Follow
Noraini Che Pa
Noraini Che Pa
Associate Professor Universiti Putra Malaysia
Verified email at upm.edu.my
Title
Cited by
Cited by
Year
Cyber security for cyber physcial systems: A trust-based approach
A Saqib, RW Anwar, OK Hussain, M Ahmad, MA Ngadi, MM Mohamad, ...
J Theor Appl Inf Technol 71 (2), 144-152, 2015
352015
Risk assessment of IT governance: A systematic literature review.
NC Pa, A BOKOLO JNR, RNH Nor, MAA Murad
Journal of Theoretical & Applied Information Technology 71 (2), 2015
342015
A survey on approaches in knowledge audit in organizations
NC Pa, L Taheri, R Abdullah
Asian Transaction on Computers 2 (5), 1-8, 2012
322012
Requirement elicitation: identifying the communication challenges between developer and customer
NC Pa, AM Zin
International Journal of New Computer Architectures and their Applications …, 2011
292011
A framework for adoption and implementation of green IT/IS practice in IT governance
BA Jnr, NC Pa
The Third International Conference on Green Computing, Technology and …, 2015
282015
Open source software selection using an analytical hierarchy process (AHP)
YY Jusoh, K Chamili, NC Pa, JH Yahaya
American Journal of Software Engineering and Applications, 2014
262014
Measuring communication gap in software requirements elicitation process
AM Zin, N Pa
Proceedings of the 8th WSEAS International Conference on Software …, 2009
262009
A case based reasoning architecture and component based model for Green IS implementation and diffusion in organisation
BA Jnr, NC Pa
IJDIWC, 97, 2016
212016
Fakebuster: Fake news detection system using logistic regression technique in machine learning
MS Mokhtar, YY Jusoh, N Admodisastro, NC Pa, AY Amruddin
International Journal of Engineering and Advanced Technology 9 (1), 2407-2410, 2019
202019
A knowledge audit model for requirement elicitation: A case study to assess knowledge in requirement elicitation
L Taheri, MY Shafazand, NC Pa, R Abdullah, S Abdullah
Knowledge and Process Management 24 (4), 257-268, 2017
192017
Autonomic computing systems utilizing agents for risk mitigation of IT governance
BA Jnr, NC Pa, TNM Aris, RNH Nor, YY Jusoh
Jurnal Teknologi 77 (18), 49-60, 2015
192015
The selection criteria of open source software adoption in Malaysia
Y Jusoh, K Chamili, JH Yahaya, NC Pa
International Journal of Advancements in Computing Technology 4 (21), 278-287, 2012
172012
An analysis of knowledge sharing behaviors in requirement engineering through social media
L Wu, NC Pa, R Abdullah, WNWA Rahman
2015 9th Malaysian Software Engineering Conference (MySEC), 93-98, 2015
152015
A Review on Decision Making of Risk Mitigation for Software Management.
NCHE PA, BA JNR
Journal of Theoretical & Applied Information Technology 76 (3), 2015
152015
A Proposed Risk Assessment Model For Decision Making In Software Management
N Pa, M Khalefa, H Alasadi, H Zmezm
Journal of Soft Computing and Decision Support Systems (JSCDSS) 3 (5), 31-43, 2016
12*2016
Developing a Learning Outcome-Based Question Examination Paper Tool for Universiti Putra Malaysia.
S Hassan, NI Admodisastro, A Kamaruddin, S Baharom, NC Pa
International Education Studies 9 (2), 132-140, 2016
122016
A risk assessment model for collaborative support in software management
B Anthony, NC Pa, RNH Nor, YY Josoh
2015 9th Malaysian Software Engineering Conference (MySEC), 217-223, 2015
112015
Identifying knowledge components in software requirement elicitation
L Taheri, NC Pa, R Abdullah, S Abdullah, MY Shafazand
2014 IEEE International Conference on Industrial Engineering and Engineering …, 2014
112014
Knowledge audit model for requirement elicitation process
L Taheri, N Che Pa, R Abdullah, S Abdullah
International Scholarly and Scientific Research & Innovation 8 (2), 452-456, 2014
112014
A model of mitigating risk for IT organisations
NC Pa, B Anthony
2015 4th International Conference on Software Engineering and Computer …, 2015
102015
The system can't perform the operation now. Try again later.
Articles 1–20