-
1
Protecting Private Attributes in App Based Mobile User Profiling
Published 2020“…This threatens the users' privacy, when profiling is based on apps representing sensitive information, e.g., gambling problems indicated by a game app. …”
-
2
-
3
-
4
Energy-Efficient Cell Association and Load Balancing for Low Battery Users in Heterogeneous Cellular Networks
Published 2025“…This paper proposes improved cell association schemes based on the battery levels of UE and Deep Q-learning (DQL) to achieve load balancing and to decrease the power consumption of Low Battery Users (LBUs). …”
-
5
An Investigation on Users’ Perceptions of Open Government Data in Qatar
Published 2025“…Path analysis demonstrated that the OGD gap, combined with two other latent variables, significantly influenced users’ trust in OGD. This study prioritizes areas for improving OGD attributes, aiming to enhance users’ trust in OGD.…”
-
6
Assessing Factors Influencing Customers’ Adoption of AI-Based Voice Assistants
Published 2024“…The study reveals that the “value of openness to change” poses a significant effect toward “reasons for” adoption, among which “performance expectancy” and “hedonic motivation” play the most significant role in establishing a favorable attitude toward voice assistants’ adoption. …”
-
7
Changing management history, gender moderating pay to job satisfaction for IS users
Published 2014“…Originality/value – The paper is based on a large sample collection from the services sector, commercial banking in Lebanon. …”
Get full text
Get full text
Get full text
article -
8
Queuing-Based Optimization of EV Charging Stations: A Case Study of Manama City, Bahrain
Published 2025Get full text
doctoralThesis -
9
Novel interpretable and robust web-based AI platform for phishing email detection
Published 2024“…Additionally, Explainable AI (XAI) is integrated to enhance user trust. This research offers a practical and highly accurate solution, contributing to the fight against phishing by empowering users with a real-time web-based application for phishing email detection.…”
-
10
Protecting Smart Homes: A study on AI approaches to Detect Malwares and Developing a Two Factor Authentication System Based on SRAM PUF For Smart Home Users in UAE
Published 2025“…Due to the rapid adoption of smart technologies in smart homes, the Open Web Application Security Project has identified weak or easily guessable passwords as a significant vulnerability in IoT devices, based on real-world incidents. …”
Get full text
-
11
Investigating the User Perception of Digital Currency’s Economic and Legal aspects and its Impact on their Intention to Use
Published 2022“…However, the lack of research in the Middle East laid the ground for the current research to investigate the user perception and intention to use CBDC based on its economic and legal aspects. …”
Get full text
-
12
How does varying the number of personas affect user perceptions and behavior? Challenging the ‘small personas’ hypothesis!
Published 2022“…Our study results from eye-tracking and survey data suggest that when using interactive persona systems, the number of personas can be increased from the conventionally suggested ‘less than ten’, without significant negative effects on user perceptions or task performance, and with the positive effects of increasing engagement with the personas, having a more diverse representation of the end-user population, as well as users accessing personas from more varied demographic groups for a design task. …”
-
13
Assessing Organizational Users’ Intentions and Behavior to AI Integrated CRM Systems: a Meta-UTAUT Approach
Published 2022“…<p>This paper tests the meta-analysis based unified theory of acceptance and use of technology (meta-UTAUT) model to predict the behavioral intentions of organizational users and their use behavior to artificial intelligence (AI) integrated customer relationship management (CRM) systems. …”
-
14
Natural resource dependence and war nexus: new insights
Published 2025Get full text
Get full text
Get full text
Get full text
article -
15
-
16
-
17
Examining the factors affecting users’ cybersecurity behaviour in mobile payment contactless technologies: A hybrid SEM-ANN approach
Published 2022“…The model was then empirically validated using a hybrid Structural Equation Modelling-Artificial Neural Network (SEM-ANN) approach based on data collected through questionnaire surveys from mobile payment contactless technologies users in the UAE. …”
Get full text
-
18
Morphological changes in amblyopic eyes in choriocapillaris and Sattler’s layer in comparison to healthy eyes, and in retinal nerve fiber layer in comparison to fellow eyes through...
Published 2021“…Purpose Establishing the reliability of a new method to check the mean retinal and choroidal reflectivity and using it to find retinal and choroid changes in amblyopia. …”
Get full text
Get full text
Get full text
Get full text
article -
19
Road deaths and injuries in India: Action required on the five pillars of road safety
Published 2015“…Pedestrians, motorcycle riders / pillions and bicyclists, the vulnerable road users, are killed and disabled in large numbers. …”
-
20
Effectiveness of a Technology-Based Intervention to Teach Evidence-Based Practice: The EBR Tool
Published 2016“…The purpose of the EBR tool is to guide students through the basic steps needed to locate and critically appraise the online scientific literature while linking users to quality electronic resources to support evidence-based practice (EBP). …”
Get full text
Get full text
Get full text
article