Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Integrated Privacy Model: Building a Privacy Model in the Business Processes of the Enterprise.. Int. J. Inf. Secur. Priv., 4 (3): 1-21 (2010)Assessing IT disaster recovery plans: The case of publicly listed firms on Abu Dhabi/UAE security exchange., , and . Inf. Comput. Secur., 24 (5): 514-533 (2016)Assessing the Attacks Against the Online Authentication Methods Using a Comparison Matrix: A Case of Online Banking., , , and . CSCI, page 1039-1046. IEEE, (2022)A Reference Framework for Enterprise Computing Curriculum., and . WorldCIST (2), volume 570 of Advances in Intelligent Systems and Computing, page 872-886. Springer, (2017)Developing Adaptive Islamic Law Business Processes Models for Islamic Finance and Banking by Text Mining the Holy Qur'an and Hadith., , and . DASC/PiCom/DataCom/CyberSciTech, page 1278-1283. IEEE Computer Society, (2017)A Recursive Co-occurrence Text Mining of the Quran to Build Corpora for Islamic Banking Business Processes., , and . IHSI, volume 903 of Advances in Intelligent Systems and Computing, page 306-312. Springer, (2019)The Creation of an Arabic Emotion Ontology Based on E-Motive., , and . ANT/SEIT, volume 109 of Procedia Computer Science, page 1053-1059. Elsevier, (2017)Improving Academic Decision-Making through Course Evaluation Technology., , , and . Int. J. Emerg. Technol. Learn., 12 (11): 4-14 (2017)A Hybrid Approach for Counting Templates in Images., and . IVSP, page 75-80. ACM, (2020)Building Trust in Supply Chains: The Blockchain-QR Code Advantage.. AICCSA, page 1-7. IEEE, (2023)