Waqas Ahmed

Waqas Ahmed
University of Kuala Lumpur | unikl · Business School

PhD. Management
Looking for Collaborative Opportunities in Technology Management & Transportation Fields. --- contact@waqasalvi.com

About

27
Publications
10,911
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
106
Citations
Introduction
My research interests include the implementation of Management Information System and Smart Technologies to enhance the digital integration at business and government level and to understand the cognitive perspective of individuals (i.e., employees, consumers & citizens) towards technology use. My doctoral research work is based on behavioral assessment of citizens towards the smart mobility services in Malaysia.
Additional affiliations
April 2019 - present
University of Kuala Lumpur
Position
  • Excellent Graduate Assistant
May 2013 - December 2017
Merck KGaA
Position
  • Operational Associate
Education
January 2018 - July 2022
University of Kuala Lumpur
Field of study
  • Technology Management
August 2010 - August 2012
COMSATS University Islamabad
Field of study
  • Management

Publications

Publications (27)
Article
Full-text available
Smart city is synchronized with digital environment and its transportation system is vitalized with RFID sensors, Internet of Things (IoT) and Artificial Intelligence. However, without user's behavioral assessment of technology, the ultimate usefulness of smart mobility cannot be achieved. This paper aims to formulate the research framework for pre...
Article
The implementation of digital apparatuses is merely the investment of non-living resources while reaping prolific outcomes from digital business initiatives is ensured through talented and ambitious employees. This review study aims to shed the light on an imperative behavioural feature of employees i.e., digital dexterity (DD) that has emerged as...
Article
Full-text available
Orientation: Solving the dearth of skilled employees and maintaining the engagement policy are key concerns of the Malaysian telecom sector. Therefore, talent management practices have created a mainstream process for telecom employers to be proactively involved in talent engagement. Research purpose: This study aimed to elucidate the vital talent...
Article
Full-text available
Technology integration in transportation enhances the efficiency towards urban mobility management. The effective implementation of such technologies requires exploration of vital factors of acceptance and use. This study synthesizes a review work on the road-transport technologies' literature from 2011 to 2021 by contemplating the adoption mechani...
Conference Paper
Full-text available
Web 3.0 is considered as future of Internet where decentralization, user personalization and privacy protection would be the main aspects of Internet. Aim of this research work is to elucidate the adoption behavior of Web 3.0 through a multi-analytical approach based on Partial Least Squares Structural Equation Modelling (PLS-SEM) and Twitter senti...
Preprint
Full-text available
Web 3.0 is considered as future of Internet where decentralization, user personalization and privacy protection would be the main aspects of Internet. Aim of this research work is to elucidate the adoption behavior of Web 3.0through a multi-analytical approach based on Partial Least Squares Structural Equation Modelling (PLS-SEM) and Twitter sentim...
Conference Paper
Full-text available
Technology integration at mass level can help the emerging economies to fill the skill gaps by enhancing the digital competency in young fellows, particularly female students. The study aims to understand and craft the predictors of digital competency among female students. Therefore, a research framework was hypothesized by enlisting the personal...
Conference Paper
Full-text available
Sustainability in urban transport mechanisms is a matter of significance in developing economies. Assessing the commuters' behavior towards urban transport system facilitates the authorities to devise the policies for the safe and advanced choice of mobility. In the Klang Valley of Malaysia, the personal mobility practices have created the challeng...
Preprint
Full-text available
This review paper identifies the core evidence of research on employee engagement , considering a stern challenge facing the financial sector nowadays. The study highlights the noteworthy knowledge gaps that will support human resource management practitioners to embed in the research towards sectoral context. Pertinent articles were selected throu...
Preprint
Full-text available
A smart home is grounded on the sensors that endure automation, safety, and structural integration. The security mechanism in digital setup possesses vibrant prominence and the biometric facial recognition system is novel addition to accrue the smart home features. Understanding the implementation of such technology is the outcome of user behavior...
Article
Full-text available
This review paper identifies the core evidence of research on employee engagement, considering a stern challenge facing the financial sector nowadays. The study highlights the noteworthy knowledge gaps that will support human resource management practitioners to embed in the research towards sectoral context. Pertinent articles were selected throug...
Preprint
Full-text available
Learning behavior mechanism is widely anticipated in managed settings through the formal syllabus. However, heading for learning stimulus whilst daily mobility practices through urban transit is the novel feature in learning sciences. Theory of planned behavior (TPB), technology acceptance model (TAM), and service quality of transit are conceptuali...
Preprint
Full-text available
This study integrates the educators digital competency (DC), as an individual characteristic construct of the task-technology fit (TTF) theory, to examine a better fit between Moodle using and teaching task, and to investigate its effect on both Moodles utilization and their task performance. For assessing our proposed hypotheses, an online survey...
Presentation
Full-text available
A smart home is grounded on the sensors that endure automation, safety, and structural integration. The security mechanism in digital setup possesses vibrant prominence and the biometric facial recognition system is novel addition to accrue the smart home features. Understanding the implementation of such technology is the outcome of user behav...
Chapter
Full-text available
