Beside the increasing trend of cloud computing and mobile applications, the use of cloud based mobile learning applications is also mounting. Almost every e-commerce service provider offers cloud based mobile learning applications so that they can…
This paper evaluates the readiness of Malaysian academic university libraries towards Library 4.0. The rise of this new intervention of Web 4.0 and Library 4.0 are being deliberated among librarians for future services. Information technology…
The security strategy of a nation is based on harnessing the cumulative strength of its various instruments of national power. These, amongst others, include the economy, diplomacy, information and military. Nations periodically undertake the…
A white fist punches the air, grasping tightly to a fluorescent green dollar bill — the Buycott app’s icon pictorially represents the power of consumer decisions. Buycott was developed by freelance programmer Ivan Pardo and released in May 2013 in…
Since health-related information for pregnant women is extremely complex and sensitive, end-users of any application are required to have the same level of knowledge as the information providers to help them to navigate between various sources of…
Protecting and concealing sensitive data in the modern world is challenging. Due to insufficient protection and privacy, it is feasible for critical information to be fabricated. This led to a significant financial loss for someone. The intended…
The low involvement of students in online learning resulted in a decrease in their academic performance. This research aims to figure out the effect of adopting online learning innovations such as mobile learning (m-learning) on students’ involvement…
Abstract—Students work in sloyd [slöjd] class represents unique areas of learning. The creative, hands-on design work, as well as a mix of both individual and collaborative processes, provide options for developing multiple skills. But these…
A surveillance system is still the most exciting and practical security system to prevent crime effectively. The primary purpose of this system is to recognize the identity of the face caught by the camera. With the advancement of the Internet of…
In response to new socio-political conditions in Malaysia following the general election, Prime Minister Najib Tun Razak launched a reform that brought fundamental changes in the economy and governance in Malaysia. By the end of 2011, there were four…