Profiling Ict Academics At Malaysian Research Universities (Rus) On Their Commercialization Approaches Based On Personal Attributes: A Grounded Theory Study
Penglibatan dan pilihan dalam keusahawanan oleh ahli akademik amat jarang dilihat dari perspektif ahli akademik ataupun keupayaan individu akademik itu sendiri. Malah, pihak universiti amat kekurangan budaya pengkomersialan yang efektif. Oleh itu, kajian ini bertujuan untuk mendalami perspektif p...
| Main Author: | Othman, Hafizul |
|---|---|
| Format: | Thesis |
| Language: | English |
| Published: |
2015
|
| Subjects: | |
| Online Access: | http://eprints.usm.my/30361/ |
Similar Items
Social Sciences, Arts And Humanities Research Collaboration: The Malaysian Coverage
by: Hussain, Husriati
Published: (2014)
by: Hussain, Husriati
Published: (2014)
Fairness Categorization Policy Of Queuing Theory For Geographic Information System Job Scheduling
by: Kheoh, Hooi Leng
Published: (2013)
by: Kheoh, Hooi Leng
Published: (2013)
Initial File-Placement In Data Grid Environment Using Game Theory And Fictitious Play
by: Indrayanto, Aloysius
Published: (2008)
by: Indrayanto, Aloysius
Published: (2008)
Segmentation Of Ultisequence Medical Images Using Random Walks Algorithm And Rough Sets Theory
by: Lim, Khai Yin
Published: (2017)
by: Lim, Khai Yin
Published: (2017)
Zot-Binary: A New Number System And Its Application On Number Theory Based Public-Key Cryptography
by: Jahani, Shahram
Published: (2016)
by: Jahani, Shahram
Published: (2016)
Web Personalization Using Implicit Input
by: Pan , Yih Jyh
Published: (2007)
by: Pan , Yih Jyh
Published: (2007)
Bipartite Graph Algorithm With Reference Frame Representation For Protein Tertiary Structure Matching
by: Othman, Fazilah
Published: (2010)
by: Othman, Fazilah
Published: (2010)
Personal Online Shopping Widget:
Consumer Acceptance Level Of Online
Shopping Widget
by: Lee, Yean Hooi
Published: (2009)
by: Lee, Yean Hooi
Published: (2009)
I-Personal Financial Organizer (I-Pfo): A Cyber Security Framework For I-Pfo.
by: Annie Ng, Ai Bee
Published: (2010)
by: Annie Ng, Ai Bee
Published: (2010)
An E-Book Building Methodology Using An Extensible Personalization Structure For Operationalizing E-Book Interface Metaphors
by: Hameed, M. Noorul
Published: (2010)
by: Hameed, M. Noorul
Published: (2010)
Automatic And Person-Independent
Detection Of 3d Facial Expressions
Using Enhanced Support Vector
Machine With Probability Estimation
by: Abdullah, Amal Abdulaziz
Published: (2014)
by: Abdullah, Amal Abdulaziz
Published: (2014)
Automatic And Person-Independent
Detection Of 3d Facial Expressions
Using Enhanced Support Vector
Machine With Probability Estimation
by: Abdullah, Amal Abdulaziz
Published: (2014)
by: Abdullah, Amal Abdulaziz
Published: (2014)
Quality Of Service Enabled Cross-Layer Multicast Framework For Mobile Ad Hoc Networks.
by: Mohammed Saghir, Mohammed
Published: (2008)
by: Mohammed Saghir, Mohammed
Published: (2008)
A New Approach To Public-Key Cryptosystem Based On Mandelbrot And Julia Fractal Sets.
by: A. Alia, Mohammad Ahmad
Published: (2008)
by: A. Alia, Mohammad Ahmad
Published: (2008)
Pengubahsuaian Senibina Rangkaian Neural Secara Berhirarki Dalam Penentuan Jenis Dan Kualiti Air Sungai [QA76.87. F177 2008 f rb].
by: Hashim, Fakroul Ridzuan
Published: (2007)
by: Hashim, Fakroul Ridzuan
Published: (2007)
Automated Federation Of Virtual Organization In Grid Using Select, Match, Negotiate And Expand (SMNE) Protocol [QA76.9.C58 C518 2008 f rb].
by: Cheng, Wai Khuen
Published: (2007)
by: Cheng, Wai Khuen
Published: (2007)
Crowd And Acoustical Modelling In
Digital Cultural Heritage
by: Lim, Chen Kim
Published: (2014)
by: Lim, Chen Kim
Published: (2014)
Enhanced Micro Genetic
Algorithm-Based Models For
Multi-Objective Optimization
by: Tan, Choo Jun
Published: (2014)
by: Tan, Choo Jun
Published: (2014)
A New Approach Based On Honeybee Guarding
System To Improve Intrusion Detection System
by: Ahmed Ali, Ghassan
Published: (2011)
by: Ahmed Ali, Ghassan
Published: (2011)
Seamsar: Seamless And Secure Handover
Model
For Mobile Iptv Using Mipv6
by: Cornelis, Armanda Caesario
Published: (2011)
by: Cornelis, Armanda Caesario
Published: (2011)
Passive operating system fingerprinting based on multi-layered sub-signature matching scheme (MLSMS).
by: Aljammal, Ashraf Hamdan Rashid
Published: (2011)
by: Aljammal, Ashraf Hamdan Rashid
Published: (2011)
An expansionary approach for the allocation of next generation ipv6 internet addresses.
by: Murugesan, Raja Kumar
Published: (2011)
by: Murugesan, Raja Kumar
Published: (2011)
Adaptive and cooperative harmony search models for RNA secondary structure prediction
by: Mohsen, Abdulqader Mohammed A.
