Waqas Ahmed

Waqas Ahmed
University of Kuala Lumpur | unikl · Business School

PhD. Management
Open for Network: Digital Transformation in Business, Transport, and Education. email: contact@waqasalvi.com

About

35
Publications
19,253
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
282
Citations
Introduction
My research interests include the implementation of Management Information System and Smart Technologies to enhance the digital integration at business and government level and to understand the cognitive perspective of individuals (i.e., employees, consumers & citizens) towards technology use. My doctoral research work is based on behavioral assessment of citizens towards the smart mobility services in Malaysia.
Additional affiliations
April 2019 - present
University of Kuala Lumpur
Position
  • Excellent Graduate Assistant
Education
January 2018 - December 2023
University of Kuala Lumpur
Field of study
  • Technology Management
August 2010 - August 2012
COMSATS University Islamabad
Field of study
  • Management

Publications

Publications (35)
Conference Paper
Full-text available
Web 3.0 is considered as future of Internet where decentralization, user personalization and privacy protection would be the main aspects of Internet. Aim of this research work is to elucidate the adoption behavior of Web 3.0 through a multi-analytical approach based on Partial Least Squares Structural Equation Modelling (PLS-SEM) and Twitter senti...
Article
Full-text available
Digital competence among business research students is heralded as a pragmatic expression of the quality of research output and effective collaboration. Self-Directed Learning (SDL) is a resourceful personal and professional development technique, yet there is minimal research on SDL for digital competence among business scholars. This study invest...
Article
Full-text available
The shift towards sustainable and digital practices in organizations is transforming employees’ mindsets and work performance. The digital transformation in academia is leading to meaningful changes in the behaviors and responsibilities of non-academic employees within organizations toward sustainable and responsible practices. By expounding insigh...
Conference Paper
Full-text available
As the business landscape progresses, the advancement of information systems is becoming increasingly valuable in shaping the future workforce. The rising demand for skilled employees who can navigate and manage technological tools and stay engaged in the workplace requires businesses to make significant efforts to advance their workforce's di...
Chapter
Full-text available
As agrotourism continues to thrive as a sustainable and immersive experience, the adoption of smart farming technologies, encompassing the Internet of Things (IoT), artificial intelligence, robotics, and data analytics, emerges as a pivotal driver in elevating agricultural practices and enhancing visitor experiences. This study examines the fundame...
Article
Full-text available
Digital terrorism represents a growing threat in the digital age, focusing on the manipulation of human behavior rather than technical disruptions. Unlike cyberterrorism, digital terrorism leverages misinformation, disinformation, emotional manipulation, and targeted propaganda to destabilize societies, polarize communities, and incite conflict. Th...
Presentation
Full-text available
Conducted the Seminar on Data Analysis for PhD students at UTMSPACE Gurney Mall, Kuala Lumpur
Presentation
The 3rd International Conference on Computing and Information Technology (ICCIT) is the premier forum for exchanging ideas and interacting with experts from diverse fields such as Software engineering, Computer Security, Artificial Intelligence, Database Management Systems, Computer Networks, Electronics Devices, Operating Systems, Internet of Thin...
Article
Full-text available
With individuals of all ages confined to their homes for extended periods of time, the pandemic laid the groundwork for an upsurge in online mobile gaming addiction and risky internet usage. According to research, those who are hooked to online gaming are more likely to experience social interaction anxiety. This research is an additional attempt t...
Preprint
Full-text available
Web 3.0 is considered as future of Internet where decentralization, user personalization and privacy protection would be the main aspects of Internet. Aim of this research work is to elucidate the adoption behavior of Web 3.0through a multi-analytical approach based on Partial Least Squares Structural Equation Modelling (PLS-SEM) and Twitter sentim...
Article
Full-text available
Technology integration in transportation enhances the efficiency towards urban mobility management. The effective implementation of such technologies requires exploration of vital factors of acceptance and use. This study synthesizes a review work on the road-transport technologies' literature from 2011 to 2021 by contemplating the adoption mechani...
Article
Full-text available
