Submissions from 2016
Streamlining patient consultations for sleep disorders with a knowledge-based CDSS, Jacqueline N. Blake, Don V. Kerr, and John G. Gammack
Social networks and information retrieval, how are they converging? A survey, a taxonomy and an analysis of social information retrieval approaches and platforms, Mohamed Reda Bouadjenek, Hakim Hacid, and Mokrane Bouzeghoub
PerSaDoR: Personalized social document representation for improving web search, Mohamed Reda Bouadjenek, Hakim Hacid, Mokrane Bouzeghoub, and Athena Vakali
Constructs for quality in on-line learning, Maurice M. Danaher
Assessing IT disaster recovery plans the case of publicly listed firms on Abu Dhabi/UAE security exchange, Osama El-Temtamy, Munir Majdalawieh, and Lela Pumphrey
A glance of child’s play privacy in smart toys, Patrick C.K. Hung, Farkhund Iqbal, Shih Chia Huang, Mohammed Melaisi, and Kevin Pang
A survey on network simulators in three-dimensional wireless ad hoc and sensor networks, Seokyoon Kang, Monther Aldwairi, and Ki Il Kim
Wireless sensor network virtualization: A survey, Imran Khan, Fatna Belqasmi, Roch Glitho, Noel Crespi, Monique Morrow, and Paul Polakos
Towards a self adaptive system for social wellness, Asad Masood Khattak, Wajahat Ali Khan, Zeeshan Pervez, Farkhund Iqbal, and Sungyoung Lee
Privacy-preserving data mashup model for trading person-specific information, Rashid Hussain Khokhar, Benjamin C.M. Fung, Farkhund Iqbal, Dima Alhadidi, and Jamal Bentahar
An architecture for (m, k)-firm real-time streams in wireless sensor networks, Chung Jae Lee, Babar Shah, and Ki Il Kim
Designing an Interactive Visualization to Explore Eye-movement Data, Jim Morey and John Gammack
Privacy-aware relevant data access with semantically enriched search queries for untrusted cloud storage services, Zeeshan Pervez, Mahmood Ahmad, Asad Masood Khattak, Sungyoung Lee, and Tae Choong Chung
Measuring attainment of foundation skills in general education at a public university in the United Arab Emirates, Anthony Rhodes, Maurice M. Danaher, Ashley Ater Kranov, and Lisa Isaacson
Supporting Sensemaking of Complex Objects with Visualizations: Visibility and Complementarity of Interactions, Kamran Sedig, Paul Parsons, Hai-Ning Liang, and Jim Morey
International financial reporting standards compliance and information asymmetries: The role of enforcement authority and audit quality, Abiot Tessema and Jagadish Dandu
Submissions from 2015
Secure and authenticated data communication in wireless sensor networks, Omar Alfandi, Arne Bochem, Ansgar Kellner, Christian Göge, and Dieter Hogrefe
Well-formed semantic model for co-learning, Jehad Alomari, Mohammed Hussain, Skander Turki, and Mehedi Masud
Graph-theoretic characterization of cyber-threat infrastructures, Amine Boukhtouta, Djedjiga Mouheb, Mourad Debbabi, Omar Alfandi, Farkhund Iqbal, and May El Barachi
Is there such a thing as "Least Publishable Unit"? An empirical investigation, John M. Budd and Kristine N. Stewart
An open virtual multi-services networking architecture for the future internet, May El Barachi, Nadjia Kara, Sleiman Rabah, and Mathieu Forgues
Towards a Better Understanding of Organizational Adoption and Diffusion of RFID Technology: A Case Study Approach, Faouzi Kamoun and Sami Miniaoui
Wireless sensor network virtualization: Early architecture and research perspectives, Imran Khan, Fatna Belqasmi, Roch Glitho, Noel Crespi, Monique Morrow, and Paul Polakos
Object-oriented and ontology-alignment patterns-based expressive Mediation Bridge Ontology (MBO), Wajahat Ali Khan, Muhammad Bilal Amin, Asad Masood Khattak, Maqbool Hussain, Muhammad Afzal, Sungyoung Lee, and Eun Soo Kim
Mapping evolution of dynamic web ontologies, A. M. Khattak, Z. Pervez, W. A. Khan, A. M. Khan, K. Latif, and S. Y. Lee
Airport Management"”Value of Customer Display Systems, Adam Marks, Maytha AL-Ali, and Kees Rietsema
Aspect-oriented security hardening of UML design models, Djedjiga Mouheb, Mourad Debbabi, Makan Pourzandi, Lingyu Wang, Mariam Nouh, Raha Ziarati, Dima Alhadidi, Chamseddine Talhi, and Vitor Lima
