Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Review on Security of Internet of Things Authentication Mechanism, , , , , , , , and . IEEE Access, (2019)Mobile Learning for English Language Acquisition: Taxonomy, Challenges, and Recommendations., , , , and . IEEE Access, (2017)Information security conscious care behaviour formation in organizations., , , , , and . Comput. Secur., (2015)Development of a Mobile Game Application to Boost Students' Motivation in Learning English Vocabulary., , , and . IEEE Access, (2019)Organizational Data Breach: Building Conscious Care Behavior in Incident Response., , , , , and . Comput. Syst. Sci. Eng., 40 (2): 505-515 (2022)Motivating Factors to Self-Disclosure on Social Media: A Systematic Mapping., , and . IEEE Trans. Prof. Commun., 65 (3): 370-391 (2022)Technology Dependency and Impact During COVID-19: A Systematic Literature Review and Open Challenges., , , , , , and . IEEE Access, (2023)A bibliometric analysis of m-learning from topic inception to 2015., , , , and . Int. J. Mob. Learn. Organisation, 13 (1): 91-112 (2019)Social media big data analytics: A survey., , , and . Comput. Hum. Behav., (2019)The rise of user profiling in social media: review, challenges and future direction., , , , and . Soc. Netw. Anal. Min., 13 (1): 137 (December 2023)