Business intelligence as a knowledge management tool in providing financial consultancy services G Muhammad, J Ibrahim, Z Bhatti, A Waqas American Journal of Information Systems 2 (2), 26-32, 2014 | 60 | 2014 |
Comparison of Business Model Canvas (BMC) among the three consulting companies A Amanullah, NFA Aziz, F Hadi, J Ibrahim International Journal of Computer Science and Information Technology …, 2015 | 58 | 2015 |
Positive impact of Smartphone application: Whatsapp & Facebook for online business J Ibrahim, RC Ros, NF Sulaiman, RC Nordin, L Ze International Journal of Scientific and Research Publications 4 (12), 1-4, 2014 | 57 | 2014 |
How much privacy we still have on social network M Chewae, S Hayikader, MH Hasan, J Ibrahim International Journal of Scientific and Research Publications 5 (1), 2250-315, 2015 | 42 | 2015 |
Disaster preparedness in universities A Jaradat, H Mziu, J Ibrahim International Journal of Computer Trends and Technology (IJCTT) 19 (1), 1-4, 2015 | 32 | 2015 |
An overview on cyber security awareness in Muslim countries SS Basamh, H Qudaih, JB Ibrahim International Journal of Information and Communication Technology Research 4 (1), 2014 | 29 | 2014 |
Designing business models options for “University of the Future” J Ibrahim, ARA Dahlan 2016 4th IEEE International Colloquium on Information Science and Technology …, 2016 | 28 | 2016 |
Issues and security measures of mobile banking apps S Hayikader, FN Hadi, J Ibrahim International Journal of Scientific and Research Publications 6 (1), 36-41, 2016 | 28 | 2016 |
An Investigation into privacy and Security in Online Social Networking Sites among IIUM Students HO Abdullahi, A said, J Ibrahim World of Computer Science and Information Technology Journal (WCSIT) 2 (2 …, 2012 | 24 | 2012 |
Information security aligned to enterprise management NFB Fakhri, J Ibrahim Middle East Journal of Business 55 (1593), 1-5, 2015 | 23 | 2015 |
Persuasive Technology Contributions Toward Enhance Information Security Awareness in an Organization HA Qudaih, MA Bawazir, SH Usman, J Ibrahim International Journal of Computer Trends and Technology 10 (4), 2014 | 19 | 2014 |
Cyberterrorism definition patterns and mitigation strategies: A literature review IG Seissa, J Ibrahim, N Yahaya International Journal of Science and Research (IJSR) 6 (1), 180-186, 2017 | 18 | 2017 |
Persuasive technology for improving information security awareness and behavior: literature review MA Bawazir, M Mahmud, NNA Molok, J Ibrahim 2016 6th International Conference on Information and Communication …, 2016 | 18 | 2016 |
Steganography: a review of information security research and development in muslim world YA Yunus, S Ab Rahman, J Ibrahim American Journal of Engineering Research 11, 122-128, 2013 | 15 | 2013 |
An overview of cyber security in Malaysia A Ganesin, L Supayah, J Ibrahim Arabian Journal of Business and Management Review (Kuwait Chapter) 6 (4), 12-20, 2016 | 14 | 2016 |
Prevalence of mobile usage among university students: a case study of international Islamic university Malaysia M Qadri, Y Abubaka, J Ibrahim International Journal of Scientific and Research Publications 5 (12), 655-659, 2015 | 14 | 2015 |
Improving information security in e-banking by using biometric fingerprint MMM Musleh, KMA Nofal, II Ba, J Ibrahim International Journal of Computer Science and Information Security 10 (3), 7, 2012 | 12 | 2012 |
eSoulKitchen program—Enhancing societal wellbeing and wealth creation for Orang Asli Community at Pos Selim, Perak ARA Dahlan, J Ibrahim, NSAB Zakaria, IB Ishak, NNB Rahim, ... The 5th International Conference on Information and Communication Technology …, 2014 | 11 | 2014 |
Awareness of social engineering among IIUM students ME Adam, O Yousif, Y al-Amodi, J Ibrahim World of Computer Science and Information Technology Journal 1 (9), 409-413, 2011 | 11 | 2011 |
Information Security in ICT from an Islamic Perspective J Ibrahim, FAMNA Effra, A Haqani | 9 | 2014 |