A service oriented broker-based approach for dynamic resource discovery in virtual networks, Sleiman Rabah, May El Barachi, Nadjia Kara, Rachida Dssouli, and Joey Paquet
Agent-based framework for sensor-to-sensor personalization, Nabil Sahli, Nafaa Jabeura, and Mohamad Badra
E-mail authorship attribution using customized associative classification, Michael R. Schmid, Farkhund Iqbal, and Benjamin C.M. Fung
Fuzzy logic-based guaranteed lifetime protocol for real-time wireless sensor networks, Babar Shah, Farkhund Iqbal, Ali Abbas, and Ki Il Kim
Enhancing social science research in the UAE: An open source software solution university of sharjah (UOS) case study, Manar Abu Talib, Muhammed AbuOdeh, Adhraa Almansoori, and Arwa AlNauimi
A green energy-aware hybrid virtual network embedding approach, Nizar Triki, Nadjia Kara, May El Barachi, and Souad Hadjres
Can E-Portfolio Improve Students’ Readiness to Find an IT Career?, Abdallah Tubaishat
Network and device forensic analysis of Android social-messaging applications, Daniel Walnycky, Ibrahim Baggili, Andrew Marrington, Jason Moore, and Frank Breitinger
Security Awarness Program for Customers Using Online Banking, Khulood Al Zaabi and Abdallah Tubaishat
Submissions from 2014
Privacy of mobile users: Pitfalls and recommendations, Naser Mohamed Al Ali, Dima Alhadidi, and Zakaria Maamar
The Impact of Cloud Computing on ITIL Service Strategy Processes, Mohamed B. Al Mourad and Mohammed Hussain
Resolution of Challenges That Are Facing Organizations before ITIL Implementation, Mohamed B. Al Mourad and Rozita Johari
Design and performance analysis of a virtual ring architecture for smart grid privacy, Mohamad Badra and Sherali Zeadally
An Analysis Study Of Smartphone Usage Habit Of Undergraduate Female Students At Zayed University, Emad Bataineh, Alya Alsaadi, and Maha AlAli
New technologies track chairs welcome message, Jose M.Alcaraz Calero, Yan Zhang, and Munir Majdalawieh
Accessibility as an integral factor in e-government web site evaluation: The case of Dubai e-government, Faouzi Kamoun and Mohamed Basel Almourad
A wireless environmental sensor network for the condition monitoring of paper rolls at printing facilities, Faouzi Kamoun and Sami Miniaoui
Mobility track chairs welcome message, Andreas Kassler, Rui Aguiar, and May El Barachi
Airport Information Systems"”Landside Management Information Systems, Adam Marks, Kees Rietsema, and Maytha AL-Ali
Building sustainable parking lots with the Web of Things, Sujith Samuel Mathew, Yacine Atif, Quan Z. Sheng, and Zakaria Maamar
Ensemble artifact design for context sensitive decision support, Shah Jahan Miah and John G. Gammack
Multiple case study approach to identify aggravating variables of insider threats in information systems, Mathew Nicho and Faouzi Kamoun
Security track chairs welcome message, George Spanoudakis, Andrew Marrington, and Farkhund Iqbal
Submissions from 2013
Social networks IM forensics: Encryption analysis, Nedaa B. Al Barghuthi and Huwida Said
Accessibility Evaluation of Dubai e-Government Websites: Findings and Implications, M. Basel Al Mourad and Faouzi Kamoun
Using tabu search to configure support vector regression for effort estimation, A. Corazza, S. Di Martino, F. Ferrucci, C. Gravino, F. Sarro, and E. Mendes
Intervening Mechanisms Between Personality and Turnover: Mediator and Suppressor Effects, Emily M. David and Courtney L. Holladay
A research agenda for the UAE iPad Initiative, Christina Gitsaki, Matthew A. Robby, Troy Priest, Khaled Hamdan, and Yazid Ben-Chabane
E-Government Web Accessibility: WCAG 1.0 versus WCAG 2.0 Compliance, Faouzi Kamoun, Emad Bataineh, and Basel M. Al Mourad
Cultural differences on seeking information: an eye tracking study, Mari-Carmen Marcos, Ruth Garcia-Gavilanes, Emad Bataineh, and Lara Pasarin
The Web of Things - Challenges and enabling technologies, Sujith Samuel Mathew, Yacine Atif, Quan Z. Sheng, and Zakaria Maamar
