The Communities of Practice model for understanding digital engagement by hyperlocal elected representatives
Cruickshank, P., & Ryan, B. (2016)
The Communities of Practice model for understanding digital engagement by hyperlocal elected representatives. In M. Janssen, M. A. Wimmer, Ø. Sæbø, T. A. Pardo, P. Panagiotopoulos, M. Gascó, …E. Tambouris (Eds.), Electronic Government and Electronic Participation, 11-18. https://doi.org/10.3233/978-1-61499-570-8-11
There has been much research into citizens’ engagement with their representatives. This paper offers an approach to understanding sustained take-up of internet technologies by...
Executive compensation in government-linked companies: evidence from Malaysia
Minhat, M., & Abdullah, M. (2014)
Executive compensation in government-linked companies: evidence from Malaysia. Applied Economics, 46(16), 1861-1872. https://doi.org/10.1080/00036846.2014.887192
The aim of this study was to explore the characteristics of executive pay, equity ownership incentives and pay–performance relationship in government-controlled firms. Data we...
Frequency-based maritime container assignment model for global liner services.
Bell, M. G. H., Angeloudis, P., Liu, X., Fonzone, A., & Hosseinloo, S. H. (2011)
Frequency-based maritime container assignment model for global liner services. In TRB 90th Annual Meeting Compendium of Papers DVD
This paper transposes the classic frequency-based transit assignment method of Spiess and Florian to containers demonstrating its promise as the basis for a global maritime co...
Instant messaging: using log files to identify patterns of interaction in group of teenage users.
Davison, B., & Buckner, K. (2005)
Instant messaging: using log files to identify patterns of interaction in group of teenage users. In A. Sloane (Ed.), Home-oriented informatics and telematics : proceedings of the IFIP WG 9.3 HOIT2005 conference, 277 - 290. https://doi.org/10.1007/11402985_20
This paper presents preliminary findings on teenagers’ use of instant messaging (IM) as an example of an Internet technology. The results are quantitative, being drawn from th...
In search of the cybermuse: supporting creative activity within product design.
Mival, O. (2002)
In search of the cybermuse: supporting creative activity within product design. In J. Mottram, L. Candy, & T. Kavanagh (Eds.), Creativity & cognition : proceedings of the fourth Creativity & Cognition Conference : exhibition papers and posters : Loughborough University, Loughborough, 47-48
No abstract available.
Is executive compensation a substitute governance mechanism to debt financing and leasing?
Minhat, M., & Dzolkarnaini, N. (2016)
Is executive compensation a substitute governance mechanism to debt financing and leasing?. Applied Economics, 48(14), 1293-1302. https://doi.org/10.1080/00036846.2015.1100247
This study examines whether and how CEO equity incentives relate to financing choices (i.e., debt and leases). Using manually collected CEO compensation and lease data for a s...
Islamic financial instruments in corporate firms’ balance sheet: a research note
Dzolkarnaini, N., & Minhat, M. (2012)
Islamic financial instruments in corporate firms’ balance sheet: a research note. International Journal of Excellence in Islamic Banking and Finance, 2,
Purpose: This paper examines the use of Islamic Financial Instruments (IFIs) in the corporate firms’ balance sheet.
Methodology/Approach: The overall research approach involve...
Enhancing Big Data Security with Collaborative Intrusion Detection
Tan, Z., Nagar, U. T., He, X., Nanda, P., Liu, R. P., Wang, S., & Hu, J. (2014)
Enhancing Big Data Security with Collaborative Intrusion Detection. IEEE cloud computing, 1(3), 27-33. https://doi.org/10.1109/mcc.2014.53
Big data, often stored in cloud networks, is changing our business models and applications. Rich information residing in big data is driving business decision making to be a d...
Detection of Denial-of-Service Attacks Based on Computer Vision Techniques
Tan, Z., Jamdagni, A., He, X., Nanda, P., Liu, R. P., & Hu, J. (2015)
Detection of Denial-of-Service Attacks Based on Computer Vision Techniques. IEEE Transactions on Computers, 64(9), 2519-2533. https://doi.org/10.1109/tc.2014.2375218
Detection of Denial-of-Service (DoS) attacks has attracted researchers since 1990s. A variety of detection systems has been proposed to achieve this task. Unlike the existing ...
Improving cloud network security using the Tree-Rule firewall
He, X., Chomsiri, T., Nanda, P., & Tan, Z. (2014)
Improving cloud network security using the Tree-Rule firewall. Future Generation Computer Systems, 30, 116-126. https://doi.org/10.1016/j.future.2013.06.024
This study proposes a new model of firewall called the ‘Tree-Rule Firewall’, which offers various benefits and is applicable for large networks such as ‘cloud’ networks. The r...