknown Words In Unsupervised HMM POS Tagger |
![]() ![]() |
Hassan Mohamed, ![]() ![]() ![]() DOI: 10.14419/ijet.v7i4.29.21834 |
Data Analytics in the Utilization of ICT for Disaster Preparedness Plan of HEIs Region V |
![]() ![]() |
Maria Charmy A. Arispe, ![]() ![]() ![]() DOI: 10.14419/ijet.v7i4.29.21839 |
Predicting User Navigation in an Online Newspaper Site Using Association Rules Mining and Markov Model |
![]() ![]() |
Husna Sarirah Husin ![]() DOI: 10.14419/ijet.v7i4.29.21840 |
Dissemination Model for Critical Governments Information |
![]() ![]() |
Najd Al Osaimi, ![]() ![]() DOI: 10.14419/ijet.v7i4.29.21841 |
Fusion of Active Appearance Model and Histogram of Oriented Gradient for Age Estimation |
![]() ![]() |
Quan Yan Chang, ![]() ![]() ![]() DOI: 10.14419/ijet.v7i4.29.21849 |
Exploration of Factors That Influence Information Security Education |
![]() ![]() |
Ahmed Ali Otman Gouni, ![]() ![]() ![]() DOI: 10.14419/ijet.v7i4.29.21850 |
The Intelligent System in IT Governance: A review pointing the Institute of Higher Learning in Malaysia |
![]() ![]() |
Amalia Mukhlas, ![]() ![]() ![]() DOI: 10.14419/ijet.v7i4.29.21851 |
Deep Convolutional Generative Adversarial Networks for Intent-based Dynamic Behavior Capture |
![]() ![]() |
Salman Jan, ![]() ![]() ![]() ![]() DOI: 10.14419/ijet.v7i4.29.21949 |
Food Truck Application in Social Computing |
![]() ![]() |
Bazilah A. Talip, ![]() ![]() DOI: 10.14419/ijet.v7i4.29.21951 |
Cloud Based Intrusion Detection Conceptual Model for IoT Objects |
![]() ![]() |
Abdulaziz Aborujilah, ![]() ![]() ![]() DOI: 10.14419/ijet.v7i4.29.21953 |
Confidentiality and Integrity of the Biometric Fingerprint Template Protection |
![]() ![]() |
Taqiyah Khadijah Ghazali, ![]() ![]() DOI: 10.14419/ijet.v7i4.29.21956 |
Vertical Handover Evaluation for Heterogeneous Networks |
![]() ![]() |
Mohd Taha Ismail, ![]() ![]() ![]() ![]() DOI: 10.14419/ijet.v7i4.29.21960 |
Extended Design Science Research Methodology For Parallel Vision System |
![]() ![]() |
Deshinta Arrova Dewi, ![]() ![]() DOI: 10.14419/ijet.v7i4.29.21962 |
Human Intruder Detection using MANET Technology |
![]() ![]() |
Irma Syarlina Che Ilias, ![]() ![]() DOI: 10.14419/ijet.v7i4.29.21963 |
Spike Response Function Weight and Delay Updating Strategy Using Delay Rules |
![]() ![]() |
Abdullah H. Almasri, ![]() ![]() ![]() DOI: 10.14419/ijet.v7i4.29.21965 |
Android based Parental Monitoring Apps |
![]() ![]() |
Dalilah Abdullah, ![]() ![]() ![]() DOI: 10.14419/ijet.v7i4.29.21967 |
Fingerprinting Smartphones Remotely via Sensors Data |
![]() ![]() |
Ahmed Al- Haiqi ![]() DOI: 10.14419/ijet.v7i4.29.21968 |
Mobile Crowd Sensing Application for Noise Monitoring in Kuala Lumpur |
![]() ![]() |
Rashid Zafar, ![]() ![]() ![]() ![]() ![]() DOI: 10.14419/ijet.v7i4.29.21969 |
Simulation Technique of Steady-State Network based on AODV Routing Protocol |
![]() ![]() |
Kolade T. Ayanwuyi, ![]() ![]() ![]() ![]() DOI: 10.14419/ijet.v7i4.29.21959 |
The Design of Promoting Building Energy Saver with Mobile Controller |
![]() ![]() |
Nor Azliana Akmal Jamaludin, ![]() ![]() ![]() ![]() DOI: 10.14419/ijet.v7i4.29.26255 |
The Effect of Internet of Things (IoT) Towards Social Sciences Student’s Performance |
![]() ![]() |
Farahwahida Mohd, ![]() ![]() ![]() DOI: 10.14419/ijet.v7i4.29.26256 |
Protecting Online Privacy by Heightening Communication Path Using Different Hops Path Tor |
![]() ![]() |
Amna Saad, ![]() ![]() ![]() DOI: 10.14419/ijet.v7i4.29.26257 |
Real-Time Water Quality Monitoring with Multi-Sensors |
![]() ![]() |
Mohd Nizam Husen, ![]() ![]() ![]() DOI: 10.14419/ijet.v7i4.29.26261 |
Two Cell Fault Models and Parasitic RC Test Method for Embedded SRAM |
![]() ![]() |
M. Parvathi ![]() DOI: 10.14419/ijet.v7i4.29.26262 |
Performance Analysis of Different Audio Video Codecs for Wireless and Wired VoIP |
![]() ![]() |
Mohd Nazri Ismail, ![]() ![]() ![]() ![]() DOI: 10.14419/ijet.v7i4.29.27396 |
science