Submissions from 2013
An Introduction to Business Problem-Solving and Decision-Making, John C. Beachboard and Kregg Aytes
An architecture for QoS-enabled video telephony in a 3GPP 4G evolved packet core environment, Fatna Belqasmi, Hanieh Alipour, Malek El Ferjani, and Roch Glitho
The design and implementation of a wireless healthcare application for WSN-enabled IMS environments, May El Barachi and Omar Alfandi
A multi-service multi-role integrated information model for dynamic resource discovery in virtual networks, May El Barachi, Sleiman Rabah, Nadjia Kara, Rachida Dssouli, and Joey Paquet
The study of the interrelation between law programs and digital forensics in UAE Academia, Asif Iqbal, Hanan Al Obaidli, Huwida Said, and Mario Guimaraes
WCAG 1.0 versus WCAG 2.0 Web Accessibility Compliance: A Case Study, Faouzi Kamoun, Basel M. Al Mourad, and Emad Bataineh
Enhancing protection techniques of e-banking security services using open source cryptographic algorithms, Adel Khelifi, Maher Aburrous, Manar Abu Talib, and P. V.S. Shastry
A reliable mobile application for safety on roads, Adel Khelifi, Lama Mahmoud Daoud, and Manar Abu Talib
A social network-based architecture for on-line RoSCAs in the developing world, Gilles Kounou, Christian Akpona, Herve Ahouantchede, Rose Gohoue, Fatna Belqasmi, and Roch Glitho
Students' perception on the use of visual tilings to support their learning of programming concepts, Hai Ning Liang, Charles Fleming, Jim Morey, Kamran Sedig, and Ka Lok Man
Towards an efficient sales pitch with the Web of Things, Sujith Samuel Mathew, Yacine Atif, Quan Z. Sheng, and Zakaria Maamar
An E-health Infrastructure Design to Support Management of Lifestyle Disease, Shah Jahan Miah, John G. Gammack, and Md. Jahidul Hasan
Innovative RFID solution for tracking and control, Sami Miniaoui and Faouzi Kamoun
Mobile phone sensing as a service: Business model and use cases, Rabeb Mizouni and May El Barachi
Paying back borrowed meanings: The implications of the metaphor-driven history of IS research for its future, Diarmuid J. Pigott, Callan F. Ledsham, Valerie J. Hobbs, and John G. Gammack
Submissions from 2012
Towards reliable web applications: ISO 19761, Manar Abu Talib, Emilia Mendes, and Adel Khelifi
Forensic analysis of social networking applications on mobile devices, Noora Al Mutawa, Ibrahim Baggili, and Andrew Marrington
A Systematic review of web resource estimation, Damir Azhar, Emilia Mendes, and Patricia Riddle
A business model for a sensors-enabled IMS environment, May El Barachi
Open virtual playground: Initial architecture and results, May El Barachi, Nadjia Kara, and Rachida Dssouli
Web effort estimation: The value of cross-company data set compared to single-company data set, Filomena Ferrucci, Federica Sarro, and Emilia Mendes
A novel method of iDevice (iPhone, iPad, iPod) forensics without jailbreaking, Babar Iqbal, Asif Iqbal, and Hanan Al Obaidli
Mining criminal networks from chat log, Farkhund Iqbal, Benjamin C.M. Fung, and Mourad Debbabi
Using visual tiling patterns to support the teaching of programming concepts, Hai Ning Liang, Jim Morey, and Kamran Sedig
Cost estimation of web applications through knowledge elicitation, Emilia Mendes
Using knowledge elicitation to improve Web effort estimation: Lessons from six industrial case studies, Emilia Mendes
Applying knowledge elicitation to improve web effort estimation: A case study, Emilia Mendes, Manar Abutalib, and Steve Counsell
The role of systematic reviews in identifying the state of the art in web resource estimation, Emilia Mendes and Damir Azhar
Using ISO 27001 in teaching information security, Manar Abu Talib, Adel Khelifi, and Tahsin Ugurlu
Submissions from 2011
Exploratory study on innovative use of ISO standards for IT security in the UAE, Talib Manar Abu, Adel Khelifi, and May El Barachi
Using video games to teach security, Mario Guimaraes, Huwida Said, and Richard Austin
Towards a method for engineering social web services, Zakaria Maamar, Noura Faci, Leandro Krug Wives, Hamdi Yahyaoui, and Hakim Hacid
Revitalizing the introductory programming course, Qusay Mahmoud, Manar Abu Talib, Zakaria Maamar, Emad Bataineh, and Leon Jololian
Web of things: Description, discovery and integration, Sujith Samuel Mathew, Yacine Atif, Quan Z. Sheng, and Zakaria Maamar
Knowledge representation using Bayesian networks: A case study in web effort estimation, Emilia Mendes
Forensic analysis of private browsing artifacts, Huwida Said, Noora Al Mutawa, Ibtesam Al Awadhi, and Mario Guimaraes
IPhone forensics techniques and crime investigation, Huwida Said, Alya Yousif, and Hessa Humaid
Submissions from 2010
Why customers reluctant to buy from your website?, Fahim Akhter and Adam Marks
The construction of a new Lexicon design for Arabic language, Bilal Bataineh and Emad Bataineh
Is Facebook really "open" to all?, Maria Claudia Buzzi, Marina Buzzi, Barbara Leporini, and Fahim Akhter
Towards a service-oriented network virtualization architecture, May El Barachi, Nadjia Kara, and Rachida Dssouli
Database forensics, Mario A.M. Guimaraes, Richard Austin, and Huwida Said