Orientation: Solving the dearth of skilled employees and maintaining the engagement policy are key concerns of the Malaysian telecom sector. Therefore, talent management practices have created a mainstream process for telecom employers to be proactively involved in talent engagement. Research purpose: This study aimed to elucidate the vital talent...
Conference Paper
Full-text available
Technology integration at mass level can help the emerging economies to fill the skill gaps by enhancing the digital competency in young fellows, particularly female students. The study aims to understand and craft the predictors of digital competency among female students. Therefore, a research framework was hypothesized by enlisting the personal...
Conference Paper
Full-text available
Sustainability in urban transport mechanisms is a matter of significance in developing economies. Assessing the commuters' behavior towards urban transport system facilitates the authorities to devise the policies for the safe and advanced choice of mobility. In the Klang Valley of Malaysia, the personal mobility practices have created the challeng...
Preprint
Full-text available
This review paper identifies the core evidence of research on employee engagement , considering a stern challenge facing the financial sector nowadays. The study highlights the noteworthy knowledge gaps that will support human resource management practitioners to embed in the research towards sectoral context. Pertinent articles were selected throu...
Preprint
Full-text available
A smart home is grounded on the sensors that endure automation, safety, and structural integration. The security mechanism in digital setup possesses vibrant prominence and the biometric facial recognition system is novel addition to accrue the smart home features. Understanding the implementation of such technology is the outcome of user behavior...
Article
Full-text available
This review paper identifies the core evidence of research on employee engagement, considering a stern challenge facing the financial sector nowadays. The study highlights the noteworthy knowledge gaps that will support human resource management practitioners to embed in the research towards sectoral context. Pertinent articles were selected throug...
Preprint
Full-text available
Learning behavior mechanism is widely anticipated in managed settings through the formal syllabus. However, heading for learning stimulus whilst daily mobility practices through urban transit is the novel feature in learning sciences. Theory of planned behavior (TPB), technology acceptance model (TAM), and service quality of transit are conceptuali...
Preprint
Full-text available
This study integrates the educators digital competency (DC), as an individual characteristic construct of the task-technology fit (TTF) theory, to examine a better fit between Moodle using and teaching task, and to investigate its effect on both Moodles utilization and their task performance. For assessing our proposed hypotheses, an online survey...
Presentation
Full-text available
A smart home is grounded on the sensors that endure automation, safety, and structural integration. The security mechanism in digital setup possesses vibrant prominence and the biometric facial recognition system is novel addition to accrue the smart home features. Understanding the implementation of such technology is the outcome of user behav...
Chapter
Full-text available
A smart home is grounded on the sensors that endure automation, safety, and structural integration. The security mechanism in digital setup possesses vibrant prominence and the biometric facial recognition system is novel addition to accrue the smart home features. Understanding the implementation of such technology is the outcome of user behavior...
Conference Paper
Full-text available
This study integrates the educators' digital competency (DC), as an individual characteristic construct of the task-technology fit (TTF) theory, to examine a better fit between Moodle using and teaching task, and to investigate its effect on both Moodle's utilization and their task performance. For assessing our proposed hypotheses, an online surve...
Conference Paper
Full-text available
Learning behavior mechanism is widely anticipated in managed settings through the formal syllabus. However, heading for learning stimulus whilst daily mobility practices through urban transit is the novel feature in learning sciences. Theory of planned behavior (TPB), technology acceptance model (TAM), and service quality of transit are conceptuali...
Chapter
Full-text available
In Trusted Computing, the client platform is checked for its trustworthiness using Remote Attestation. Integrity Measurement Architecture (IMA) is a well-known technique of TCG based attestation. However, due to static nature of IMA, it cannot be aware of the runtime behavior of applications which leads to integrity problems. To overcome this probl...
Article
Full-text available
The implementation of digital apparatuses is merely the investment of non-living resources while reaping prolific outcomes from digital business initiatives is ensured through talented and ambitious employees. This review study aims to shed the light on an imperative behavioural feature of employees i.e., digital dexterity (DD) that has emerged as...
