Enterprise system as business intelligence and knowledge capabilities for enhancing applications and practices of IT governance FM Alkhaldi, SM Hammami, S Kasem, A Rashed, MN Alraja International Journal of Organizational and Collective Intelligence (IJOCI …, 2017 | 23 | 2017 |
Towards understanding user perceptions of biometrics authentication technologies A Rashed, N Alajarmeh International Journal of Computer Science and Information Security 13 (6), 25, 2015 | 23 | 2015 |
Odour user interface for authentication: Possibility and acceptance: Case study A Rashed, H Santos The International MultiConference of Engineers and Computer Scientists 1 …, 2010 | 21 | 2010 |
THE IMPACT OF THE CULTURE ON THE EREADINESS FOR E-GOVERNMENT IN DEVELOPING COUNTRIES (YEMEN) A Al-eryani, A Rashed The 13th International Arab Conference on Information Technology ACIT 2012 …, 2012 | 14 | 2012 |
A New Approach in Key Generation and Expansion in Rijndael Algorithm. NM Ajlouni, A El-Sheikh, AA Rashed Int. Arab J. Inf. Technol. 3 (1), 35-41, 2006 | 10 | 2006 |
A lightweight image encryption algorithm based on elliptic curves and chaotic in parallel AA Rashed, KA Hussein 2022 3rd Information Technology To Enhance e-learning and Other Application …, 2022 | 8 | 2022 |
Biometrics acceptance in Arab culture: An exploratory study AS Rashed, AE Henrique 2013 International Conference on Computer Applications Technology (ICCAT), 1-7, 2013 | 7 | 2013 |
An exploratory study of software piracy in Jordan A El Sheikh, AA Rashed, B Al Qudah, AG Peace The Electronic Journal of Information Systems in Developing Countries 23 (1 …, 2006 | 7 | 2006 |
Software piracy: Possible causes and cures A El-Sheikh, AA Rashed, AG Peace Information ethics: Privacy and intellectual property, 84-99, 2005 | 7 | 2005 |
Telehealth in Yemen: an overview and a proposed model AA Al-Fadhli, M Othman, A Rashed, A Ramasamy | 6 | 2015 |
Validating TAM with Odour Interface in ATM Machines HS Abdullah Rashed Global Journal of Computer Science and Technology 7 (GJCST Vol. 10 Issue 7 …, 2010 | 6* | 2010 |
New Approach in Key Generation and Expansion in Rijndael Algorithm ANA El-Sheikh, AA Rashed International Arab Journal of Information Technology 3 (1), 2006 | 6 | 2006 |
Learner in the role of instructor: promoting student peer-collaboration in learning management systems N Alajarmeh, A Rashed International Journal of Technology Enhanced Learning 11 (2), 121-135, 2019 | 4 | 2019 |
New technology acceptance in Europe and Arabic cultures: comparative study A Rashed, H Santos Proceedings of the Informing Science and Information Technology Education …, 2013 | 4 | 2013 |
OTM machine acceptance: in the Arab culture A Rashed, H Santos Global Security, Safety, and Sustainability: 6th International Conference …, 2010 | 4 | 2010 |
Multimodal Biometrics and Multilayered IDM for Secure Authentication A Rashed, H Santos Global Security, Safety, and Sustainability: 6th International Conference …, 2010 | 4 | 2010 |
Using modified genetic algorithm to replace AES key expansion algorithms AA Rashed, Y Sana The International Conference on Information Technology (ICIT’2007) at Al …, 2007 | 4 | 2007 |
Determinants of behavioral intention to mobile banking in Arab culture A Rashed, HMD Santos Research and Design Innovations for Mobile User Experience, 139-149, 2014 | 3 | 2014 |
User acceptance OTM machine: in the Arab culture AA Rashed, HMD Santos International Journal of Electronic Security and Digital Forensics 3 (3 …, 2010 | 3 | 2010 |
The Role of Simulation in Business Process Reengineering FM Alkhaldi, M Olaimat, AA Rashed Simulation and Modeling: Current Technologies and Applications, 359-390, 2008 | 3 | 2008 |