|
|
|
Elham Al Qahtani, Yousra Javed, Sarah Tabassum, Lipsarani Sahoo and Mohamed Shehab
User adoption and usage of end-to-end encryption tools is an ongoing research topic. A subset of such tools allows users to encrypt confidential emails, as well as manage their access control using features such as the expiration time, disabling forwardi...
ver más
|
|
|
|
|
|
|
Fadi Shehab Shiyyab, Abdallah Bader Alzoubi, Qais Mohammad Obidat and Hashem Alshurafat
This study determines to what extent Jordanian banks refer to and use artificial intelligence (AI) technologies in their operation process and examines the impact of AI-related terms disclosure on financial performance. Content analysis is used to analyz...
ver más
|
|
|
|
|
|
|
Mohammed El-Nagar, Khaled Ahmed, Eman Hamdan, Ayman S. Abdel-Khalik, Mostafa S. Hamad and Shehab Ahmed
Proper operation of the grid-tie transformerless converters under unbalanced and distorted conditions entails a precise detection of the frequency and fundamental component of the grid voltage. One of the main problems that could arise during the estimat...
ver más
|
|
|
|
|
|
|
Dinara Dikhanbayeva, Akmaral Tokbergenova, Yevgeniy Lukhmanov, Essam Shehab, Zbigniew Pastuszak and Ali Turkyilmaz
The concept of Industry 4.0 is becoming more and more popular all over the world. The implementation of its assumptions in business practice changes the way companies operate. The enormous innovative potential of the Industry 4.0 concept and the intensiv...
ver más
|
|
|
|
|
|
|
Yousra Javed, Elham Al Qahtani and Mohamed Shehab
Privacy compliance of the Middle East?s financial sector has been relatively unexplored. This paper evaluates the privacy compliance and readability of privacy statements for top banks and mobile money services in the Middle East. Our analysis shows that...
ver más
|
|
|
|
|
|
|
Ahmed Elashry, Abdulaziz Shehab, Alaa M. Riad and Ahmed Aboul-Fotouh
|
|
|
|
|
|
|
Nada Shehab,Ashraf M. Salama
Pág. 71 - 90
|
|
|
|
|
|
|
Shehab, M.; Bertino, E.; Ghafoor, A.
Pág. 116 - 129
|
|
|
|