Preferred Language
Articles
/
bsj-9864
Exploring the actual implementation of e-wallet application in Malaysia
...Show More Authors

E-wallet, also referred to as digital wallet, is a software application designed to replace physical wallets, with the primary purpose of facilitating online transactions when users wish to make virtual payments. Nowadays, E-wallets are not limited to mobile applications, but they have also been extended to wearable devices, such as smartwatches, enabling users to make payments via their watches. This research study focuses on three main E-wallet service providers in Malaysia, namely TouchNGo E-wallet, Boost, and Grab pay, as they are the top three E-wallets in the country. The aim of this paper is to explore the real-world implementation of E-wallets among mobile phone users in Malaysia, employing the Technology Adoption Model as the theoretical framework. Six independent variables were identified to study the implementation of E-wallets, and a total of 500 respondents shared their opinions on retaining the usage of E-wallet in Malaysia. The data collected were analysed using SPSS for Pearson Correlation Analysis and Multiple Linear Regression. Out of the six variables, five independent variables were accepted, and one independent variable was rejected due to the greater significant level. The highest correlation coefficient falls under Business Resources with 0.704. The study delves into the implications and constraints, providing insights for the future advancement of E-wallets within the Malaysian context. 

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Jun 01 2014
Journal Name
Journal Of Economics And Administrative Sciences
the role of senior management commitment to total quality in the implementation of knowledge management processes_Asurvey of asample of civil colleges
...Show More Authors

Occupies total quality management applications play a key role in the development of institutions of higher education performance and achieve its strategic objectives through the commitment of senior management and their employees to continuous improvement of the quality of performance in the various areas of work, and can be integrated knowledge management processes, which means identifying information of value and how to take advantage. The data were collected using the style of the questionnaire for the purpose of analyzing their results on a sample composed of 83 member of the administrative leadership in colleges as representing the decision-making centers in those colleges . 

  &nbsp

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Feb 01 2014
Journal Name
Journal Of Economics And Administrative Sciences
Concept And Importance Of Detection Failureś Possibilities Of Corporation Proposed Model For Application In The Iraqi Environment
...Show More Authors

Research aims to shed light on the concept of corporate failures , display and analysis the most distinctive models used to predicting corporate failure; with suggesting  a model to reveal the probabilities of corporate failures which including internal and external financial and non-financial indicators, A tested is made for the research objectivity and its indicators weight and by a  number of academics professionals experts, in addition to  financial analysts  and have concluded a set of conclusions ,  the most distinctive of them that failure is not considered a sudden phenomena for the company and its stakeholders , it is an Event passes through numerous stages; each have their symptoms that lead eve

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Feb 13 2023
Journal Name
Journal Of Educational And Psychological Researches
Patterns of Feedback Used in the E-Learning System from the Teachers of the First Cycle in the Governorate of Muscat at the Sultanate of Oman
...Show More Authors

 

Abstract

This study aims to identify the degree to which the first cycle teachers use different feedback patterns in the e-learning system in addition to the differences in the degree of use according to specialization, teaching experience, and in-service training in the field of classroom assessment, as well as the interaction between them. The study sample consisted of (350) female teachers of the first cycle in government schools in Muscat Governorate for the academic year 2020/2021. The study used a questionnaire that contained four different patterns of feedback, which are reinforcement, informative, corrective, and interpretive feedback. The psychometric properties of the que

... Show More
View Publication Preview PDF
Publication Date
Fri Jul 01 2016
Journal Name
Journal Of Economics And Administrative Sciences
The Impact Of Application Of Jit In The Banking Sector On The Quality Of Banking Service
...Show More Authors

Abstract 

          The research the impact of the application of some of the production system tools in the specified time, which can be adapted in the service sectors (banking sector) over the improvement and increase the quality of banking services, and highlights the research problem in the low quality of banking services provided to customers because of the reliance on traditional banking systems in the provision of services Because of the lack keep pace with global developments in the banking industry, and the goal of research is to clarify the applicability of the production system in the time specified in the service sector and th

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Nov 01 2016
Journal Name
Iosr Journal Of Computer Engineering
Implementation of new Secure Mechanism for Data Deduplication in Hybrid Cloud
...Show More Authors

