Follow
Noraini Che Pa
Noraini Che Pa
Associate Professor Universiti Putra Malaysia
Verified email at upm.edu.my
Title
Cited by
Cited by
Year
Cyber security for cyber physcial systems: A trust-based approach
A Saqib, RW Anwar, OK Hussain, M Ahmad, MA Ngadi, MM Mohamad, ...
J Theor Appl Inf Technol 71 (2), 144-152, 2015
342015
Risk assessment of IT governance: A systematic literature review.
NC Pa, A BOKOLO JNR, RNH Nor, MAA Murad
Journal of Theoretical & Applied Information Technology 71 (2), 2015
322015
A survey on approaches in knowledge audit in organizations
NC Pa, L Taheri, R Abdullah
Asian Transaction on Computers 2 (5), 1-8, 2012
322012
A framework for adoption and implementation of green IT/IS practice in IT governance
BA Jnr, NC Pa
The Third International Conference on Green Computing, Technology and …, 2015
282015
Requirement elicitation: identifying the communication challenges between developer and customer
NC Pa, AM Zin
International Journal of New Computer Architectures and their Applications …, 2011
282011
Measuring communication gap in software requirements elicitation process
AM Zin, N Pa
Proceedings of the 8th WSEAS International Conference on Software …, 2009
262009
Open source software selection using an analytical hierarchy process (AHP)
YY Jusoh, K Chamili, NC Pa, JH Yahaya
American Journal of Software Engineering and Applications, 2014
212014
A case based reasoning architecture and component based model for Green IS implementation and diffusion in organisation
B Anthony Jr, NC Pa
International Journal of Digital Information and Wireless Communications 6 …, 2016
202016
A knowledge audit model for requirement elicitation: A case study to assess knowledge in requirement elicitation
L Taheri, MY Shafazand, NC Pa, R Abdullah, S Abdullah
Knowledge and Process Management 24 (4), 257-268, 2017
192017
Autonomic computing systems utilizing agents for risk mitigation of IT governance
BA Jnr, NC Pa, TNM Aris, RNH Nor, YY Jusoh
Jurnal Teknologi 77 (18), 49-60, 2015
182015
Fakebuster: Fake news detection system using logistic regression technique in machine learning
MS Mokhtar, YY Jusoh, N Admodisastro, NC Pa, AY Amruddin
International Journal of Engineering and Advanced Technology 9 (1), 2407-2410, 2019
152019
An analysis of knowledge sharing behaviors in requirement engineering through social media
L Wu, NC Pa, R Abdullah, WNWA Rahman
2015 9th Malaysian Software Engineering Conference (MySEC), 93-98, 2015
152015
A Review on Decision Making of Risk Mitigation for Software Management.
NCHE PA, BA JNR
Journal of Theoretical & Applied Information Technology 76 (3), 2015
152015
The selection criteria of open source software adoption in Malaysia
Y Jusoh, K Chamili, JH Yahaya, NC Pa
International Journal of Advancements in Computing Technology 4 (21), 278-287, 2012
152012
A Proposed Risk Assessment Model For Decision Making In Software Management
N Pa, M Khalefa, H Alasadi, H Zmezm
Journal of Soft Computing and Decision Support Systems (JSCDSS) 3 (5), 31-43, 2016
12*2016
Developing a Learning Outcome-Based Question Examination Paper Tool for Universiti Putra Malaysia.
S Hassan, NI Admodisastro, A Kamaruddin, S Baharom, NC Pa
International Education Studies 9 (2), 132-140, 2016
122016
A risk assessment model for collaborative support in software management
B Anthony, NC Pa, RNH Nor, YY Josoh
2015 9th Malaysian Software Engineering Conference (MySEC), 217-223, 2015
112015
Identifying knowledge components in software requirement elicitation
L Taheri, NC Pa, R Abdullah, S Abdullah, MY Shafazand
2014 IEEE International Conference on Industrial Engineering and Engineering …, 2014
112014
Knowledge audit model for requirement elicitation process
L Taheri, N Che Pa, R Abdullah, S Abdullah
International Scholarly and Scientific Research & Innovation 8 (2), 452-456, 2014
112014
E-Learning User Interface Acceptance Based on Analysis of User's Style, Usability and User Benefits
R binti Atan, MH Selamat, NC Pa, R Abdullah
Jurnal Sistem Informasi 9 (1), 6-12, 2013
92013
The system can't perform the operation now. Try again later.
Articles 1–20