Follow
Fahad Al-harby
Fahad Al-harby
Naif Arab University for Security Sciences (NAUSS)
Verified email at nauss.edu.sa - Homepage
Title
Cited by
Cited by
Year
An Intelligent Model for Online Recruitment Fraud Detection
BAF Alharby
Journal of Information Security 10 (No.3), 2019
742019
Users’ acceptance of secure biometrics authentication system: Reliability and validate of an extended UTAUT model
ALH Fahad, R Qahwaji, M Kamala
International Conference on Networked Digital Technologies -Springer, 254-258, 2010
312010
End-users’ acceptance of biometrics authentication to secure e-commerce within the context of Saudi culture: applying the UTAUT model
FAL Harby, R Qahwaji, M Kamala
Globalization, Technology Diffusion and Gender Disparity: Social Impacts of …, 2012
232012
The feasibility of biometrics authentication in e-commerce: User acceptance
F Al-Harby, R Qahwaji, M Kamala
IADIS International Conference WWW/Internet, 2008
222008
The effects of gender differences in the acceptance of biometrics authentication systems within online transaction
F Al-Harby, R Qahwaji, M Kamala
CyberWorlds, 2009. ACM/IEEE International Conference on, 203-210, 2009
192009
Globalization, Technology Diffusion and Gender Disparity: Social Impacts of ICTs: Social Impacts of ICTs
R Pande
IGI Global, 2012
182012
Towards an understanding of user acceptance to use biometrics authentication systems in e-commerce
FAL Harby, R Qahwajim, M Kamala
International Journal of E-Business Research (IJEBR), 2010
172010
Towards an understanding of user acceptance to use biometrics authentication systems in e-commerce: Using an extension of the technology acceptance model
FAL Harby, R Qahwajim, M Kamala
International Journal of E-Business Research (IJEBR) 6 (3), 34-55, 2010
172010
Networked Digital Technologies, Part I: Second International Conference, NDT 2010, Prague, Czech Republic
F Zavoral, J Yaghob, P Pichappan, E El-Qawasmeh
Springer Science & Business Media, 2010
82010
Leveraging a cloud-native architecture to enable semantic interconnectedness of data for cyber threat intelligence
M Ammi, O Adedugbe, FM Alharby, E Benkhelifa
Cluster Computing 25 (5), 3629-3640, 2022
72022
Understanding and Discovering SQL Injection Vulnerabilities
AA Sarhan, SA Farhan, FM Al-Harby
Springer International Conference on Applied Human Factors and Ergonomics, 45-51, 2017
72017
Biometric authentication systems for secured e-transactions in Saudi Arabia. An empirical investigation of the factors affecting users' acceptance of fingerprint authentication …
FM Al-Harby
University of Bradford, 2010
72010
Taxonomical Challenges for Cyber Incident Response Threat Intelligence: A Review
A Meryem, A Oluwasegun, A Fahad, B Elhadj
International Journal of Cloud Applications and Computing (IJCAC) 12 (1), 1-14, 2022
62022
Transformations in E-Business Technologies and Commerce: Emerging Impacts: Emerging Impacts
I Lee
IGI Global, 2011
52011
Barriers of E-commerce and E-government in Saudi Arabia
FM AL-HARBY
University of Bradford, 2006
52006
Description of security impact of drones challenges and opportunities
A Sabra, H Wridan, NM Alkhatani, F Al-Harby
2018 21st Saudi Computer Society National Computer Conference (NCC), 1-5, 2018
42018
The role of user self-efficacy for the acceptance of biometrics fingerprint authentication system in e-commerce: The use of UTAUT model
F Al-Harby, R Qahwaji, M Kamala
The Saudi International Conference, 2009
32009
Towards an understanding of the intention to use biometrics authentication systems in e-commerce: Using an extension of the technology acceptance model.
F Al-Harby, R Qahwaji, M Kamala
International Journal of E-Business Research 6 (3), 2009
32009
Secure Biometrics Authentication: A brief review of the Literature
F Al-harby, R Qahwaji, M Kamala
School of Informatics, University of Bradford BD7 1DP, UK 1 2, 2004
22004
Secure Biometrics Authentication: A brief review of the Literature retrieved from http://www. scribd. com/doc/23874642
F Al-harby, R Qahwaji, M Kamala
Secure-Biometrics-Authentication-A-briefreview-of-the-Literature# scribd, 0
2
The system can't perform the operation now. Try again later.
Articles 1–20