Technology acceptance model and e-learning M Masrom Technology 21 (24), 81, 2007 | 615 | 2007 |
The relationship between information technology acceptance and organizational agility in Malaysia M Zain, RC Rose, I Abdullah, M Masrom Information & management 42 (6), 829-839, 2005 | 411 | 2005 |
Camouflage in malware: from encryption to metamorphism BB Rad, M Masrom, S Ibrahim International Journal of Computer Science and Network Security 12 (8), 74-83, 2012 | 198 | 2012 |
User acceptance of Information Technology: Understanding theories and models M Masrom, R Hussein Venton Pub., 2008 | 113 | 2008 |
Review of e-learning and ICT infrastructure in developing countries (Case study of Iran) S Omidinia, M Masrom, H Selamat American Journal of Economics and Business Administration 3 (1), 120-125, 2011 | 84 | 2011 |
The impact of Facebook addiction and self-esteem on students’ academic performance: A multi-group analysis AH Busalim, M Masrom, WNBW Zakaria Computers & Education 142, 103651, 2019 | 70 | 2019 |
Critical success in e-learning: An examination of technological and institutional support factors M Masrom International Journal of Cyber Society and Education 1 (2), 131-142, 2008 | 69 | 2008 |
A framework of successful e-business incubator for Indonesian public universities L Gozali12, M Masrom, HN Haron, TYM Zagloel The Asian Journal of Technology Management Vol 8 (2), 120-134, 2015 | 68 | 2015 |
SQL injection detection and prevention tools assessment A Tajpour, MZ Heydari, M Masrom, S Ibrahim 2010 3rd International Conference on Computer Science and Information …, 2010 | 68 | 2010 |
Evolution of computer virus concealment and anti-virus techniques: a short survey BB Rad, M Masrom, S Ibrahim arXiv preprint arXiv:1104.1070, 2011 | 66 | 2011 |
Opcodes histogram for classifying metamorphic portable executables malware BB Rad, M Masrom, S Ibrahim 2012 International Conference on e-Learning and e-Technologies in Education …, 2012 | 56 | 2012 |
A survey on recognition based graphical user authentication algorithms F Towhidi, M Masrom arXiv preprint arXiv:0912.0942, 2009 | 55 | 2009 |
Metamorphic virus variants classification using opcode frequency histogram BB Rad, M Masrom arXiv preprint arXiv:1104.3228, 2011 | 53 | 2011 |
Comparison of SQL injection detection and prevention techniques A Tajpour, M Massrum, MZ Heydari 2010 2nd International Conference on Education Technology and Computer 5, V5 …, 2010 | 52 | 2010 |
Issues in implementing it governance in small and medium enterprises M Ayat, M Masrom, S Sahibuddin, M Sharifi 2011 Second International Conference on Intelligent Systems, Modelling and …, 2011 | 50 | 2011 |
SQL injection detection and prevention techniques A Tajpour, S Ibrahim, M Masrom International Journal of Advancements in Computing Technology 3 (7), 82-91, 2011 | 47 | 2011 |
An examination of smart card technology acceptance using adoption model H Taherdoost, M Masrom Proceedings of the ITI 2009 31st International Conference on Information …, 2009 | 42 | 2009 |
Understanding students’ behavior in online social networks: A systematic literature review MB Masrom, AH Busalim, H Abuhassna, NHN Mahmood International Journal of Educational Technology in Higher Education 18, 1-27, 2021 | 39 | 2021 |
A review of cloud computing technology solution for healthcare system M Masrom, A Rahimli Research Journal of Applied Sciences, Engineering and Technology 8 (20 …, 2014 | 34 | 2014 |
Overview of data security issues in hospital information systems M Masrom, A Rahimly Pacific Asia Journal of the Association for Information Systems 7 (4), 5, 2015 | 30 | 2015 |