Follow

Submissions from 2012

Link

Web effort estimation: The value of cross-company data set compared to single-company data set, Filomena Ferrucci, Federica Sarro, and Emilia Mendes

Link

A novel method of iDevice (iPhone, iPad, iPod) forensics without jailbreaking, Babar Iqbal, Asif Iqbal, and Hanan Al Obaidli

Link

Mining criminal networks from chat log, Farkhund Iqbal, Benjamin C.M. Fung, and Mourad Debbabi

Link

Using visual tiling patterns to support the teaching of programming concepts, Hai Ning Liang, Jim Morey, and Kamran Sedig

Link

Cost estimation of web applications through knowledge elicitation, Emilia Mendes

Link

Using knowledge elicitation to improve Web effort estimation: Lessons from six industrial case studies, Emilia Mendes

Link

Applying knowledge elicitation to improve web effort estimation: A case study, Emilia Mendes, Manar Abutalib, and Steve Counsell

Link

The role of systematic reviews in identifying the state of the art in web resource estimation, Emilia Mendes and Damir Azhar

Link

Using ISO 27001 in teaching information security, Manar Abu Talib, Adel Khelifi, and Tahsin Ugurlu

Submissions from 2011

Exploratory study on innovative use of ISO standards for IT security in the UAE, Talib Manar Abu, Adel Khelifi, and May El Barachi

Link

Using video games to teach security, Mario Guimaraes, Huwida Said, and Richard Austin

Link

Towards a method for engineering social web services, Zakaria Maamar, Noura Faci, Leandro Krug Wives, Hamdi Yahyaoui, and Hakim Hacid

Link

Revitalizing the introductory programming course, Qusay Mahmoud, Manar Abu Talib, Zakaria Maamar, Emad Bataineh, and Leon Jololian

Link

Web of things: Description, discovery and integration, Sujith Samuel Mathew, Yacine Atif, Quan Z. Sheng, and Zakaria Maamar

Link

Knowledge representation using Bayesian networks: A case study in web effort estimation, Emilia Mendes

Link

Forensic analysis of private browsing artifacts, Huwida Said, Noora Al Mutawa, Ibtesam Al Awadhi, and Mario Guimaraes

Link

IPhone forensics techniques and crime investigation, Huwida Said, Alya Yousif, and Hessa Humaid

Submissions from 2010

Why customers reluctant to buy from your website?, Fahim Akhter and Adam Marks

The construction of a new Lexicon design for Arabic language, Bilal Bataineh and Emad Bataineh

Link

Is Facebook really "open" to all?, Maria Claudia Buzzi, Marina Buzzi, Barbara Leporini, and Fahim Akhter

Towards a service-oriented network virtualization architecture, May El Barachi, Nadjia Kara, and Rachida Dssouli

Link

Database forensics, Mario A.M. Guimaraes, Richard Austin, and Huwida Said

Link

Track 4 - digital ecosystem research and development, Zakaria Mammar and Yoosuf Cader

Link

Techniques for quantitative analysis of software quality throughout the SDLC: The SWEBOK guide coverage, Manar Abu Talib, Adel Khelifi, Alain Abran, and Olga Ormandjieva

Submissions from 2009

Link

Conceptual framework: How to engineer online trust for disabled users, Fahim Akhter, Maria Claudia Buzzi, Marina Buzzi, and Barbara Leporini

Link

Usability and accessibility of eBay by screen reader, Maria Claudia Buzzi, Marina Buzzi, Barbara Leporini, and Fahim Akhter

Link

User trust in ecommerce services: perception via screen reader, Maria Claudia Buzzi, Marina Buzzi, Barbara Leporini, and Fahim Akhter

Link

Database and database application security, Huwida E. Said, Mario A. Guimaraes, Zakaria Maamar, and Leon Jololian

Internet usage among Arab adolescents: Preliminary findings, Kathy Ning Shen and Maha Shakir

Submissions from 2008

Link

Assessment of real-time software specifications quality using COSMIC-FFP, Manar Abu Talib, Adel Khelifi, Alain Abran, and Olga Ormandjieva

Link

E-commerce security: The categorical role of computers in forensic online crime, Fahim Akhter

Link

Gender and cultural differences in adoption of e-business infrastructure in UAE, Fahim Akhter

Link

Building secure e-business systems: Technology and culture in the UAE, Fahim Akhter and Lami Kaya

