Analysis of the challenges affecting e-healthcare adoption in developing countries: A case of Tanzania Z Omary, D Lupiana, F Mtenzi, B Wu International Journal of Information Studies 2 (1), 38-50, 2010 | 69 | 2010 |
Machine learning approach to identifying the dataset threshold for the performance estimators in supervised learning Z Omary, F Mtenzi International Journal for Infonomics (IJI) 3 (3), 314-325, 2010 | 44 | 2010 |
Electronic healthcare information security CA Shoniregun, K Dube, F Mtenzi Springer Science & Business Media, 2010 | 41 | 2010 |
Taxonomy for ubiquitous computing environments D Lupiana, C O'Driscoll, F Mtenzi 2009 First International Conference on Networked Digital Technologies, 469-475, 2009 | 31 | 2009 |
A secured mobile payment model for developing markets B Masamila, F Mtenzi, J Said, R Tinabo International Conference on Networked Digital Technologies, 175-182, 2010 | 30 | 2010 |
Security metrics for e-healthcare information systems: a domain specific metrics approach S Jafari, F Mtenzi, R Fitzpatrick, B O’shea Int. Journal of Digital Society 1 (4), 238-245, 2010 | 29 | 2010 |
State of Tanzania e-readiness and e-commerce: overview GS Oreku, J Li, K Kimeli, FJ Mtenzi Taylor & Francis Group 15 (4), 302-311, 2009 | 27 | 2009 |
A viewpoint of Tanzania e-commerce and implementation barriers GS Oreku, FJ Mtenzi, AD Ali Computer Science and Information Systems 10 (1), 263-281, 2013 | 25 | 2013 |
Challenges to E-healthcare adoption in developing countries: A case study of Tanzania Z Omary, D Lupiana, F Mtenzi, B Wu 2009 First International Conference on Networked Digital Technologies, 201-209, 2009 | 25 | 2009 |
Optimized priority based energy efficient routing algorithm for mobile ad hoc networks X Wei, G Chen, Y Wan, F Mtenzi Ad Hoc Networks 2 (3), 231-239, 2004 | 25 | 2004 |
Ubiquitous healthcare information system: Assessment of its impacts to patient’s information Z Omary, F Mtenzi, B Wu, C O’Driscoll International Journal for Information Security Research 1 (2), 71-77, 2011 | 24 | 2011 |
Anonymisation vs. Pseudonymisation: Which one is most useful for both privacy protection and usefulness of e-healthcare data R Tinabo, F Mtenzi, B O'Shea 2009 International Conference for Internet Technology and Secured …, 2009 | 17 | 2009 |
Deploying a context aware smart classroom C O'Driscoll, M Mithileash, F Mtenzi, B Wu Technological University Dublin, 2008 | 16 | 2008 |
The growth of Tanzanian mobile phone sector: triumph of quantity, failure of quality? FJ Mtenzi, BL Chachage, F Ngumbuke Karlstad University, 2008 | 15 | 2008 |
Energy-efficient load balancing ant based routing algorithm for wireless sensor networks X Li, B Keegan, F Mtenzi, T Weise, M Tan IEEE Access 7, 113182-113196, 2019 | 14 | 2019 |
RFID: an ideal technology for ubiquitous computing? C O’Driscoll, D MacCormac, M Deegan, F Mtenzi, B O’Shea International Conference on Ubiquitous Intelligence and Computing, 490-504, 2008 | 14 | 2008 |
Modified s-box to archive accelerated gost GS Oreku, J Li, T Pazynyuk, FJ Mtenzi IJCSNS International Journal of Computer Science and Network Security 7 (6 …, 2007 | 14 | 2007 |
A review of e-Government Initiatives in Tanzania: challenges and opportunities GS Oreku, FJ Mtenzi Digital Democracy: Concepts, Methodologies, Tools, and Applications, 802-835, 2012 | 11 | 2012 |
The prospects and barriers of e-commerce implementation in Tanzania GS Oreku, FJ Mtenzi, AD Ali ICIT 5th International Conference on Information Technology, Amman, Jordan …, 2011 | 11 | 2011 |
Measuring privacy in ubiquitous computing applications S Jafari, F Mtenzi, C O’Driscoll, R Fitzpatrick, B O’Shea Int. J. Digit. Soc 2 (3), 547-550, 2011 | 10 | 2011 |