Waqas AhmedUniversity of Kuala Lumpur | unikl · Business School
Waqas Ahmed
PhD. Management
Open for Network:
Digital Transformation in Business, Transport, and Education.
email: contact@waqasalvi.com
About
35
Publications
19,253
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
282
Citations
Introduction
My research interests include the implementation of Management Information System and Smart Technologies to enhance the digital integration at business and government level and to understand the cognitive perspective of individuals (i.e., employees, consumers & citizens) towards technology use. My doctoral research work is based on behavioral assessment of citizens towards the smart mobility services in Malaysia.
Additional affiliations
April 2019 - present
Education
January 2018 - December 2023
August 2010 - August 2012
Publications
Publications (35)
Web 3.0 is considered as future of Internet where decentralization, user personalization and privacy protection would be the main aspects of Internet. Aim of this research work is to elucidate the adoption behavior of Web 3.0 through a multi-analytical approach based on Partial Least Squares Structural Equation Modelling (PLS-SEM) and Twitter senti...
Digital competence among business research students is heralded as a pragmatic expression of the quality of research output and effective collaboration. Self-Directed Learning (SDL) is a resourceful personal and professional development technique, yet there is minimal research on SDL for digital competence among business scholars. This study invest...
The shift towards sustainable and digital practices in organizations is transforming employees’ mindsets and work performance. The digital transformation in academia is leading to meaningful changes in the behaviors and responsibilities of non-academic employees within organizations toward sustainable and responsible practices. By expounding insigh...
As the business landscape progresses, the
advancement of information systems is becoming increasingly
valuable in shaping the future workforce. The rising demand for
skilled employees who can navigate and manage technological
tools and stay engaged in the workplace requires businesses to
make significant efforts to advance their workforce's di...
As agrotourism continues to thrive as a sustainable and immersive
experience, the adoption of smart farming technologies, encompassing the Internet of Things (IoT), artificial intelligence, robotics, and data analytics, emerges
as a pivotal driver in elevating agricultural practices and enhancing visitor experiences. This study examines the fundame...
Digital terrorism represents a growing threat in the digital age, focusing on the manipulation of human behavior rather than technical disruptions. Unlike cyberterrorism, digital terrorism leverages misinformation, disinformation, emotional manipulation, and targeted propaganda to destabilize societies, polarize communities, and incite conflict. Th...
Conducted the Seminar on Data Analysis for PhD students at UTMSPACE Gurney Mall, Kuala Lumpur
The 3rd International Conference on Computing and Information Technology (ICCIT) is the premier forum for exchanging ideas and interacting with experts from diverse fields such as Software engineering, Computer Security, Artificial Intelligence, Database Management Systems, Computer Networks, Electronics Devices, Operating Systems, Internet of Thin...
With individuals of all ages confined to their homes for extended periods of time, the pandemic laid the groundwork for an upsurge in online mobile gaming addiction and risky internet usage. According to research, those who are hooked to online gaming are more likely to experience social interaction anxiety. This research is an additional attempt t...
Web 3.0 is considered as future of Internet where decentralization, user personalization and privacy protection would be the main aspects of Internet. Aim of this research work is to elucidate the adoption behavior of Web 3.0through a multi-analytical approach based on Partial Least Squares Structural Equation Modelling (PLS-SEM) and Twitter sentim...
Technology integration in transportation enhances the efficiency towards urban mobility management. The effective implementation of such technologies requires exploration of vital factors of acceptance and use. This study synthesizes a review work on the road-transport technologies' literature from 2011 to 2021 by contemplating the adoption mechani...
Orientation: Solving the dearth of skilled employees and maintaining the engagement policy are key concerns of the Malaysian telecom sector. Therefore, talent management practices have created a mainstream process for telecom employers to be proactively involved in talent engagement.
Research purpose: This study aimed to elucidate the vital talent...
Technology integration at mass level can help the emerging economies to fill the skill gaps by enhancing the digital competency in young fellows, particularly female students. The study aims to understand and craft the predictors of digital competency among female students. Therefore, a research framework was hypothesized by enlisting the personal...
Sustainability in urban transport mechanisms is a matter of significance in developing economies. Assessing the commuters' behavior towards urban transport system facilitates the authorities to devise the policies for the safe and advanced choice of mobility. In the Klang Valley of Malaysia, the personal mobility practices have created the challeng...
This review paper identifies the core evidence of research on employee engagement , considering a stern challenge facing the financial sector nowadays. The study highlights the noteworthy knowledge gaps that will support human resource management practitioners to embed in the research towards sectoral context. Pertinent articles were selected throu...
A smart home is grounded on the sensors that endure automation, safety, and structural integration. The security mechanism in digital setup possesses vibrant prominence and the biometric facial recognition system is novel addition to accrue the smart home features. Understanding the implementation of such technology is the outcome of user behavior...
This review paper identifies the core evidence of research on employee engagement, considering a stern challenge facing the financial sector nowadays. The study highlights the noteworthy knowledge gaps that will support human resource management practitioners to embed in the research towards sectoral context. Pertinent articles were selected throug...
Learning behavior mechanism is widely anticipated in managed settings through the formal syllabus. However, heading for learning stimulus whilst daily mobility practices through urban transit is the novel feature in learning sciences. Theory of planned behavior (TPB), technology acceptance model (TAM), and service quality of transit are conceptuali...