A smart home is grounded on the sensors that endure automation, safety, and structural integration. The security mechanism in digital setup possesses vibrant prominence and the biometric facial recognition system is novel addition to accrue the smart home features. Understanding the implementation of such technology is the outcome of user behavior...
Conference Paper
Full-text available
This study integrates the educators' digital competency (DC), as an individual characteristic construct of the task-technology fit (TTF) theory, to examine a better fit between Moodle using and teaching task, and to investigate its effect on both Moodle's utilization and their task performance. For assessing our proposed hypotheses, an online surve...
Conference Paper
Full-text available
Learning behavior mechanism is widely anticipated in managed settings through the formal syllabus. However, heading for learning stimulus whilst daily mobility practices through urban transit is the novel feature in learning sciences. Theory of planned behavior (TPB), technology acceptance model (TAM), and service quality of transit are conceptuali...
Chapter
Full-text available
In Trusted Computing, the client platform is checked for its trustworthiness using Remote Attestation. Integrity Measurement Architecture (IMA) is a well-known technique of TCG based attestation. However, due to static nature of IMA, it cannot be aware of the runtime behavior of applications which leads to integrity problems. To overcome this probl...
Conference Paper
Full-text available
As the disruptive innovations are being penetrated to each level of society, the acceptance of modern technology is regulating the education activities. Managing the educational usage of computing through cloud applications is a matter of discussion nowadays. The aim of this study is to instigate the assessment of the adoption of cloud computing fr...
Chapter
Full-text available
Big data analytics (BDA) is heralded to generate vast-scale business prospects. Employee acceptance of BDA system is of utmost significance, as digital transition in organizations can be crippled by employee behavior. Therefore, an in-depth analysis of theory-based research is vital to comprehend the major instigations towards digital tools integra...
Preprint
Full-text available
Smart city is synchronized with digital environment and its transportation system is vitalized with RFID sensors, Internet of Things (IoT) and Artificial Intelligence. However, without user's behavioral assessment of technology, the ultimate usefulness of smart mobility cannot be achieved. This paper aims to formulate the research framework for pre...
Preprint
Full-text available
Big Data is used by data miner for analysis purpose which may contain sensitive information. During the procedures it raises certain privacy challenges for researchers. The existing privacy preserving methods use different algorithms that results into limitation of data reconstruction while securing the sensitive data. This paper presents a cluster...
Preprint
Full-text available
Service quality possesses the vital prominence in usability of innovative products and services. As technological innovation has made the life synchronized and effective, Internet of Things (IoT) is matter of discussion everywhere. From users' perspective, IoT services are always embraced by various system characteristics of security and performanc...
Preprint
Full-text available
Internet of Things (IoT) occupies a vital aspect of our everyday lives. IoT networks composed of smart-devices which communicate and transfer the information without the physical intervention of humans. Due to such proliferation and autonomous nature of IoT systems make these devices threatened and prone to a severe kind of threats. In this paper,...
Article
Full-text available
Big Data is used by data miner for analysis purpose which may contain sensitive information. During the procedures it raises certain privacy challenges for researchers. The existing privacy preserving methods use different algorithms that results into limitation of data reconstruction while securing the sensitive data. This paper presents a cluster...
Conference Paper
Full-text available
In recent years, Internet of Things (IoT) occupies a vital aspect of our daily lives. IoT networks composed of smart-devices which communicate and exchange the information without the physical intervention of humans. Due to such proliferation and autonomous nature of IoT systems make the devices more vulnerable and prone to a severe kind of threats...
Article
Full-text available
Service quality possesses the vital prominence in usability of innovative products and services. As Technological innovation has made the life synchronized and effective, Internet of Things (IoT) is matter of discussion everywhere. From users’ perspective, IoT services are always embraced by various system characteristics of security and performanc...

Questions

Questions (8)
Question
Under what conditions should a researcher use variance-based SEM vs covariance-based SEM?
Question
What is meaning of Connected Vehicle ? And is this Connectivity based on certain Transponder or GPS Based Positioning or Internet?
Question
Wat will happen when an individuals personal task and commitments are solely based on sensors and even his/her professional or workplace assignments also carried by synchronized environments .. What will be end point of all this Mess when human interference reaches to obsolete stage.
Question
Smart Watches are More Smart Than Phones in Terms of Connectivity and Portability
Question
It is observed that various Thesis included the Hypothesis in Chapter 01 also, as per its proper place after literature review in Chapter 02. Is this viable practice?
Research Question, Research Objective and Research Hypothesis portray the same tone so what is the difference between writing the hypothesis in chapter 01 and chapter 02?
Question
However In case even when instrument questions are adopted, it is said that EFA will be applied first than CFA? Is this TRUE?
Question
Can a Theoretical Model be validated by both Techniques? What are the condition for each method.

Network

Cited By

Projects

Projects (5)
Project
Establishing the Break-Even Point between Innovation Development & Skill Management for Personal, Professional & Academic Perspective.
Project
User behavior assessment towards digital technology adoption in personal life through quantitative and qualitative analysis.