Technology acceptance model and e-learning M Masrom Technology 21 (24), 81, 2007 | 778 | 2007 |
The relationship between information technology acceptance and organizational agility in Malaysia M Zain, RC Rose, I Abdullah, M Masrom Information & management 42 (6), 829-839, 2005 | 453 | 2005 |
Camouflage in malware: from encryption to metamorphism BB Rad, M Masrom, S Ibrahim International Journal of Computer Science and Network Security 12 (8), 74-83, 2012 | 232 | 2012 |
The impact of Facebook addiction and self-esteem on students’ academic performance: A multi-group analysis AH Busalim, M Masrom, WNBW Zakaria Computers & Education 142, 103651, 2019 | 127 | 2019 |
User acceptance of Information Technology: Understanding theories and models M Masrom, R Hussein Venton Pub., 2008 | 124 | 2008 |
A framework of successful e-business incubator for Indonesian public universities L Gozali12, M Masrom, HN Haron, TYM Zagloel The Asian Journal of Technology Management Vol 8 (2), 120-134, 2015 | 92 | 2015 |
Review of e-learning and ICT infrastructure in developing countries (Case study of Iran) S Omidinia, M Masrom, H Selamat American Journal of Economics and Business Administration 3 (1), 120-125, 2011 | 90 | 2011 |
Critical success in e-learning: An examination of technological and institutional support factors M Masrom International Journal of Cyber Society and Education 1 (2), 131-142, 2008 | 77 | 2008 |
Understanding students’ behavior in online social networks: a systematic literature review MB Masrom, AH Busalim, H Abuhassna, NHN Mahmood International Journal of Educational Technology in Higher Education 18, 1-27, 2021 | 74 | 2021 |
Evolution of computer virus concealment and anti-virus techniques: a short survey BB Rad, M Masrom, S Ibrahim arXiv preprint arXiv:1104.1070, 2011 | 74 | 2011 |
SQL injection detection and prevention tools assessment A Tajpour, MZ Heydari, M Masrom, S Ibrahim 2010 3rd International Conference on Computer Science and Information …, 2010 | 74 | 2010 |
Opcodes histogram for classifying metamorphic portable executables malware BB Rad, M Masrom, S Ibrahim 2012 International Conference on e-Learning and e-Technologies in Education …, 2012 | 69 | 2012 |
An examination of smart card technology acceptance using adoption model H Taherdoost, M Masrom Proceedings of the ITI 2009 31st international conference on information …, 2009 | 58 | 2009 |
Metamorphic virus variants classification using opcode frequency histogram BB Rad, M Masrom arXiv preprint arXiv:1104.3228, 2011 | 56 | 2011 |
Issues in implementing it governance in small and medium enterprises M Ayat, M Masrom, S Sahibuddin, M Sharifi 2011 Second International Conference on Intelligent Systems, Modelling and …, 2011 | 55 | 2011 |
Comparison of SQL injection detection and prevention techniques A Tajpour, M Massrum, MZ Heydari 2010 2nd International Conference on Education Technology and Computer 5, V5 …, 2010 | 55 | 2010 |
A survey on recognition based graphical user authentication algorithms F Towhidi, M Masrom arXiv preprint arXiv:0912.0942, 2009 | 55 | 2009 |
SQL injection detection and prevention techniques A Tajpour, S Ibrahim, M Masrom International Journal of Advancements in Computing Technology 3 (7), 82-91, 2011 | 53 | 2011 |
Performance factors for successful business incubators in Indonesian public universities L Gozali, M Masrom, TYM Zagloel, HN Haron, JA Garza-Reyes, ... International Journal of Technology, 2020 | 51 | 2020 |
A review of cloud computing technology solution for healthcare system M Masrom, A Rahimli Research Journal of Applied Sciences, Engineering and Technology 8 (20 …, 2014 | 44 | 2014 |