Refine Search

New Search

Results in Journal Communications of the IBIMA: 177

(searched for: journal_id:(360309))
Page of 4
Articles per Page
by
Show export options
  Select all
Rene Leveaux
Published: 2 January 2017
Communications of the IBIMA pp 1-9; doi:10.5171/2016.943964

Corina Rădulescu , Grațiela Boca, Rita Toader, Cezar Toader, Gheorghe M.T. Rădulescu
Communications of the IBIMA pp 1-13; doi:10.5171/2016.769097

Ramzi Belhadj, Amina Omrane, Boutheina Regaieg
Published: 15 April 2016
Communications of the IBIMA pp 1-17; doi:10.5171/2016.187526

Mikko Kontio, Maija Marttila-Kontio, Virpi Hotti
Published: 8 December 2015
Communications of the IBIMA pp 1-13; doi:10.5171/2015.561648

Charles Vyver
Published: 9 September 2015
Communications of the IBIMA pp 1-14; doi:10.5171/2015.574276

Gratiela Boca, Corina Rădulescu , Cezar Toader
Published: 13 April 2015
Communications of the IBIMA pp 1-13; doi:10.5171/2015.100244

Kathy Ning Shen, Mohamed Khalifa, Valerie J Lindsay
Published: 5 March 2015
Communications of the IBIMA pp 1-18; doi:10.5171/2015.440860

Sona Mardikyan, Endam Yıldız, Mehmet Ordu, Burcu Simsek
Published: 20 January 2015
Communications of the IBIMA pp 1-10; doi:10.5171/2015.592253

Sonja Bickford, Marina Nenasheva, Paula Kankaanpää, Timo Koivurova , Angela Hlavnicka
Published: 14 January 2015
Communications of the IBIMA pp 1-12; doi:10.5171/2015.185611

Kamarulzaman Ab Aziz , Hezlin Harris, Salmi Zahid, Nor Ab. Aziz
Published: 18 December 2013
Communications of the IBIMA pp 1-19; doi:10.5171/2013.120942

Nazatul Ramin, Khairul Taib, Dang Hashim, Siti Arpah Noordin, Siti Munira Yasin
Published: 10 November 2013
Communications of the IBIMA pp 1-12; doi:10.5171/2013.476066

Lee-Kwun Chan, Hung-Khoon Tan, Phooi-Yee Lau, William Yeoh
Published: 28 September 2013
Communications of the IBIMA pp 1-10; doi:10.5171/2013.246123

Abstract:
Due to ubiquitous information requirements, market interest in mobile business intelligence (BI) has grown markedly. However, mobile BI market is a relatively new area that has been driven primarily by the IT industry. Yet, there is a lack of systematic study on the critical success factors for mobile BI. This research reviews the state-of-the-art of mobile BI, and explores the critical success factors based on a rigorous examination of the academic and practitioner literature. The study reveals that critical success factors of mobile BI generally fall into four key dimensions, namely security, mobile technology, system content and quality, and organisational support perspectives. The various research findings will be useful to organisations which are considering or undertaking mobile business intelligence initiatives
Muhammad Hasan, Abdul Rahman Dahlan
Published: 31 July 2013
Communications of the IBIMA pp 1-12; doi:10.5171/2013.322363

Choo-Kim Tan, Choo-Peng Tan, Siti Fatimah Abdul Razak, Lew Ling
Communications of the IBIMA pp 1-9; doi:10.5171/2013.135959

Abstract:
The aim of this study was to examine undergraduate students’ perceptions toward the adoption of the Graphing Calculator (GC) instructional approach in learning Probability. During the study, a sample of 55 students was provided GCs and self-designed instructional activities modules for their learning. At the end of the study, an adapted questionnaire was distributed to collect students’ views on the adoption of the GC instructional approach in Probability learning. The data collected from the questionnaire were categorized into six aspects: the GC usage, quality of the output from the GC, GC helped students to understand probability, GC helped in increasing students confidence in problem solving, GC helped in students communication, GC helped to foster students attitude towards probability learning, and it was found that students’ perceptions in these six aspects are favourable. ANOVA test also showed that there were no significant differences in the mean scores among students of different levels when the GC instructional approach was adopted. A majority of students found that leaning probability with the GC instructional approach was more funny and interesting. A positive attitude and increased motivation to learn Probability was cultivated as well
Jawahitha Sarabdeen
Communications of the IBIMA pp 1-9; doi:10.5171/2013.311167

