关注
Fahad Al-harby
Fahad Al-harby
Naif Arab University for Security Sciences (NAUSS)
在 nauss.edu.sa 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
An Intelligent Model for Online Recruitment Fraud Detection
BAF Alharby
Journal of Information Security 10 (No.3), 2019
742019
Users’ acceptance of secure biometrics authentication system: Reliability and validate of an extended UTAUT model
ALH Fahad, R Qahwaji, M Kamala
International Conference on Networked Digital Technologies -Springer, 254-258, 2010
312010
End-users’ acceptance of biometrics authentication to secure e-commerce within the context of Saudi culture: applying the UTAUT model
FAL Harby, R Qahwaji, M Kamala
Globalization, Technology Diffusion and Gender Disparity: Social Impacts of …, 2012
232012
The feasibility of biometrics authentication in e-commerce: User acceptance
F Al-Harby, R Qahwaji, M Kamala
IADIS International Conference WWW/Internet, 2008
222008
The effects of gender differences in the acceptance of biometrics authentication systems within online transaction
F Al-Harby, R Qahwaji, M Kamala
CyberWorlds, 2009. ACM/IEEE International Conference on, 203-210, 2009
192009
Globalization, Technology Diffusion and Gender Disparity: Social Impacts of ICTs: Social Impacts of ICTs
R Pande
IGI Global, 2012
182012
Towards an understanding of user acceptance to use biometrics authentication systems in e-commerce
FAL Harby, R Qahwajim, M Kamala
International Journal of E-Business Research (IJEBR), 2010
172010
Towards an understanding of user acceptance to use biometrics authentication systems in e-commerce: Using an extension of the technology acceptance model
FAL Harby, R Qahwajim, M Kamala
International Journal of E-Business Research (IJEBR) 6 (3), 34-55, 2010
172010
Networked Digital Technologies, Part I: Second International Conference, NDT 2010, Prague, Czech Republic
F Zavoral, J Yaghob, P Pichappan, E El-Qawasmeh
Springer Science & Business Media, 2010
82010
Leveraging a cloud-native architecture to enable semantic interconnectedness of data for cyber threat intelligence
M Ammi, O Adedugbe, FM Alharby, E Benkhelifa
Cluster Computing 25 (5), 3629-3640, 2022
72022
Understanding and Discovering SQL Injection Vulnerabilities
AA Sarhan, SA Farhan, FM Al-Harby
Springer International Conference on Applied Human Factors and Ergonomics, 45-51, 2017
72017
Biometric authentication systems for secured e-transactions in Saudi Arabia. An empirical investigation of the factors affecting users' acceptance of fingerprint authentication …
FM Al-Harby
University of Bradford, 2010
72010
Taxonomical Challenges for Cyber Incident Response Threat Intelligence: A Review
A Meryem, A Oluwasegun, A Fahad, B Elhadj
International Journal of Cloud Applications and Computing (IJCAC) 12 (1), 1-14, 2022
62022
Transformations in E-Business Technologies and Commerce: Emerging Impacts: Emerging Impacts
I Lee
IGI Global, 2011
52011
Barriers of E-commerce and E-government in Saudi Arabia
FM AL-HARBY
University of Bradford, 2006
52006
Description of security impact of drones challenges and opportunities
A Sabra, H Wridan, NM Alkhatani, F Al-Harby
2018 21st Saudi Computer Society National Computer Conference (NCC), 1-5, 2018
42018
The role of user self-efficacy for the acceptance of biometrics fingerprint authentication system in e-commerce: The use of UTAUT model
F Al-Harby, R Qahwaji, M Kamala
The Saudi International Conference, 2009
32009
Towards an understanding of the intention to use biometrics authentication systems in e-commerce: Using an extension of the technology acceptance model.
F Al-Harby, R Qahwaji, M Kamala
International Journal of E-Business Research 6 (3), 2009
32009
Secure Biometrics Authentication: A brief review of the Literature
F Al-harby, R Qahwaji, M Kamala
School of Informatics, University of Bradford BD7 1DP, UK 1 2, 2004
22004
Secure Biometrics Authentication: A brief review of the Literature retrieved from http://www. scribd. com/doc/23874642
F Al-harby, R Qahwaji, M Kamala
Secure-Biometrics-Authentication-A-briefreview-of-the-Literature# scribd, 0
2
系统目前无法执行此操作,请稍后再试。
文章 1–20