Profiling Ict Academics At Malaysian Research Universities (Rus) On Their Commercialization Approaches Based On Personal Attributes: A Grounded Theory Study
Penglibatan dan pilihan dalam keusahawanan oleh ahli akademik amat jarang dilihat dari perspektif ahli akademik ataupun keupayaan individu akademik itu sendiri. Malah, pihak universiti amat kekurangan budaya pengkomersialan yang efektif. Oleh itu, kajian ini bertujuan untuk mendalami perspektif p...
| Auteur principal: | Othman, Hafizul |
|---|---|
| Format: | Thèse |
| Langue: | anglais |
| Publié: |
2015
|
| Sujets: | |
| Accès en ligne: | http://eprints.usm.my/30361/ |
Documents similaires
Social Sciences, Arts And Humanities Research Collaboration: The Malaysian Coverage
par: Hussain, Husriati
Publié: (2014)
par: Hussain, Husriati
Publié: (2014)
Fairness Categorization Policy Of Queuing Theory For Geographic Information System Job Scheduling
par: Kheoh, Hooi Leng
Publié: (2013)
par: Kheoh, Hooi Leng
Publié: (2013)
Initial File-Placement In Data Grid Environment Using Game Theory And Fictitious Play
par: Indrayanto, Aloysius
Publié: (2008)
par: Indrayanto, Aloysius
Publié: (2008)
Segmentation Of Ultisequence Medical Images Using Random Walks Algorithm And Rough Sets Theory
par: Lim, Khai Yin
Publié: (2017)
par: Lim, Khai Yin
Publié: (2017)
Zot-Binary: A New Number System And Its Application On Number Theory Based Public-Key Cryptography
par: Jahani, Shahram
Publié: (2016)
par: Jahani, Shahram
Publié: (2016)
Web Personalization Using Implicit Input
par: Pan , Yih Jyh
Publié: (2007)
par: Pan , Yih Jyh
Publié: (2007)
Bipartite Graph Algorithm With Reference Frame Representation For Protein Tertiary Structure Matching
par: Othman, Fazilah
Publié: (2010)
par: Othman, Fazilah
Publié: (2010)
Personal Online Shopping Widget:
Consumer Acceptance Level Of Online
Shopping Widget
par: Lee, Yean Hooi
Publié: (2009)
par: Lee, Yean Hooi
Publié: (2009)
I-Personal Financial Organizer (I-Pfo): A Cyber Security Framework For I-Pfo.
par: Annie Ng, Ai Bee
Publié: (2010)
par: Annie Ng, Ai Bee
Publié: (2010)
An E-Book Building Methodology Using An Extensible Personalization Structure For Operationalizing E-Book Interface Metaphors
par: Hameed, M. Noorul
Publié: (2010)
par: Hameed, M. Noorul
Publié: (2010)
Automatic And Person-Independent
Detection Of 3d Facial Expressions
Using Enhanced Support Vector
Machine With Probability Estimation
par: Abdullah, Amal Abdulaziz
Publié: (2014)
par: Abdullah, Amal Abdulaziz
Publié: (2014)
Automatic And Person-Independent
Detection Of 3d Facial Expressions
Using Enhanced Support Vector
Machine With Probability Estimation
par: Abdullah, Amal Abdulaziz
Publié: (2014)
par: Abdullah, Amal Abdulaziz
Publié: (2014)
Quality Of Service Enabled Cross-Layer Multicast Framework For Mobile Ad Hoc Networks.
par: Mohammed Saghir, Mohammed
Publié: (2008)
par: Mohammed Saghir, Mohammed
Publié: (2008)
A New Approach To Public-Key Cryptosystem Based On Mandelbrot And Julia Fractal Sets.
par: A. Alia, Mohammad Ahmad
Publié: (2008)
par: A. Alia, Mohammad Ahmad
Publié: (2008)
Pengubahsuaian Senibina Rangkaian Neural Secara Berhirarki Dalam Penentuan Jenis Dan Kualiti Air Sungai [QA76.87. F177 2008 f rb].
par: Hashim, Fakroul Ridzuan
Publié: (2007)
par: Hashim, Fakroul Ridzuan
Publié: (2007)
Automated Federation Of Virtual Organization In Grid Using Select, Match, Negotiate And Expand (SMNE) Protocol [QA76.9.C58 C518 2008 f rb].
par: Cheng, Wai Khuen
Publié: (2007)
par: Cheng, Wai Khuen
Publié: (2007)
Crowd And Acoustical Modelling In
Digital Cultural Heritage
par: Lim, Chen Kim
Publié: (2014)
par: Lim, Chen Kim
Publié: (2014)
Enhanced Micro Genetic
Algorithm-Based Models For
Multi-Objective Optimization
par: Tan, Choo Jun
Publié: (2014)
par: Tan, Choo Jun
Publié: (2014)
A New Approach Based On Honeybee Guarding
System To Improve Intrusion Detection System
par: Ahmed Ali, Ghassan
Publié: (2011)
par: Ahmed Ali, Ghassan
Publié: (2011)
Seamsar: Seamless And Secure Handover
Model
For Mobile Iptv Using Mipv6
par: Cornelis, Armanda Caesario
Publié: (2011)
par: Cornelis, Armanda Caesario
Publié: (2011)
Passive operating system fingerprinting based on multi-layered sub-signature matching scheme (MLSMS).
par: Aljammal, Ashraf Hamdan Rashid
Publié: (2011)
par: Aljammal, Ashraf Hamdan Rashid
Publié: (2011)
An expansionary approach for the allocation of next generation ipv6 internet addresses.
par: Murugesan, Raja Kumar
Publié: (2011)
par: Murugesan, Raja Kumar
Publié: (2011)
Adaptive and cooperative harmony search models for RNA secondary structure prediction
par: Mohsen, Abdulqader Mohammed A.