Pui Goh, Jer Hong, Ee Tan, Wei Goh
Published: 29 April 2013
Communications of the IBIMA pp 1-9; doi:10.5171/2013.743515

Marilena Mironiuc , Ionela-Corina Chersan, Ioan-Bogdan Robu
Published: 3 April 2013
Communications of the IBIMA pp 1-16; doi:10.5171/2013.567289

Abstract:
IBIMA Publishing is an open access journals publisher. "i research . i empower the world"
Farnaz Farid , Seyed A Shahrestani, Chun Ruan
Published: 31 March 2013
Communications of the IBIMA pp 1-15; doi:10.5171/2013.794626

The publisher has not yet granted permission to display this abstract.
Published: 19 February 2013
Communications of the IBIMA pp 1-12; doi:10.5171/2013.655710

Abstract:
Security and reliability of cloud computing services remain among the dominant concerns inhibiting their pervasive adaptation. The distributed and the multi-tenancy nature of the cloud computing paradigm can be considered as the root causes for their increased risks and vulnerabilities. Resource sharing and virtualization can also be mentioned as additional main factors contributing to or augmenting cross-site scripting and other cloud vulnerabilities. Cloud are also exposed to the risks and liabilities faced by other networked systems. Poorly designed APIs that may cause security problems or distributed denial of services attacks are the examples of this category that are considered in this paper. Public key infrastructure provides the foundations for provision of some essential security services. These include services such as confidentiality, authentication, and privacy that are of vital importance for establishing trust and confidence between the cloud providers and their clients. In this work, we will discuss the potential flaws of this infrastructure and examine how they may deteriorate the security and reliability levels of the cloud environments. To enable a comprehensive study of the challenges in security and reliability of the cloud computing environments, we categorize the risks and vulnerabilities they face. Traditional techniques, based on cryptography, can address some of these challenges to a certain degree. We will argue that they may not be efficient for use in cloud environments. We then focus on data-centric and homomorphic encryption methods that may provide more appropriate solutions in addressing the challenges in cloud computing security and reliability
Nabil Giweli, Seyed Shahrestani , Hon Cheung
Published: 19 January 2013
Communications of the IBIMA pp 1-10; doi:10.5171/2013.462966

René Leveaux
Published: 22 November 2012
Communications of the IBIMA pp 1-8; doi:10.5171/2012.834755

Liliana Moga, Khalil Nor, Eugen Mitrică
Published: 27 September 2012
Communications of the IBIMA pp 1-7; doi:10.5171/2012.385699

Dana Boca
Published: 27 September 2012
Communications of the IBIMA pp 1-13; doi:10.5171/2012.612096

Marius Bulearca, C. Popescu , Mihai-Sabin Muscalu, Constantin Ghiga
Published: 1 September 2012
Communications of the IBIMA pp 1-11; doi:10.5171/2012.790264

Tervonen Pekka, Haapasalo Harri, Jukka Keinänen
Published: 29 August 2012
Communications of the IBIMA pp 1-13; doi:10.5171/2012.543281

Ruben Pereira, Miguel Da Silva
Published: 29 August 2012
Communications of the IBIMA pp 1-16; doi:10.5171/2012.970363

Marilena Mironiuc, Mihai Carp
Published: 22 August 2012
Communications of the IBIMA pp 1-13; doi:10.5171/2012.406891

Civan Özseyhan, Bertan Badur, Osman N. Darcan
Communications of the IBIMA pp 1-15; doi:10.5171/2012.775316

Ovidiu Stoica , Delia-Elena Diaconașu
Communications of the IBIMA pp 1-11; doi:10.5171/2012.348337

Lee-Kwun Chan, William Yeoh, Wou-Onn Choo, Phooi-Yee Lau
Communications of the IBIMA pp 1-10; doi:10.5171/2012.581504

Vahideh Rafiee, Jawahitha Sarabdeen
Communications of the IBIMA pp 1-10; doi:10.5171/2012.444553

Page of 4
Articles per Page
by
Show export options
  Select all
Back to Top Top