Conference Paper
Full-text available
As the disruptive innovations are being penetrated to each level of society, the acceptance of modern technology is regulating the education activities. Managing the educational usage of computing through cloud applications is a matter of discussion nowadays. The aim of this study is to instigate the assessment of the adoption of cloud computing fr...
Chapter
Full-text available
Big data analytics (BDA) is heralded to generate vast-scale business prospects. Employee acceptance of BDA system is of utmost significance, as digital transition in organizations can be crippled by employee behavior. Therefore, an in-depth analysis of theory-based research is vital to comprehend the major instigations towards digital tools integra...
Article
Full-text available
Smart city is synchronized with digital environment and its transportation system is vitalized with RFID sensors, Internet of Things (IoT) and Artificial Intelligence. However, without user's behavioral assessment of technology, the ultimate usefulness of smart mobility cannot be achieved. This paper aims to formulate the research framework for pre...
Preprint
Full-text available
Smart city is synchronized with digital environment and its transportation system is vitalized with RFID sensors, Internet of Things (IoT) and Artificial Intelligence. However, without user's behavioral assessment of technology, the ultimate usefulness of smart mobility cannot be achieved. This paper aims to formulate the research framework for pre...
Preprint
Full-text available
Big Data is used by data miner for analysis purpose which may contain sensitive information. During the procedures it raises certain privacy challenges for researchers. The existing privacy preserving methods use different algorithms that results into limitation of data reconstruction while securing the sensitive data. This paper presents a cluster...
Preprint
Full-text available
Service quality possesses the vital prominence in usability of innovative products and services. As technological innovation has made the life synchronized and effective, Internet of Things (IoT) is matter of discussion everywhere. From users' perspective, IoT services are always embraced by various system characteristics of security and performanc...
Preprint
Full-text available
Internet of Things (IoT) occupies a vital aspect of our everyday lives. IoT networks composed of smart-devices which communicate and transfer the information without the physical intervention of humans. Due to such proliferation and autonomous nature of IoT systems make these devices threatened and prone to a severe kind of threats. In this paper,...
Article
Full-text available
Big Data is used by data miner for analysis purpose which may contain sensitive information. During the procedures it raises certain privacy challenges for researchers. The existing privacy preserving methods use different algorithms that results into limitation of data reconstruction while securing the sensitive data. This paper presents a cluster...
Conference Paper
Full-text available
In recent years, Internet of Things (IoT) occupies a vital aspect of our daily lives. IoT networks composed of smart-devices which communicate and exchange the information without the physical intervention of humans. Due to such proliferation and autonomous nature of IoT systems make the devices more vulnerable and prone to a severe kind of threats...
Article
Full-text available
Service quality possesses the vital prominence in usability of innovative products and services. As Technological innovation has made the life synchronized and effective, Internet of Things (IoT) is matter of discussion everywhere. From users’ perspective, IoT services are always embraced by various system characteristics of security and performanc...

Questions

Questions (8)
Question
Under what conditions should a researcher use variance-based SEM vs covariance-based SEM?
Question
What is meaning of Connected Vehicle ? And is this Connectivity based on certain Transponder or GPS Based Positioning or Internet?
Question
Wat will happen when an individuals personal task and commitments are solely based on sensors and even his/her professional or workplace assignments also carried by synchronized environments .. What will be end point of all this Mess when human interference reaches to obsolete stage.
Question
Smart Watches are More Smart Than Phones in Terms of Connectivity and Portability
Question
It is observed that various Thesis included the Hypothesis in Chapter 01 also, as per its proper place after literature review in Chapter 02. Is this viable practice?
Research Question, Research Objective and Research Hypothesis portray the same tone so what is the difference between writing the hypothesis in chapter 01 and chapter 02?
Question
However In case even when instrument questions are adopted, it is said that EFA will be applied first than CFA? Is this TRUE?
Question
Can a Theoretical Model be validated by both Techniques? What are the condition for each method.

Network

Cited By