Using Student e-Portfolios to Facilitate Learning Objective Achievements in an Outcome-Based University, Abdallah Tubaishat and Azzedine Lansari
Submissions from 2012
A systematic mapping on the use of visual data mining to support the conduct of systematic literature reviews, Katia R. Felizardo, Stephen G. Macdonell, Emília Mendes, and José Carlos Maldonado
Performance Analysis of Two Priority Queuing Systems in Tandem, Faouzi Kamoun
User Interface Design and E-Commerce Security Perception: An Empirical Study, Faouzi Kamoun and Mohanad Halaweh
Towards an approach for weaving preferences into Web services operation, Zakaria Maamar, Quan Z. Sheng, Yacine Atif, Sujith Samuel Mathew, and Khouloud Boukadi
A conference to promote undergraduate research in the Arab World, Qusay H. Mahmoud, May AlTaei, and Leon Jololian
Success Factors for Integrated Itil Deployment: An it Governance Classification, Mathew Nicho and Basel A.I. Mourad
Internet usage among Arab adolescents: Preliminary findings, Kathy Ning Shen and Maha Shakir
Software process improvement success factors for small and medium Web companies: A qualitative study, Muhammad Sulayman, Cathy Urquhart, Emilia Mendes, and Stefan Seidel
Submissions from 2011
Why web services need social networks, Zakaria Maamar, Hakim Hacid, and Michael N. Huhns
Preface, Quan Z. Sheng, Yanbo Wu, Sherali Zeadally, and Zakaria Maamar
Submissions from 2010
Secure software engineering: A new teaching perspective based on the SWEBOK, Manar Abu Talib, Adel Khelifi, and Leon Jololian
Submissions from 2009
Developing an initial open-source platform for the higher education sector - A case study: Alhosn University, Adel Khelifi, Manar Abu Talib, Mohamed Farouk, and Habib Hamam
Database and database application security, Huwida E. Said, Mario A. Guimaraes, Zakaria Maamar, and Leon Jololian
Submissions from 2008
Special track on E-business applications, Fahim Akhter, Lami Kaya, and Ibrahim Kamel
Reliability model for component-based systems in cosmic (a case study), Olga Ormandjieva, Manar Abu Talib, and Alain Abran
Submissions from 2007
A Framework towards Assessing the Merits of Inviting IT Professionals to the Classroom, Faouzi Kamoun and Said Selim
Using an Outcome-Based Information Technology Curriculum and an E-Learning Platform to Facilitate Student Learning, Azzedine Lansari, Abdallah Tubaishat, and Akram Al-Rawi
Using an Outcome-Based Information Technology Curriculum and an E-Learning Platform to Facilitate Student Learning, Azzedine Lansari, Abdallah Tubaishat, and Akram Mahmoud Al-Rawi
Submissions from 2006
A Fuzzy Logic-Based Approach for Supporting Decision-Making Process in B2C Electronic Commerce Transaction, Fahim Akhter, Zakaria Maamar, and Dave Hobbs
Hardware architecture for popcount, Eyas El-Qawasmeh, Abdallah Tubaishat, Sami Baba, and Ahmed Dalalah
Towards an ontology-based approach for specifying and securing Web services, Z. Maamar, N. C. Narendra, and S. Sattanathan
Understanding technochange in ERP implementation through two case studies, Maha Shakir and Dennis Viehland
Submissions from 2005
A fuzzy logic-based system for assessing the level of business-to-consumer (B2C) trust in electronic commerce, Fahim Akhter, Dave Hobbs, and Zakaria Maamar
Using Technology-Mediated Learning Environment to Overcome Social and Cultural Limitations in Higher Education, Arif Bhatti, Abdallah Tubaishat, and Eyas El-Qawasmeh
Using Technology-Mediated Learning Environment to Overcome Social and Cultural Limitations in Higher Education, Arif Bhatti, Abdallah Tubaishat, and Eyas El-Qawasmeh
Submissions from 2004
Dynamic management of UDDI registries in a wireless environment of web services, Z. Maamar, H. Yahyaoui, Q. H. Mahmoud, and F. Akhter
Submissions from 2003
Commerce, E-Commerce, and M-Commerce: What comes next?, Zakaria Maamar
Understanding the Role of Software Agents in E-Commerce, Zakaria Maamar
Submissions from 2002
Automated prototyping tool-kit (APT), Nader Nada, M. Shing, and V. Berzins