Rose Alinda Alias
YOU?
Author Swipe
View article: Using Theory Integration to Explain Online Impulse Buying Behavior in Social Commerce
Using Theory Integration to Explain Online Impulse Buying Behavior in Social Commerce Open
Online Impulse Buying Behavior (IBB) significantly increases and contributes to the total S-commerce revenue. Hence, understanding such behavior is critical for an online business to strengthen competitiveness, enhance revenue, and ensure …
View article: Flood preparedness module for Malaysian Higher Education students via Metaverse Environment
Flood preparedness module for Malaysian Higher Education students via Metaverse Environment Open
In Malaysia, the severity of natural disasters such as floods, landslides, and earthquakes have increased in recent years, making disaster preparedness a crucial aspect of students’ lives. In the context of flood preparedness, accessibilit…
View article: Measuring information security policy compliance: content validity of questionnaire
Measuring information security policy compliance: content validity of questionnaire Open
Instruments used to measure compliance with information security policies have been developed by many researchers before, but only a few have conducted validity tests per item, especially for variables selected based on qualitative researc…
View article: Modeling Academic Research Collaborator Selection Using an Integrated Model
Modeling Academic Research Collaborator Selection Using an Integrated Model Open
Expert finding systems try to alleviate the information overload problem and recommend experts who can satisfy users’ needs. They support researchers to find research collaborators automatically. The main challenge of current expert…
View article: MR-Deco: Mixed Reality Application for Interior Planning and Designing
MR-Deco: Mixed Reality Application for Interior Planning and Designing Open
Over the past few years, Augmented Reality (AR) and Virtual Reality (VR) have become a phenomenon in this new era and nowadays smartphone device can enable these technologies quickly and seamlessly through downloadable applications. Some o…
View article: Discovering Digital Technology Training Challenges for Future-Ready Educator: A Preliminary Study from Trainer Perspective
Discovering Digital Technology Training Challenges for Future-Ready Educator: A Preliminary Study from Trainer Perspective Open
Currently, education globally is very challenging and experiencing rapid development that requires the educator to transform the way of teaching.Few empirical studies show that educator have yet to optimize the use of digital technologies …
View article: Understanding Online Impulse Buying Behavior in Social Commerce: A Systematic Literature Review
Understanding Online Impulse Buying Behavior in Social Commerce: A Systematic Literature Review Open
In the past few years, online impulse purchase has garnered attention from researchers in various fields, especially noted in the relatively new field of social commerce (S-commerce). This interactive envronment is a full of impulse buying…
View article: Expert Finding Systems: A Systematic Review
Expert Finding Systems: A Systematic Review Open
The data overload problem and the specific nature of the experts’ knowledge can hinder many users from finding experts with the expertise they required. There are several expert finding systems, which aim to solve the data overload problem…
View article: Need for Compliance With Information Security Policy In Universities: a Preliminary survey
Need for Compliance With Information Security Policy In Universities: a Preliminary survey Open
Information security has become a significant problem for the use of information technology, especially for universities that have a lot of data. Information security policy is one solution to ensure data security. However, compliance is a…
View article: Usability Measures in Mobile-Based Augmented Reality Learning Applications: A Systematic Review
Usability Measures in Mobile-Based Augmented Reality Learning Applications: A Systematic Review Open
The implementation of usability in mobile augmented reality (MAR) learning applications has been utilized in a myriad of standards, methodologies, and techniques. The usage and combination of techniques within research approaches are impor…
View article: Information Security Policy Compliance: Systematic Literature Review
Information Security Policy Compliance: Systematic Literature Review Open
The growth of research in information technology security has enlarged in recent years. Investigations in Information security besides discussing technical problems but also consider policies, behavior and user compliance issues. Therefore…
View article: An Overview of Glass Ceiling, Tiara, Imposter, and Queen Bee Barrier Syndromes on Women in the Upper Echelons
An Overview of Glass Ceiling, Tiara, Imposter, and Queen Bee Barrier Syndromes on Women in the Upper Echelons Open
The increasing women participation in the upper management level has been a comprehensive research study for women and career studies. Although only a few of them have had successfully broken the glass ceiling, they still have to struggle …
View article: Measuring the Feasibility of Clustering Techniques on Usability Performance Data
Measuring the Feasibility of Clustering Techniques on Usability Performance Data Open
This paper proposes a methodology that utilizes unsupervised machine learning clustering techniques in performance based usability data. This paper will first discuss the introduction and current works in the aforementioned domain followed…