- Software Engineering Techniques and Practices
- IoT and Edge/Fog Computing
- Blockchain Technology Applications and Security
- Organizational and Employee Performance
- Software Engineering Research
- Collaboration in agile enterprises
- Software System Performance and Reliability
- Job Satisfaction and Organizational Behavior
- Cloud Data Security Solutions
- Network Security and Intrusion Detection
- Information and Cyber Security
- Islamic Finance and Banking Studies
- Technology Adoption and User Behaviour
- Smart Cities and Technologies
- Privacy-Preserving Technologies in Data
- Service-Oriented Architecture and Web Services
- Caching and Content Delivery
- Digital Transformation in Industry
- Socioeconomic Development in MENA
- Outsourcing and Supply Chain Management
- Mobile Crowdsensing and Crowdsourcing
- Software Reliability and Analysis Research
- Employee Performance and Management
- AI in Service Interactions
- Green IT and Sustainability
American University of the Middle East
2020-2024
Norwegian University of Science and Technology
2024
College of Business Administration
2023
Universiti Malaysia Pahang Al-Sultan Abdullah
2023
University of Technology Sydney
2014-2018
University of Technology
2017
In recent years, blockchain technology has seen significant growth and widespread adoption in various industries. However, one major drawback of investments is their substantial energy consumption, which negative impacts on both the economy environment. The main cause concern generation atmospheric carbon emissions resulting from excessive usage. This research study aims to identify networks systems that assert themselves as environmentally friendly determine them produces least amount...
Recently, the widespread adoption of artificial intelligence, particularly generative AI technology, has surged across various industries. However, a notable drawback this technology is its significant energy consumption during model training and operation, which poses challenges to sustainability goals environment. Consequently, initiatives have emerged promote what termed "green intelligence," aiming mitigate these environmental impacts. Nevertheless, research discussing remains scarce....
Abstract Fog nodes are implemented near to end‐users Internet of Things (IoT) devices, which mitigate the impact low latency, location awareness, and geographic distribution unsupported features many IoT applications. Moreover, computing decreases data offload into Cloud, response time. Despite these benefits, faces challenges in meeting security privacy requirements. These occur due limitations resources. In fact, may add new issues. Although papers have discussed issues recently, most at a...
Cybersecurity is a critical issue that must be prioritized not just by enterprises of all kinds, but also national security. To safeguard an organization's cyberenvironments, information, and communication technologies, many are investing substantially in cybersecurity these days. One part the cyberdefense mechanism building enterprises' security policies library, for consistent implementation controls. Significant common various compared explored this study to provide robust comprehensive...
The Internet of things model enables a world in which all our everyday devices can be integrated and communicate with each other their surroundings to gather share data simplify task implementation. Such an environment would require seamless authentication, protection, stability, attack resistance, ease deployment, self-maintenance, among things. Blockchain, technology that was born the cryptocurrency Bitcoin, may fulfill requirements. However, due characteristics both Blockchain technology,...
Abstract The use of agile methodology has become widespread in organizations that previously relied on traditional or structured software development methods, such as the waterfall approach. Successful completion rates for initiatives are at 40%, whereas only 15% projects were successfully completed. To take advantage benefits each method, many using a hybrid approach combines Agile with Waterfall and methodologies. Rather than asking which is superior, it more productive to determine one...
The study aims to capture links between the use of encrypted communication channel -Telegram and lone wolf attacks occurred in Europe 2015-2016. To understand threads ISIS on Telegram we used digital ethnography approach which consists self-observation information flows four ISIS’s most celebrated telegram Channels. We draw public sphere theory coined term terror socio-sphere 3.0 as theoretical background this study. collected data is presented screenshots a visual evidence threads. This...
Agile software development performance depends on active communication. Active communication is an arduous task when agile teams are geographically distributed. enterprise architecture was reported to enhance such and performance. There little empirical evidence how can of distributed development. This paper contributes this research gap by empirically examining the relationships between architecture, communication, (on-time completion, on-budget functionality, quality). Using a quantitative...
<span lang="EN-US">Due to the expansion growth of IoT devices, Fog computing was proposed enhance low latency applications and meet distribution nature these devices. However, criticized for several privacy security vulnerabilities. This paper aims identify discuss challenges computing. It also discusses blockchain technology as a complementary mechanism associated with mitigate impact issues. The findings this reveal that can requirements fog computing; however, there are limitations...
Purpose Several organizations decided to work remotely after the Indian Government proclaimed a state of emergency on March 24, 2020, prevent spread COVID-19. Employees across all industries, particularly Generation-Y, were stressed as result COVID-19 outbreak. The purpose this study is fills that gap by looking at effects occupational stress factors (such coworker support, work–life balance [WLB] and role expectation conflict) Generation-Y employees in educational sector during...
Identifying the appropriate stakeholder is an integral part of requirements engineering process and primary factor influencing system success. The E-learning a significant platform with variety stakeholders that must be identified. After launch system, issues such as identifying arise threaten system's continuity. Moreover, use non-scientific incompatible methods for stakeholders, well limitations some these methods, are among other highlighted in this research. This study investigates issue...
The growth in textual data associated with the increased usage of online services and simplicity having access to these has resulted a rise number text classification research papers. Text significant influence on several domains such as news categorization, detection spam content, sentiment analysis. Turkish is focus this work since only few studies have been conducted context. We utilize obtained from customers’ inquiries that come an institution evaluate proposed techniques. Classes are...
In the current information era, knowledge can pose risks in online realm. It is imperative to proactively recognize potential threats, as unforeseen dangers cannot be eliminated entirely. Often, malware exploits and other emerging hazards are only identified after they have occurred. These types of referred zero-day attacks since no pre-existing anti-malware measures available mitigate them. Consequently, significant damages occur when vulnerabilities systems exploited. The effectiveness...
Recognizing aircraft automatically by using satellite images has different applications in both the civil and military sectors. However, due to complexity variety of foreground background analyzed images, it remains challenging obtain a suitable representation for identification. Many studies solutions have been presented literature, but only few suggested handling issue semantic image segmentation techniques lack publicly labeled datasets. With advancement CNNs, researchers some CNN...
Software architecture forms the cornerstone for achieving and ensuring various software quality attributes. It encompasses collected requirements of product, serving as a blueprint that delineates features all project stakeholders, along with methods measurement control. Despite significant increase in IoT-based agricultural systems, there is dearth studies on elements their architecture. To address this need, study offers an overview components services tailored to specific attributes...
Summary Data privacy is critical for users who want to use Cloud storage services. There a significant focus on service providers address this need. However, in the evolving dynamic cyber‐space, infractions are rising and pose threats infrastructures. Several studies developed various models techniques ensure of contents. these came with several shortages privacy‐preserving attributes they cover. Thus, article identified comprehensive set data propose flexible efficient framework handle...
Purpose This paper aims to discuss a novel artificial intelligence (AI) model known as Generative Pretrained Transformer (GPT), specifically ChatGPT, and its potential applications in the corporate sphere. It highlights significance of ChatGPT realms innovation, management policymaking. Design/methodology/approach is explained an AI language produced by OpenAI, using GPT framework extensive training on natural data. addresses model’s capabilities respond queries resembling human interactions...