Track 4 - digital ecosystem research and development, Zakaria Mammar and Yoosuf Cader
Techniques for quantitative analysis of software quality throughout the SDLC: The SWEBOK guide coverage, Manar Abu Talib, Adel Khelifi, Alain Abran, and Olga Ormandjieva
Submissions from 2009
Conceptual framework: How to engineer online trust for disabled users, Fahim Akhter, Maria Claudia Buzzi, Marina Buzzi, and Barbara Leporini
Usability and accessibility of eBay by screen reader, Maria Claudia Buzzi, Marina Buzzi, Barbara Leporini, and Fahim Akhter
User trust in ecommerce services: perception via screen reader, Maria Claudia Buzzi, Marina Buzzi, Barbara Leporini, and Fahim Akhter
Database and database application security, Huwida E. Said, Mario A. Guimaraes, Zakaria Maamar, and Leon Jololian
Internet usage among Arab adolescents: Preliminary findings, Kathy Ning Shen and Maha Shakir
Submissions from 2008
Assessment of real-time software specifications quality using COSMIC-FFP, Manar Abu Talib, Adel Khelifi, Alain Abran, and Olga Ormandjieva
E-commerce security: The categorical role of computers in forensic online crime, Fahim Akhter
Gender and cultural differences in adoption of e-business infrastructure in UAE, Fahim Akhter
Building secure e-business systems: Technology and culture in the UAE, Fahim Akhter and Lami Kaya
Integrating The Security+ Exam Objectives Into Information Technology Curricula, Akram Al-Rawi and Azzedine Lansari
A Course Sequence For Integrating Problem Solving And Critical Thinking In A Hybrid Outcome Based Is/It Curriculum, Azzedine Lansari, Akram Al-Rawi, Abdallah Tubaishat, and Faouzi Bouslama
Submissions from 2007
A case study: Adoption of information technology in e-business of United Arab Emirates, Fahim Akhter
The contribution of intelligent system in forming trust and competitiveness during online transactions, Fahim Akhter
An intelligent integrated e-Government framework: The case of Jordan, Ghazi Alkhatib, Emad Bataineh, Haider Fraihat, and Zakaria Maamar
Exploring factors influencing the adoption of mobile commerce, Tariq Bhatti
Submissions from 2006
The cross-cultural challenges of adopting b2ce-commerce in middle east, europe, north americaand africa: An exploratory study, Fahim Akhter
Integrating IT certifications in networking courses: CISCO CCNA versls comptia network+, Akram Al-Rawi, Azzedine Lansari, and Faouzi Bouslama
Smart e-trader: A prototype information management system for UAE stock markets, F. A. Amir, H. Ibraheem, H. Mesmar, S. A. Mutawa, and E. Bataineh
Web service = E + F + I, Emad Bataineh, Zakaria Maamar, Djamai Benslimane, and Chirine Ghedira
Optimal restrictions for shareware use - time or functionality based, Wendy Hui and Fahim Akhter
Analysis of distributed resource management in wireless LANs that support fault tolerance, Ghassan Kbar and Wathiq Mansoor
Towards aspect-based modeling of self-healing Web Services, G. Kouadri Mostéfaoui, Z. Maamar, N. C. Narendra, and Ph Thiran
Decoupling security concerns in web services using aspects, G. Kouadri Mostéfaoui, N. C. Narendra, Z. Maamar, and S. Sattanathan
The world of work beneath the veil, A. Rhodes and N. Edge
Ontologies for specifying and reconciling contexts of web services, S. Sattanathan, N. C. Narendra, and Z. Maamar
Context-driven policy enforcement and reconciliation for Web services, S. Sattanathan, N. C. Narendra, Z. Maamar, and G. Kouadri Mostéfaoui
Submissions from 2005
Integrating certifications into information systems curricula, Akram Al-Rawi, Azzedine Lansari, and Faouzi Bouslama
E-learning and the educational organizations structure reengineering (EOSR), Osama Alshara and Abdallah Tubaishat
On coordinating personalizedweb services using CooPS, Zakaria Maamar, Emad Bataineh, and Ghazi AlKhatib
On Coordinating Personalized Web Services using COOPS, Z. Maamar, E. Bataineh, and G. AlKhatib
Context for Personalized Web Services, Z. Maamar, S.K. Mostefaoui, and Q.H. Mahmoud
On self-coordinating web services using similarity and neural networks, Z. Maamar, I. Younas, D. Benslimane, C. Ghedira, and H. Yahyaoui
Addressing enterprise information security, Anthony Rhodes
Submissions from 2004
Determining the factors which engender customer trust in business-to-consumer (B2C) electronic commerce, Fahim Akhter, Dave Hobbs, and Zakaria Maamar
Infrastructure for mobile learning environments, Arif Bhatti and Miroslaw Majewski
A conceptual analysis of the role of conversations in Web services composition, Zakaria Maamar, Soraya Kouadri Mostéfaoui, and Emad Bataineh
Submissions from 2003
A new non-recursive algorithm for binary search tree traversal, Akram Ai-Rawi, Azzedine Lansari, and Faouzi Bouslama
An agent-based approach to specify a Web service-oriented environment, Z. Maamar, F. Akhter, and M. Lahkim
Mining the web and medline medical records to discover new facts on diabetes, Farhi Marir, Huwida Said, and Usama Alalami
Submissions from 2002
Rethinking process guidance for selecting software components, N. Maiden, H. Kim, and Cornelius Ncube
The limitations of current decision-making techniques in the procurement of COTS software components, Cornelius Ncube and John C. Dean