Publié: (2011)
par: Mohsen, Abdulqader Mohammed A.
Publié: (2011)
Performance characterization of robust header compression (ROHC) over satellite based unidirectional link (UDL).
par: Ang, Way Chuang
Publié: (2011)
par: Ang, Way Chuang
Publié: (2011)
Robust and imperceptible digital video watermarking techniques.
par: Al-Taweel, Sadik Ali Murshid
Publié: (2011)
par: Al-Taweel, Sadik Ali Murshid
Publié: (2011)
A Framework For Privacy Diagnosis And
Preservation In Data Publishing
par: Mirakabad, Mohammad Reza Zare
Publié: (2010)
par: Mirakabad, Mohammad Reza Zare
Publié: (2010)
Automatic Text Alignment Using Recursive Hapax-Based Cut-Through Fragmentation
par: Ng , Pek Kuan
Publié: (2012)
par: Ng , Pek Kuan
Publié: (2012)
The Acceptance Of Breast Self-Examination (BSE) Teleconsultation Using TAM-IDT-TRUST Model
par: Talib, Norayu Abdul
Publié: (2012)
par: Talib, Norayu Abdul
Publié: (2012)
Mutual Authentication Protocol Model For Low-Cost RFID Systems Based On Shelled Random Value
par: al-Dala'ien, Mu'awya Naser Salam
Publié: (2011)
par: al-Dala'ien, Mu'awya Naser Salam
Publié: (2011)
Enhanced Distributed Learning Classifier System For Simulated Mobile Robot Behaviours
par: Baneamoon, Saeed Mohammed Saeed
Publié: (2010)
par: Baneamoon, Saeed Mohammed Saeed
Publié: (2010)
A Human Community-Based Genetic
Algorithm Model
(HCBGA)
par: Al-Madi, Nagham Azmi Qasim
Publié: (2009)
par: Al-Madi, Nagham Azmi Qasim
Publié: (2009)
3d Morphing And Shape Transformation
Using Slices
par: Yasmin, Shamima
Publié: (2009)
par: Yasmin, Shamima
Publié: (2009)
Multimodal Semantics Integration Using Ontologies Enhanced By Ontology Extraction And Cross Modality Disambiguation
par: Shareha, Ahmad Adel Ahmad Abu
Publié: (2012)
par: Shareha, Ahmad Adel Ahmad Abu
Publié: (2012)
A New Visual Public-Key Cryptosystem Based On Non-Expansion Technique And Boolean Operations
par: Jaafar, Abdullah Mohammed Abdo Ali
Publié: (2011)
par: Jaafar, Abdullah Mohammed Abdo Ali
Publié: (2011)
A Systematic Design Method For Modeling
Complex Processes And Interactions
In Web Hypermedia Applications
par: Jantan, Azrul Hazri
Publié: (2009)
par: Jantan, Azrul Hazri
Publié: (2009)
An Efficient Safety System For Vanet Using Enhanced Message Dissemination Protocols With Channel Performance Control
par: Samara, Ghassan Abedalkarim Abdullah
Publié: (2012)
par: Samara, Ghassan Abedalkarim Abdullah
Publié: (2012)
Enhanced Honey Bees Colony Algorithms For Protein Tertiary Structure Prediction
par: Bahamish, Hesham Awadh Abdallah
Publié: (2011)
par: Bahamish, Hesham Awadh Abdallah
Publié: (2011)
Parallel Network Alert Management System For IDS False Positive Reduction
par: el-Taj, Homam Reda Kamel
Publié: (2011)
par: el-Taj, Homam Reda Kamel
Publié: (2011)
A new approach based on honeybee guarding system to improve intrusion detection system.
par: Ahmed Ali, Ghassan
Publié: (2011)
par: Ahmed Ali, Ghassan
Publié: (2011)
Learning And Optimization Of The Kernel Functions From Insufficiently Labeled Data
par: Abbasnejad, M. Ehsan
Publié: (2010)
par: Abbasnejad, M. Ehsan
Publié: (2010)
Documents similaires
-
Social Sciences, Arts And Humanities Research Collaboration: The Malaysian Coverage
par: Hussain, Husriati
Publié: (2014) -
Fairness Categorization Policy Of Queuing Theory For Geographic Information System Job Scheduling
par: Kheoh, Hooi Leng
Publié: (2013) -
Initial File-Placement In Data Grid Environment Using Game Theory And Fictitious Play
par: Indrayanto, Aloysius
Publié: (2008) -
Segmentation Of Ultisequence Medical Images Using Random Walks Algorithm And Rough Sets Theory
par: Lim, Khai Yin
Publié: (2017) -
Zot-Binary: A New Number System And Its Application On Number Theory Based Public-Key Cryptography
par: Jahani, Shahram
Publié: (2016)