Link

Integrating The Security+ Exam Objectives Into Information Technology Curricula, Akram Al-Rawi and Azzedine Lansari

Link

A Course Sequence For Integrating Problem Solving And Critical Thinking In A Hybrid Outcome Based Is/It Curriculum, Azzedine Lansari, Akram Al-Rawi, Abdallah Tubaishat, and Faouzi Bouslama

Submissions from 2007

Link

A case study: Adoption of information technology in e-business of United Arab Emirates, Fahim Akhter

Link

The contribution of intelligent system in forming trust and competitiveness during online transactions, Fahim Akhter

An intelligent integrated e-Government framework: The case of Jordan, Ghazi Alkhatib, Emad Bataineh, Haider Fraihat, and Zakaria Maamar

Exploring factors influencing the adoption of mobile commerce, Tariq Bhatti

Submissions from 2006

The cross-cultural challenges of adopting b2ce-commerce in middle east, europe, north americaand africa: An exploratory study, Fahim Akhter

Integrating IT certifications in networking courses: CISCO CCNA versls comptia network+, Akram Al-Rawi, Azzedine Lansari, and Faouzi Bouslama

Smart e-trader: A prototype information management system for UAE stock markets, F. A. Amir, H. Ibraheem, H. Mesmar, S. A. Mutawa, and E. Bataineh

Link

Web service = E + F + I, Emad Bataineh, Zakaria Maamar, Djamai Benslimane, and Chirine Ghedira

Optimal restrictions for shareware use - time or functionality based, Wendy Hui and Fahim Akhter

Analysis of distributed resource management in wireless LANs that support fault tolerance, Ghassan Kbar and Wathiq Mansoor

Link

Towards aspect-based modeling of self-healing Web Services, G. Kouadri Mostéfaoui, Z. Maamar, N. C. Narendra, and Ph Thiran

Link

Decoupling security concerns in web services using aspects, G. Kouadri Mostéfaoui, N. C. Narendra, Z. Maamar, and S. Sattanathan

Link

The world of work beneath the veil, A. Rhodes and N. Edge

PDF

Ontologies for specifying and reconciling contexts of web services, S. Sattanathan, N. C. Narendra, and Z. Maamar

Context-driven policy enforcement and reconciliation for Web services, S. Sattanathan, N. C. Narendra, Z. Maamar, and G. Kouadri Mostéfaoui

Submissions from 2005

Integrating certifications into information systems curricula, Akram Al-Rawi, Azzedine Lansari, and Faouzi Bouslama

E-learning and the educational organizations structure reengineering (EOSR), Osama Alshara and Abdallah Tubaishat

On coordinating personalizedweb services using CooPS, Zakaria Maamar, Emad Bataineh, and Ghazi AlKhatib

Link

On Coordinating Personalized Web Services using COOPS, Z. Maamar, E. Bataineh, and G. AlKhatib

Link

Context for Personalized Web Services, Z. Maamar, S.K. Mostefaoui, and Q.H. Mahmoud

Link

On self-coordinating web services using similarity and neural networks, Z. Maamar, I. Younas, D. Benslimane, C. Ghedira, and H. Yahyaoui

Addressing enterprise information security, Anthony Rhodes

Submissions from 2004

Link

Determining the factors which engender customer trust in business-to-consumer (B2C) electronic commerce, Fahim Akhter, Dave Hobbs, and Zakaria Maamar

Infrastructure for mobile learning environments, Arif Bhatti and Miroslaw Majewski

Link

A conceptual analysis of the role of conversations in Web services composition, Zakaria Maamar, Soraya Kouadri Mostéfaoui, and Emad Bataineh

Submissions from 2003

Link

A new non-recursive algorithm for binary search tree traversal, Akram Ai-Rawi, Azzedine Lansari, and Faouzi Bouslama

Link

An agent-based approach to specify a Web service-oriented environment, Z. Maamar, F. Akhter, and M. Lahkim

Link

Mining the web and medline medical records to discover new facts on diabetes, Farhi Marir, Huwida Said, and Usama Alalami

Submissions from 2002

Link

Rethinking process guidance for selecting software components, N. Maiden, H. Kim, and Cornelius Ncube

Link

The limitations of current decision-making techniques in the procurement of COTS software components, Cornelius Ncube and John C. Dean