A model of social media user engagement towards political leaders in Malaysia
The rapid development of social media use today has an impact on various political strategies and the relationship between political leaders and the public. The importance of popularity on social media affects the influence and political success of a leader. With the large voting power of young peop...
| Main Author: | Sapar, Norman |
|---|---|
| Format: | Thesis |
| Language: | English |
| Published: |
Universiti Teknologi Malaysia
2026
|
| Subjects: | |
| Online Access: | https://utmik.utm.my/handle/123456789/190842 |
| Abstract | Abstract here |
Similar Items
Citizen-government social media engagement model in Indonesia
by: Ari Wedhasmara
Published: (2026)
by: Ari Wedhasmara
Published: (2026)
Text classification on South China Sea conflicts using Support Vector Machine (SVM) and K-Nearest Neighbors (KNN)
by: Ismail, Nurul Nadhirah
Published: (2026)
by: Ismail, Nurul Nadhirah
Published: (2026)
Anomaly detection using rule-based model for fraud prevention in public sector payroll division
by: Mohidin, Mohd Nor
Published: (2026)
by: Mohidin, Mohd Nor
Published: (2026)
Victim profiling in investment fraud based on bigbird-LSTM- CRF named entity recognition
by: Zikri, Muhammad Faris Ezany
Published: (2026)
by: Zikri, Muhammad Faris Ezany
Published: (2026)
Assessing cybersecurity awareness levels in social commerce scams using the theory of planned behavior model
by: Han, Ho Xiao
Published: (2026)
by: Han, Ho Xiao
Published: (2026)
The Impact of Leader-Member Exchange on Employee Engagement at a Government Education Department in Johor
by: Hasmi, Raihan
Published: (2026)
by: Hasmi, Raihan
Published: (2026)
Cyber security capability maturity model for critical information infrastructure for Nigerian Airforce Institute of Technology using C2M2 model
by: Ubaliyo, Usman Abdullahi
Published: (2026)
by: Ubaliyo, Usman Abdullahi
Published: (2026)
Video-based abusive behaviour detection and classification using upper body features
by: Saba, Baloch
Published: (2026)
by: Saba, Baloch
Published: (2026)
Guidelines on data governance and security in remote work environments for independent Filipino remote workers in the Philippines
by: Rose, Nicolas Christine
Published: (2026)
by: Rose, Nicolas Christine
Published: (2026)
Metric-based email phishing attack penetration testing (MPT) framework
by: Yixin, Zhang
Published: (2026)
by: Yixin, Zhang
Published: (2026)
A comparative analysis of machine learning and deep learning transformer models for effective cyberbullying detection in the Malay language on social media platform X
by: Bachan Singh, Savinder Singh
Published: (2026)
by: Bachan Singh, Savinder Singh
Published: (2026)
A comparative analysis of data privacy among whatsapp, signal and telegram
by: Sumbe, Joseph Elia
Published: (2026)
by: Sumbe, Joseph Elia
Published: (2026)
Designing code of practices on privacy protection based on personal information protection law (PIPL) for China Universities
by: Fei, Wang Yu
Published: (2026)
by: Fei, Wang Yu
Published: (2026)
Enhanced phishing website detection using an ensemble- based extreme gradient boosting stacking model
by: Babagana, Umar
Published: (2026)
by: Babagana, Umar
Published: (2026)
Conceptual-based standard operating procedure for video preservation in digital forensics investigation
by: Tian, Chia Tong
Published: (2026)
by: Tian, Chia Tong
Published: (2026)
Legal and administrative framework to regulate Malaysian strata lease scheme
by: Zainal, Nur Huzaifah
Published: (2026)
by: Zainal, Nur Huzaifah
Published: (2026)
Proposing amendments to the electronic Commerce Act 2006 to countermeasure against online fraud in Malaysia
by: Shum, Chen Yau
Published: (2026)
by: Shum, Chen Yau
Published: (2026)
Preliminary screening of fluorescent fingerprint powder for latent fingerprint visualisation at different intervals in a shaded ambient environment in Skudai
by: Jebur Al-Ghuri, Firas Hamzah
Published: (2026)
by: Jebur Al-Ghuri, Firas Hamzah
Published: (2026)
Developing an effective message framing framework in mitigating quishing threats
by: Heng, Pang Cheok
Published: (2026)
by: Heng, Pang Cheok
Published: (2026)
The Influence of Emotional Intelligence and Organisational Commitment on Turnover Intention among Workers in Ponderosa Golf & Country Club, Johor Bahru
by: Chandran, Sarmillah
