Submissions from 2014
The Wiley Blackwell Encyclopedia of Health, Illness, Behavior, and Society - Health Care Services, Cross"Border, Jeremy Lim and Indira Umareddy
The Relation between Economic Transition and Political Transformation – Egypt in the Light of EEC's Experience, Suzanna Sobhy ElMassah and Ola Al-Sayed
Book review: Teaching as a design science (2012; Diana Laurillard; Routledge), Chrysi Rapanta
Behavior modeling and automated verification of Web services, Quan Z. Sheng, Zakaria Maamar, Lina Yao, Claudia Szabo, and Scott Bourne
Methodological map: a mixed methods approach to explore the role of space in an Emirati single-gender learning environment, Gergana Alzeer
Accruals and Real Earnings Management around Debt Covenant Violations, Trevor W. Chamberlain, Umar R. Butt, and Sudipto Sarkar
Design and performance analysis of a virtual ring architecture for smart grid privacy, Mohamad Badra and Sherali Zeadally
The anthropology of the state and the state of anthropology in Brunei, Frank Fanselow
Cognition and Achievement in Children With Seizure Disorders, Lydia Barza
How similar or different are we? A perception of diversity in global virtual teams, Gaelle Picherit-Duthler
A direct method for teaching and measuring engineering professional skills for global workplace competency: Adaptations to computing at a University in the United Arab Emirates, Ashley Ater Kranov, Maurice Danaher, and Kevin Schoepp
Online engineering courses: Benchmarking quality, Maurice Danaher
Revealing variations in perception of mental states from dynamic facial expressions: A cautionary note, Elisa Back and Timothy R. Jordan
Academic integrity and oral examination: an Arabian Gulf perspective, Justin Thomas, Monique Raynor, and Merryn McKinnon
Accessibility as an integral factor in e-government web site evaluation: The case of Dubai e-government, Faouzi Kamoun and Mohamed Basel Almourad
Accounting for Change: The Evolution of British National Identities, Justin Gibbins
Accreditation and assessment of learning in the UAE, Valerie Priscilla Goby and Catherine Nickerson
A comparison of forensic acquisition techniques for android devices: A case study investigation of orweb browsing sessions, Nedaa Al Barghouthy and Andrew Marrington
Adaption and adjustment of military spouses to overseas postings: An online forum study, Gillian Blakely, Catherine Hennessy, Man Cheung Chung, and Heather Skirton
A forensic analysis framework for recovering encryption keys and BB10 backup decryption, Halima Al Shehhi, Dua'A Abu Hamdi, Izzeddin Asad, and Farkhund Iqbal
A fuzzy clustering-based credibility model for trust assessment in a service-oriented architecture, Zohra Saoud, Noura Faci, Zakaria Maamar, and Djamal Benslimane
A fuzzy model for selecting social web services, Hamdi Yahyaoui, Mohammed Almulla, and Zakaria Maamar
A goal-based approach to engineering capacity-driven Web services, Zakaria Maamar, Samir Tata, Kokou Yetongnon, Djamal Benslimane, and Philippe Thiran
Amazon Kindle Fire HD forensics, Asif Iqbal, Hanan Alobaidli, Andrew Marrington, and Ibrahim Baggili
Analysing the future of Zimbabwe's academic libraries: From their historical past to preparedness for current realities and requirements, Judith Mavodza
Analysis of the Rhode Island schumann resonance daily-average data, Robert Boldi, Earle Williams, and Anirban Guha
An approach for the validation of file recovery functions in digital forensics' software tools, Sultan Al Sharif, Mohamed Al Ali, Naser Salem, Farkhund Iqbal, May El Barachi, and Omar Alfandi
An authentication scheme to protect the location privacy of femtocell users, Mohammed Hussain
A new business model and architecture for context-aware applications provisioning in the cloud, Nadjia Kara, May El Barachi, Abderrahmane El Bardai, and Omar Alfandi
An exploration of bias in meta-analysis: the case of technology integration research in higher education, Robert M. Bernard, Eugene Borokhovski, Richard F. Schmid, and Rana M. Tamim
An information security awareness program to address common security concerns in IT unit, Shadi Al Awawdeh and Abdallah Tubaishat
An infrastructure for robotic applications as cloud computing services, Carla Mouradian, Fatima Zahra Errounda, Fatna Belqasmi, and Roch Glitho