Published: (2011)
by: Mohsen, Abdulqader Mohammed A.
Published: (2011)
Performance characterization of robust header compression (ROHC) over satellite based unidirectional link (UDL).
by: Ang, Way Chuang
Published: (2011)
by: Ang, Way Chuang
Published: (2011)
Robust and imperceptible digital video watermarking techniques.
by: Al-Taweel, Sadik Ali Murshid
Published: (2011)
by: Al-Taweel, Sadik Ali Murshid
Published: (2011)
A Framework For Privacy Diagnosis And
Preservation In Data Publishing
by: Mirakabad, Mohammad Reza Zare
Published: (2010)
by: Mirakabad, Mohammad Reza Zare
Published: (2010)
Automatic Text Alignment Using Recursive Hapax-Based Cut-Through Fragmentation
by: Ng , Pek Kuan
Published: (2012)
by: Ng , Pek Kuan
Published: (2012)
The Acceptance Of Breast Self-Examination (BSE) Teleconsultation Using TAM-IDT-TRUST Model
by: Talib, Norayu Abdul
Published: (2012)
by: Talib, Norayu Abdul
Published: (2012)
Mutual Authentication Protocol Model For Low-Cost RFID Systems Based On Shelled Random Value
by: al-Dala'ien, Mu'awya Naser Salam
Published: (2011)
by: al-Dala'ien, Mu'awya Naser Salam
Published: (2011)
Enhanced Distributed Learning Classifier System For Simulated Mobile Robot Behaviours
by: Baneamoon, Saeed Mohammed Saeed
Published: (2010)
by: Baneamoon, Saeed Mohammed Saeed
Published: (2010)
A Human Community-Based Genetic
Algorithm Model
(HCBGA)
by: Al-Madi, Nagham Azmi Qasim
Published: (2009)
by: Al-Madi, Nagham Azmi Qasim
Published: (2009)
3d Morphing And Shape Transformation
Using Slices
by: Yasmin, Shamima
Published: (2009)
by: Yasmin, Shamima
Published: (2009)
Multimodal Semantics Integration Using Ontologies Enhanced By Ontology Extraction And Cross Modality Disambiguation
by: Shareha, Ahmad Adel Ahmad Abu
Published: (2012)
by: Shareha, Ahmad Adel Ahmad Abu
Published: (2012)
A New Visual Public-Key Cryptosystem Based On Non-Expansion Technique And Boolean Operations
by: Jaafar, Abdullah Mohammed Abdo Ali
Published: (2011)
by: Jaafar, Abdullah Mohammed Abdo Ali
Published: (2011)
A Systematic Design Method For Modeling
Complex Processes And Interactions
In Web Hypermedia Applications
by: Jantan, Azrul Hazri
Published: (2009)
by: Jantan, Azrul Hazri
Published: (2009)
An Efficient Safety System For Vanet Using Enhanced Message Dissemination Protocols With Channel Performance Control
by: Samara, Ghassan Abedalkarim Abdullah
Published: (2012)
by: Samara, Ghassan Abedalkarim Abdullah
Published: (2012)
Enhanced Honey Bees Colony Algorithms For Protein Tertiary Structure Prediction
by: Bahamish, Hesham Awadh Abdallah
Published: (2011)
by: Bahamish, Hesham Awadh Abdallah
Published: (2011)
Parallel Network Alert Management System For IDS False Positive Reduction
by: el-Taj, Homam Reda Kamel
Published: (2011)
by: el-Taj, Homam Reda Kamel
Published: (2011)
A new approach based on honeybee guarding system to improve intrusion detection system.
by: Ahmed Ali, Ghassan
Published: (2011)
by: Ahmed Ali, Ghassan
Published: (2011)
Learning And Optimization Of The Kernel Functions From Insufficiently Labeled Data
by: Abbasnejad, M. Ehsan
Published: (2010)
by: Abbasnejad, M. Ehsan
Published: (2010)
Similar Items
-
Social Sciences, Arts And Humanities Research Collaboration: The Malaysian Coverage
by: Hussain, Husriati
Published: (2014) -
Fairness Categorization Policy Of Queuing Theory For Geographic Information System Job Scheduling
by: Kheoh, Hooi Leng
Published: (2013) -
Initial File-Placement In Data Grid Environment Using Game Theory And Fictitious Play
by: Indrayanto, Aloysius
Published: (2008) -
Segmentation Of Ultisequence Medical Images Using Random Walks Algorithm And Rough Sets Theory
by: Lim, Khai Yin
Published: (2017) -
Zot-Binary: A New Number System And Its Application On Number Theory Based Public-Key Cryptography
by: Jahani, Shahram
Published: (2016)