Published: (2026)
by: Chandran, Sarmillah
Published: (2026)
Users' perceptions of holy public spaces in the holy city of Makkah
by: Nabhan, Yahya Muhammed
Published: (2026)
by: Nabhan, Yahya Muhammed
Published: (2026)
Critical success factors structural model for government asset management
by: Ismail, Norazli
Published: (2026)
by: Ismail, Norazli
Published: (2026)
Fusion of enhanced text-based and word embedding features for hate speech and offensive language multichannel deep learning classification
by: Abdul Aziz, Noor Azeera
Published: (2026)
by: Abdul Aziz, Noor Azeera
Published: (2026)
Design and scalability performance evaluation of permissioned blockchain architecture for online voting system
by: Oon, Wong Chee
Published: (2026)
by: Oon, Wong Chee
Published: (2026)
Anomaly network intrusion detection model based on hybrid CNN-LSTM and attention mechanism
by: Tingyue, Wang
Published: (2026)
by: Tingyue, Wang
Published: (2026)
Digital forensic framework on antitrust investigation for Malaysia competition commission (MYCC)
by: Abdul Rahman, Mohamad Ridzuan
Published: (2026)
by: Abdul Rahman, Mohamad Ridzuan
Published: (2026)
Google dorking commands-based approach for assisting forensic investigators in gender identification of social media data
by: Kanakasabai, Jeawan Naayagar
Published: (2026)
by: Kanakasabai, Jeawan Naayagar
Published: (2026)
Efficiency and effectiveness land tax administration model
by: Sahari, Siti Norfaizah
Published: (2026)
by: Sahari, Siti Norfaizah
Published: (2026)
Multimodal QR code phishing detection using multi-head attention and multilingual embeddings
by: Ibrahim Khalifa, Omar Yasser
Published: (2026)
by: Ibrahim Khalifa, Omar Yasser
Published: (2026)
Organizational individualism, corporate violation and reputation risk among the Chinese a-share listed firms
by: Bin, Wang
Published: (2026)
by: Bin, Wang
Published: (2026)
Rangka kerja penyertaan awam dalam penguatkuasaan pemindahan bahan batuan di Negeri Sembilan
by: Mohd Yusof, Mohd Hafiz
Published: (2026)
by: Mohd Yusof, Mohd Hafiz
Published: (2026)
Enhancing weibo security through the application of deep learning techniques in detecting fake images
by: Yating, He
Published: (2026)
by: Yating, He
Published: (2026)
Relationship between servant leadership, public service motivation, and organizational commitment on organizational citizenship behavior among public servant in Batam
by: Pajri, Endar Heryan
Published: (2026)
by: Pajri, Endar Heryan
Published: (2026)
Artificial intelligence for plate recognition and security protected by cyber attacks
by: Sukor, Ahmad Suzairy
Published: (2026)
by: Sukor, Ahmad Suzairy
Published: (2026)
Identity exposure optimization algorithm based on anonymization and homomorphic encryption in privacy preservation
by: Abdul Samad, Adlina
Published: (2026)
by: Abdul Samad, Adlina
Published: (2026)
Lim Kit Siang : the man and his politics / Wong Ching Wei
by: Wong, Ching Wei
Published: (1998)
by: Wong, Ching Wei
Published: (1998)
Relationship between Facebook usage and youth political participation in Nigeria
by: Abdu, Shamsu Dauda
Published: (2017)
by: Abdu, Shamsu Dauda
Published: (2017)
Intermestic politics and the evolution of Nigerian foreign policy in the post-independence era
by: Demola, Ajijola Oladele
Published: (2023)
by: Demola, Ajijola Oladele
Published: (2023)
Pengukuhan sistem monarki di Brunei, 1946-1986 / Muhammad bin Haji Awg. Damit
by: Haji Awg. Damit, Muhammad
Published: (1997)
by: Haji Awg. Damit, Muhammad
Published: (1997)
Hubungan Semangat 46 dan PAS 1988-1996 : satu tinjauan terhadap politik Malaysia / oleh Mazlan bin Ali.
by: Ali, Mazlan
Published: (1998)
by: Ali, Mazlan
Published: (1998)
Similar Items
-
Citizen-government social media engagement model in Indonesia
by: Ari Wedhasmara
Published: (2026) -
Text classification on South China Sea conflicts using Support Vector Machine (SVM) and K-Nearest Neighbors (KNN)
by: Ismail, Nurul Nadhirah
Published: (2026) -
Anomaly detection using rule-based model for fraud prevention in public sector payroll division
by: Mohidin, Mohd Nor
Published: (2026) -
Victim profiling in investment fraud based on bigbird-LSTM- CRF named entity recognition
by: Zikri, Muhammad Faris Ezany
Published: (2026) -
Assessing cybersecurity awareness levels in social commerce scams using the theory of planned behavior model
by: Han, Ho Xiao
Published: (2026)