A RESTfull architecture for enabling rapid development and deployment of companion robot applications, Razieh Safaripour, Ferhat Khendek, Roch Glitho, and Fatna Belqasmi
A review of the role of fiber, phytochemicals and omega 3 fatty acids in cardiovascular disease, Dimitrios Papandreou, Hanadi Almessabi, Shamma Al Saad, Aaesha AlShehhi, and Alya AlMansoori
A structural approach to handling endogeneity in strategic management: The case of RBV, Anup Menon Nandialath, Jeffrey P. Dotson, and Rodolphe Durand
A wireless environmental sensor network for the condition monitoring of paper rolls at printing facilities, Faouzi Kamoun and Sami Miniaoui
Being in the users' shoes: Anticipating experience while designing online courses, Chrysi Rapanta and Lorenzo Cantoni
Building sustainable parking lots with the Web of Things, Sujith Samuel Mathew, Yacine Atif, Quan Z. Sheng, and Zakaria Maamar
Cardiometabolic risk factors related to non-alcoholic fatty liver disease in obese children, Dimitrios Papandreou, Zacharoula Karabouta, Athina Pantoleon, Athina Sidiropoulou, and Israel Rousso
Caroline Pluss and Chan Kwok-bun (eds.) (2012) Living Intersections: Transnational Migrant Identifications in Asia. New York: Springer. 279 pages. ISBN: 978-94-007-2966-7., Habibul Haque Khondker
CAT Record (computer activity timeline record): A unified agent based approach for real time computer forensic evidence collection, Shadi Al Awawdeh, Ibrahim Baggili, Andrew Marrington, and Farkhund Iqbal
Changing physical appearance preferences in the United Arab Emirates, Justin Thomas, Fatima H. Al Marzooqi, Sabrina Tahboub-Schulte, and Steven W. Furber
Commitments to regulate social web services operation, Zakaria Maamar, Noura Faci, Khouloud Boukadi, Quan Z. Sheng, and Lina Yao
Common Educational Proficiency Assessment (CEPA) in English, Christine Coombe and Peter Davidson
Competitive Moves Over Time: The Case of SAP, Michelle Antero, Jonas Hedman, and Stefan Henningsson
Computer Profiling for Preliminary Forensic Examination, Andrew Marrington, Farkhund Iqbal, and Ibrahim Baggili
Concerns Regarding Food Biotechnology: An Ongoing Debate, Fatme Al Anouti
Conclusion: Post-Lisbon and British National Identity, Justin Gibbins
CONF-IRM - Critical Success Factors for the Acquisition of Enterprise Systems: Empirical Validation, Tariq Bhatti
Detecting bias in meta-analyses of distance education research: big pictures we can rely on, Robert M. Bernard, Eugene Borokhovski, and Rana M. Tamim
Differentiated QoS for overlay-based disaster response systems, Mohammadmajid Hormati, Ferhat Khendek, Roch Glitho, and Fatna Belqasmi
Digital forensics and cyber crime: Fifth international conference, ICDF2C 2013 Moscow, Russia, September 26–27, 2013 revised selected papers, Pavel Gladyshev, Andrew Marrington, and Ibrahim Baggili
Does Bank Transparency Matter, Perihan Iren, Alan K. Reichert, and Dieter Gramlich
Do fear indices help predict stock returns?, G. Rubbaniy, Robel Asmerom, Syed Kumail Abbas Rizvi, and Bushra Naqvi
Effective third party auditing in cloud computing, Mohammed Hussain and Mohamed Basel Al-Mourad
Endogeneity and dynamics of innovation and firm performance, Anup M. Nandialath, Ramesh Mohan, and Madan Annavarjula
Enforcing Nationalization in the GCC : Private Sector Progress , Strategy and Policy for Sustainable Nationalization, Sasha Hodgson and Darren Hanson
Ensemble artifact design for context sensitive decision support, Shah Jahan Miah and John G. Gammack
Ethics behind cyber warfare: A study of Arab citizens awareness, Nedaa Baker Al Barghuthi and Huwida Said
Examining Industry Wage Differentials in the Palestinian Territories, Wifag Adnan
FDG - Gender differences in videogame development classes: U.S. and the U.A.E., Mario Guimaraes and Leon Jololian
Genocide's Deadly Cycle: Letter from the Caucasus, Christopher Thornton
Global circuit response to the 11-year solar cycle: Changes in source or in medium?, Earle Williams, Anirban Guha, Robert Boldi, Gabriella Satori, Alexander Koloskov, and Yuri Yampolski
“Going mobile” in business communication at an Arabian gulf university, Chrysi Rapanta, Catherine Nickerson, and Valerie Priscilla Goby
Green Computing in the Desert: Applying Problem-Based Learning at an Emirati University, John C. Beachboard and Martine Robinson Beachboard
How audit fees are affected by a client under SEC investigation, Winifred D. Scott and Willie E. Gist