This study integrates the educators digital competency (DC), as an individual characteristic construct of the task-technology fit (TTF) theory, to examine a better fit between Moodle using and teaching task, and to investigate its effect on both Moodles utilization and their task performance. For assessing our proposed hypotheses, an online survey...
A smart home is grounded on the sensors that endure automation,
safety, and structural integration. The security mechanism in digital setup
possesses vibrant prominence and the biometric facial recognition system is
novel addition to accrue the smart home features. Understanding the
implementation of such technology is the outcome of user behav...
A smart home is grounded on the sensors that endure automation, safety, and structural integration. The security mechanism in digital setup possesses vibrant prominence and the biometric facial recognition system is novel addition to accrue the smart home features. Understanding the implementation of such technology is the outcome of user behavior...
This study integrates the educators' digital competency (DC), as an individual characteristic construct of the task-technology fit (TTF) theory, to examine a better fit between Moodle using and teaching task, and to investigate its effect on both Moodle's utilization and their task performance. For assessing our proposed hypotheses, an online surve...
Learning behavior mechanism is widely anticipated in managed settings through the formal syllabus. However, heading for learning stimulus whilst daily mobility practices through urban transit is the novel feature in learning sciences. Theory of planned behavior (TPB), technology acceptance model (TAM), and service quality of transit are conceptuali...
In Trusted Computing, the client platform is checked for its trustworthiness using Remote Attestation. Integrity Measurement Architecture (IMA) is a well-known technique of TCG based attestation. However, due to static nature of IMA, it cannot be aware of the runtime behavior of applications which leads to integrity problems. To overcome this probl...
The implementation of digital apparatuses is merely the investment of non-living resources while reaping prolific outcomes from digital business initiatives is ensured through talented and ambitious employees. This review study aims to shed the light on an imperative behavioural feature of employees i.e., digital dexterity (DD) that has emerged as...
As the disruptive innovations are being penetrated to each level of society, the acceptance of modern technology is regulating the education activities. Managing the educational usage of computing through cloud applications is a matter of discussion nowadays. The aim of this study is to instigate the assessment of the adoption of cloud computing fr...
Big data analytics (BDA) is heralded to generate vast-scale business prospects. Employee acceptance of BDA system is of utmost significance, as digital transition in organizations can be crippled by employee behavior. Therefore, an in-depth analysis of theory-based research is vital to comprehend the major instigations towards digital tools integra...
Smart city is synchronized with digital environment and its transportation system is vitalized with RFID sensors, Internet of Things (IoT) and Artificial Intelligence. However, without user's behavioral assessment of technology, the ultimate usefulness of smart mobility cannot be achieved. This paper aims to formulate the research framework for pre...
Smart city is synchronized with digital environment and its transportation system is vitalized with RFID sensors, Internet of Things (IoT) and Artificial Intelligence. However, without user's behavioral assessment of technology, the ultimate usefulness of smart mobility cannot be achieved. This paper aims to formulate the research framework for pre...
Big Data is used by data miner for analysis purpose which may contain sensitive information. During the procedures it raises certain privacy challenges for researchers. The existing privacy preserving methods use different algorithms that results into limitation of data reconstruction while securing the sensitive data. This paper presents a cluster...
Service quality possesses the vital prominence in usability of innovative products and services. As technological innovation has made the life synchronized and effective, Internet of Things (IoT) is matter of discussion everywhere. From users' perspective, IoT services are always embraced by various system characteristics of security and performanc...
Internet of Things (IoT) occupies a vital aspect of our everyday lives. IoT networks composed of smart-devices which communicate and transfer the information without the physical intervention of humans. Due to such proliferation and autonomous nature of IoT systems make these devices threatened and prone to a severe kind of threats. In this paper,...
Big Data is used by data miner for analysis purpose which may contain sensitive information. During the procedures it raises certain privacy challenges for researchers. The existing privacy preserving methods use different algorithms that results into limitation of data reconstruction while securing the sensitive data. This paper presents a cluster...
In recent years, Internet of Things (IoT) occupies a vital aspect of our daily lives. IoT networks composed of smart-devices which communicate and exchange the information without the physical intervention of humans. Due to such proliferation and autonomous nature of IoT systems make the devices more vulnerable and prone to a severe kind of threats...
Service quality possesses the vital prominence in usability of innovative products and services. As Technological innovation has made the life synchronized and effective, Internet of Things (IoT) is matter of discussion everywhere. From users’ perspective, IoT services are always embraced by various system characteristics of security and performanc...
Questions
Questions (8)
Under what conditions should a researcher use variance-based SEM vs covariance-based SEM?
What is meaning of Connected Vehicle ? And is this Connectivity based on certain Transponder or GPS Based Positioning or Internet?
Wat will happen when an individuals personal task and commitments are solely based on sensors and even his/her professional or workplace assignments also carried by synchronized environments .. What will be end point of all this Mess when human interference reaches to obsolete stage.
Smart Watches are More Smart Than Phones in Terms of Connectivity and Portability
It is observed that various Thesis included the Hypothesis in Chapter 01 also, as per its proper place after literature review in Chapter 02. Is this viable practice?
Research Question, Research Objective and Research Hypothesis portray the same tone so what is the difference between writing the hypothesis in chapter 01 and chapter 02?
However In case even when instrument questions are adopted, it is said that EFA will be applied first than CFA? Is this TRUE?
Can a Theoretical Model be validated by both Techniques? What are the condition for each method.
offline plagiarism detection tool