Noraini Che Pa
Noraini Che Pa
Associate Professor Universiti Putra Malaysia
Verified email at upm.edu.my
Title
Cited by
Cited by
Year
Requirement elicitation: identifying the communication challenges between developer and customer
NC Pa, AM Zin
International Journal of New Computer Architectures and their Applications …, 2011
242011
A framework for adoption and implementation of green IT/IS practice in IT governance
BA Jnr, NC Pa
The Third International Conference on Green Computing, Technology and …, 2015
232015
Measuring communication gap in software requirements elicitation process
AM Zin, N Pa
Proceedings of the 8th WSEAS International Conference on Software …, 2009
232009
A survey on approaches in knowledge audit in organizations
NC Pa, L Taheri, R Abdullah
Asian Transaction on Computers 2 (5), 1-8, 2012
222012
Risk assessment of IT governance: A systematic literature review.
NC Pa, A BOKOLO JNR, RNH Nor, MAA Murad
Journal of Theoretical & Applied Information Technology 71 (2), 2015
212015
A case based reasoning architecture and component based model for Green IS implementation and diffusion in organisation
B Anthony Jr, NC Pa
International Journal of Digital Information and Wireless Communications 6 …, 2016
172016
Open source software selection using an analytical hierarchy process (ahp)
YY Jusoh, K Chamili, NC Pa, JH Yahaya
American Journal of Software Engineering and Applications 3 (6), 83-89, 2014
132014
Autonomic computing systems utilizing agents for risk mitigation of IT governance
BA Jnr, NC Pa, TNM Aris, RNH Nor, YY Jusoh
Jurnal Teknologi 77 (18), 2015
122015
A Review on Decision Making of Risk Mitigation for Software Management.
NCHE PA, BA JNR
Journal of Theoretical & Applied Information Technology 76 (3), 2015
122015
A Proposed Risk Assessment Model For Decision Making In Software Management
N Pa, M Khalefa, H Alasadi, H Zmezm
Journal of Soft Computing and Decision Support Systems (JSCDSS) 3 (5), 31-43, 2016
11*2016
The selection criteria of open source software adoption in Malaysia
Y Jusoh, K Chamili, JH Yahaya, NC Pa
International Journal of Advancements in Computing Technology 4 (21), 278-287, 2012
112012
Identifying knowledge components in software requirement elicitation
L Taheri, NC Pa, R Abdullah, S Abdullah, MY Shafazand
2014 IEEE International Conference on Industrial Engineering and Engineering …, 2014
102014
A knowledge audit model for requirement elicitation: A case study to assess knowledge in requirement elicitation
L Taheri, MY Shafazand, NC Pa, R Abdullah, S Abdullah
Knowledge and Process Management 24 (4), 257-268, 2017
92017
A risk assessment model for collaborative support in software management
B Anthony, NC Pa, RNH Nor, YY Josoh
2015 9th Malaysian Software Engineering Conference (MySEC), 217-223, 2015
92015
An analysis of knowledge sharing behaviors in requirement engineering through social media
L Wu, NC Pa, R Abdullah, WNWA Rahman
2015 9th Malaysian Software Engineering Conference (MySEC), 93-98, 2015
82015
Knowledge audit model for requirement elicitation process
L Taheri, NC Pa, R Abdullah, S Abdullah, SM Yaser
International Journal of Social, Behavioral, Educational, Economic, Business …, 2014
82014
E-Learning User Interface Acceptance Based On Analysis Of User's Style, Usability And User Benefits
R binti Atan, MH Selamat, NC Pa, R Abdullah
Jurnal Sistem Informasi 9 (1), 6-12, 2013
82013
Selection Criteria for Open Source Software Adoption in Malaysia
K Chamili, YY Jusoh, JH Yahaya, NC Pa
72012
Fakebuster: Fake news detection system using logistic regression technique in machine learning
MS Mokhtar, YY Jusoh, N Admodisastro, N Pa, AY Amruddin
International Journal of Engineering and Advanced Technology 9 (1), 2407-2410, 2019
62019
Mitigating operational, technical and strategic risk in ICT through knowledge codification technique
NC Pa, BA Jnr
Jurnal Teknologi 78 (8-2), 2016
62016
The system can't perform the operation now. Try again later.
Articles 1–20