Human and organizational factors of healthcare data breaches: The swiss cheese model of data breach causation and prevention, Faouzi Kamoun and Mathew Nicho
Hybrid-learning for social design, Denielle Emans and Adina Hempel
Impact of cloud computing adoption on firm stock price - An empirical research, Adam M. Mahmood, Faruk Arslan, Jagadish Dandu, Godwin Udo, and Aurelia Nicholas-Donald
Information disclosure, bank performance and bank stability, Perihan Iren, Alan K. Reichert, and Dieter Gramlich
Intelligence, creativity, and innovation, Jay Squalli and Kenneth Wilson
Introduction, Justin Gibbins
Islamic Feminism in Kuwait: The Politics and Paradoxes by Alessandra L. González (review), Jane Bristol-Rhys
Letter From Lebanon, Christopher Thornton
Macro-scaffolding: Contextual support for teacher learning, Marion Engin
Mobility track chairs welcome message, Andreas Kassler, Rui Aguiar, and May El Barachi
New technologies track chairs welcome message, Jose M.Alcaraz Calero, Yan Zhang, and Munir Majdalawieh
Non-HDL and triglycerides are independently associated with anthropometrical indices in a cypriot population of healthy adults, Andreou Eleni, Papandreou Dimitrios, Hajigeorgiou Photos, Rachaniotis Nikolaos, Philippou Christiana, Kyriakou Katia, Avraam Thalia, Chappa Georgia, Kallis Prokopis, Lazarou Chrystalleni, Christoforou Christoforos, Kokkinofta Rebecca, Dioghenous Christos, Zampelas Antonis, Loizou Louis, and Aletrari Elena
Performance of a Logical, Five- Phase, Multithreaded, Bootable Triage Tool, Ibrahim Baggili, Andrew Marrington, and Yasser Jafar
Performance of a logical, five-phase, multithreaded, bootable triage tool, Ibrahim Baggili, Andrew Marrington, and Yasser Jafar
Posttraumatic stress disorder and psychiatric comorbidity following the 2010 flood in Pakistan: Exposure characteristics, cognitive distortions, and emotional suppression, Man Cheung Chung, Sabeena Jalal, and Najib Ullah Khan
Posttraumatic stress reactions following burglary: The role of coping and personality, Man Cheung Chung, Jacqui Stedmon, Rachel Hall, Zoe Marks, Kate Thornhill, and Rebecca Mehrshahi
Posttraumatic stress symptoms and well-being following relationship dissolution: Past trauma, alexithymia, suppression, Man Cheung Chung and Laura J. Hunt
Preliminary forensic analysis of the Xbox one, Jason Moore, Ibrahim Baggili, Andrew Marrington, and Armindo Rodrigues
Privacy of mobile users: Pitfalls and recommendations, Naser Mohamed Al Ali, Dima Alhadidi, and Zakaria Maamar
Privacy-preserving medical reports publishing for cluster analysis, Ali Hmood, Benjamin C.M. Fung, and Farkhund Iqbal
Relation of cardiovascular risk factors with obesity in children aged 8-15 years old, Dimitrios Papandreou, Israel Rousso, and Ioannis Mavromichalis
Report on the seal impressions and related small finds, Marta Ameri
Reputation-based composition of social web services, Alessandro Celestini, Gianpiero Costantino, Rocco De Nicola, Zakaria Maamar, Fabio Martinelli, Marinella Petrocchi, and Francesco Tiezzi
Running the D.C. Circuit Gauntlet on Cost-Benefit Analysis after Citizens United: Empirical Evidence from Sarbanes-Oxley and the JOBS Act, Ciara Torres-Spelliscy, Kathy Fogel, and Rwan El-Khatib
Schumann Resonance spectral characteristics: A useful tool to study Transient Luminous Events (TLEs) on a global scale, Anirban Guha, Earle Williams, Robert Boldi, Gabriella Satori, Tamás Nagy, Joan Montanyà, and Pascal Ortega
Science teaching self-efficacy of culturally foreign teachers: A baseline study in Abu Dhabi, Merryn McKinnon, Jase Moussa-Inaty, and Lydia Barza
SC-WS: A Context-based, Aspect-oriented Approach for Handling Security Concerns in Web Services, Ghita Kouadri Mostefaoui, Zakaria Maamar, and Nanjangud C. Narendra
Security track chairs welcome message, George Spanoudakis, Andrew Marrington, and Farkhund Iqbal
Smartcity workshop chairs welcome message, F. Belqasmi, R. Glitho, and N. Crespi
Social web services management, Zakaria Maamar, Noura Faci, Ejub Kajan, and Emir Ugljanin
Socio-demographic characteristics affecting sport tourism choices: A structural model, Nataša Slak Valek, Mike Shaw, and Jakob Bednarik
Sourcing strategies to keep up with competition: The case of SAP, Michelle Antero, Jonas Hedman, and Stefan Henningsson