Cloud computing provides huge amount of area for storage of the data, but with an increase of number of users and size of their data, cloud storage environment faces earnest problem such as saving storage space, managing this large data, security and privacy of data. To save space in cloud storage one of the important methods is data deduplication, it is one of the compression technique that allows only one copy of the data to be saved and eliminate the extra copies. To offer security and privacy of the sensitive data while supporting the deduplication, In this work attacks that exploit the hybrid cloud deduplication have been identified, allowing an attacker to gain access to the files of other users based on very small hash signatures of

... Show More
View Publication Preview PDF
Publication Date
Thu Jan 01 2015
Journal Name
Journal Of Engineering
Performance Improvement of the Implementation of Concrete Structures in the Construction Sector In Iraq Using The Modern Management Technique “Six Sigma”
...Show More Authors

The reality of the field of construction projects in Iraq refers to needing for the development of performance in order to improve quality and reduce defects and errors and to control the time and cost, so there is needing for the application of effective methods in this area, one of the methods that can be applied in this area is the manner of Six Sigma. This research aims to enhance the performance and quality improvement for the construction projects by improving performance in the work of the implementation of the concrete structure depending on the Six Sigma methodology, and for the purpose of achieving the aim of the research, the researcher firstly depends on the theoretical study that include the concepts of qual

... Show More
View Publication
Publication Date
Sun Jul 01 1990
Journal Name
Bulletin Of The Iraq Natural History Museum (p-issn: 1017-8678 , E-issn: 2311-9799)
THE ROLE OF SPECIFIC AMINO ACIDS IN THE PROTECTION OF E. COLI AGAINST B-LACTAM ANTIBIOTICS IN VITRO
...Show More Authors

The role of specific amino acids namely cysteine, methionine, threonine and asparagine in the protection provided by vamin solution against B-lactam inhibition to E. coli was evaluated in vitro In minimal medium, cells were treated with 32 ug/ml of penicillin G, carbenciLlin, hostacillin, cloxacillin and cephalotin in the presence of specific amino acid supplementation. Deletion of specific amino acids from the media abolished the protection provided by vamin. Threonine was essential for the protection of cells against all tested antibiotics, while cysteine was essential for protection against carbencillin and sephalotin. Deletion of methionine or asparagine abolished the protection against carbencillin and to a less extent cephalotin.

... Show More
View Publication Preview PDF
Publication Date
Mon Feb 25 2019
Journal Name
Iraqi Journal Of Physics
Relationship between CML and Io's phase according to Jupiter's actual radio storms observations
...Show More Authors

The actual observations for Jupiter radio storm were taken for Hawaii station within multi years from 2001 to 2012. The Central Meridian Longitude (CMLІІІ) and Io's phase (γIo) were calculated for each year from Radio Jove program, the results of CMLІІІ for year 2006 was A=(180-300)º,B=(15-239)º, C=(60-280)º, phase was A=(182-260)º,B=(40-109)º, C=(200-260)º, which were close to the theoretical values, longitude was A=(180-300)º, B=(15-240)º, C=(60-280)º and phase was A=(180-260)º,B=(40-110)º and C=(200-260)º.

View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Tue Feb 18 2025
Journal Name
Iranian Journal Of Science
Exploring Neimark-Sacker Bifurcation and Chaos Control in a Tri-species Discrete-Time Model
...Show More Authors

View Publication
Scopus (3)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Fri Jul 21 2023
Journal Name
Journal Of Engineering
Design and Implementation of a Vlsm Simulator
...Show More Authors

Variable-Length Subnet Masks (VLSM), often referred to as "subnetting a subnet", is used to maximize addressing efficiency. The network administrator is able to use a long mask on networks with few hosts, and a short mask on subnets with many hosts. This addressing scheme allows growth and does not involve wasting addresses. VLSM gives a way of subnetting a network with
minimal loses of IP addresses for a specific range. Unfortunately, the network administrator has to perform several mathematical steps (or use charts) to get the required results from VLSM. In this paper, a simple graph simulator is proposed (using Visual Basic 6.0 Language) to perform all the required mathematical steps and to display the obtained required informatio

... Show More
View Publication Preview PDF
Crossref