Search
Now showing items 1-10 of 26
Social media: Adoption and legal issues impact on business innovation
(
Inderscience
, 2015 , Article)
Copyright © 2015 Inderscience Enterprises Ltd. This study explored the impact of the social media adoption, and the related legal issues on the business innovation within the Gulf Cooperation Council (GCC), particularly ...
DLRT: Deep learning approach for reliable diabetic treatment
(
Institute of Electrical and Electronics Engineers Inc.
, 2017 , Conference Paper)
Diabetic therapy or insulin treatment enables patients to control the blood glucose level. Today, instead of physically utilizing syringes for infusing insulin, a patient can utilize a gadget, for example, a Wireless Insulin ...
Predicting trust in e-government: Two competing models
(
Inderscience Enterprises Ltd.
, 2019 , Article)
The efficiency of public sector in addressing e-government requirements depends on the number of constructs they focus on. The adoption process depends on many factors that governments cannot handle in an efficient fashion. ...
A risk mitigation approach for autonomous cloud intrusion response system
(
Springer-Verlag Wien
, 2016 , Article)
Cloud computing delivers on-demand resources over the Internet on a pay-for-use basis, intruders may exploit clouds for their advantage. This paper presents Autonomous Cloud Intrusion Response System (ACIRS), a proper ...
Security behaviors of smartphone users
(
Emerald Group Publishing Ltd.
, 2016 , Article)
Purpose: - This paper aims to report on the information security behaviors of smartphone users in an affuent economy of the Middle East. Design/methodology/approach: - A model based on prior research, synthesized from a ...
A Secure, Lightweight, and Privacy-Preserving Authentication Scheme for V2G Connections in Smart Grid
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Conference Paper)
Vehicle to Grid (V2G) is a crucial technology that enables the bidirectional flow of communication between electric vehicles (EVs) and the smart grid (SG). Undoubtedly security and privacy are inherent requirements of these ...
Voter's intention to use electronic voting systems
(
IGI Global
, 2017 , Article)
Electronic government initiatives play a central role in opening doorsfor potential votersto participate
in the political process by using electronic voting systems. Electronic voting is attracting more
attention by ...
A secure client-side framework for protecting the privacy of health data stored on the cloud
(
Institute of Electrical and Electronics Engineers Inc.
, 2018 , Conference Paper)
In the past decade, Cloud-Computing emerged as a new computing concept with a distributed nature using virtual network and systems. Many businesses rely on this technology to keep their systems running but concerns are ...
QATAR’S DEFENSE POLICY: SMART CHOICES OF A SMALL STATE
(
Institute of International Affairs
, 2018 , Conference Paper)
Defense policy of Qatar to a great extent depends on the geopolitical situation in the Middle East
and it’s heavily affected by the instable relations with the Gulf neighbors. Qatar has conducted a
defense policy ...
A review of security challenges, attacks and resolutions for wireless medical devices
(
Institute of Electrical and Electronics Engineers Inc.
, 2017 , Conference Paper)
Evolution of implantable medical devices for human beings has provided a radical new way for treating chronic diseases such as diabetes, cardiac arrhythmia, cochlear, gastric diseases etc. Implantable medical devices have ...