Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

SECDEP: Software engineering curricula development and evaluation process using SWEBOK., , , , and . Inf. Softw. Technol., (2016)A model for evaluating the security and usability of e-banking platforms., , and . Computing, 99 (5): 519-535 (2017)Behavioral consequences of Pokémon GO: The exaggerated picture., , and . Comput. Hum. Behav., (2019)Usability Engineering of Agile Software Project Management Tools., , , , and . HCI (16), volume 9746 of Lecture Notes in Computer Science, page 197-208. Springer, (2016)Uncovering the predictors of unsafe computing behaviors in online crowdsourcing contexts., , and . Comput. Secur., (2019)The design of a hybrid cultural model for Arabic gamified systems., , and . Comput. Hum. Behav., (2016)Social Authentication Applications, Attacks, Defense Strategies and Future Research Directions: A Systematic Review., , and . IEEE Commun. Surv. Tutorials, 19 (2): 1080-1111 (2017)Usability Engineering of Games: A Comparative Analysis of Measuring Excitement Using Sensors, Direct Observations and Self-Reported Data., , , , and . CoRR, (2014)The Collective Impression of Saudis' Perceptions of Entertainment., and . HCI (12), volume 10282 of Lecture Notes in Computer Science, page 22-31. Springer, (2017)Security and Privacy Failures in Popular 2FA Apps., , , and . USENIX Security Symposium, page 2079-2096. USENIX Association, (2023)