BibTeX records: Ali Hussein Zolait

download as .bib file

@article{DBLP:journals/imcs/ShaheenZ23,
  author       = {Khalid Shaheen and
                  Ali Hussein Zolait},
  title        = {The impacts of the cyber-trust program on the cybersecurity maturity
                  of government entities in the Kingdom of Bahrain},
  journal      = {Inf. Comput. Secur.},
  volume       = {31},
  number       = {5},
  pages        = {529--544},
  year         = {2023},
  url          = {https://doi.org/10.1108/ICS-06-2022-0108},
  doi          = {10.1108/ICS-06-2022-0108},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/imcs/ShaheenZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijwltt/El-RahmanZ19,
  author       = {Sahar A. El{-}Rahman and
                  Ali Hussein Saleh Zolait},
  title        = {Automated Test Paper Generation Using Utility Based Agent and Shuffling
                  Algorithm},
  journal      = {Int. J. Web Based Learn. Teach. Technol.},
  volume       = {14},
  number       = {1},
  pages        = {69--83},
  year         = {2019},
  url          = {https://doi.org/10.4018/IJWLTT.2019010105},
  doi          = {10.4018/IJWLTT.2019010105},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijwltt/El-RahmanZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcsm/El-RahmanZ18,
  author       = {Sahar A. El{-}Rahman and
                  Ali Hussein Saleh Zolait},
  title        = {Hyperspectral image analysis for oil spill detection: a comparative
                  study},
  journal      = {Int. J. Comput. Sci. Math.},
  volume       = {9},
  number       = {2},
  pages        = {103--121},
  year         = {2018},
  url          = {https://doi.org/10.1504/IJCSM.2018.10012786},
  doi          = {10.1504/IJCSM.2018.10012786},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcsm/El-RahmanZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesma/ZolaitIAS18,
  author       = {Ali Hussein Zolait and
                  Safeya Mohamed Isa and
                  Hala Mahmood Ali and
                  Veera Pandiyan Kaliani Sundram},
  title        = {Men vs. Women: Study of Online Shopping Habits and Factors Influencing
                  Buying Decisions in Bahrain},
  journal      = {Int. J. {E} Serv. Mob. Appl.},
  volume       = {10},
  number       = {4},
  pages        = {61--73},
  year         = {2018},
  url          = {https://doi.org/10.4018/IJESMA.2018100104},
  doi          = {10.4018/IJESMA.2018100104},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijesma/ZolaitIAS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jeim/SundramBMZ18,
  author       = {Veera Pandiyan Kaliani Sundram and
                  Atikah Shamsul Bahrin and
                  Zarina Binti Abdul Munir and
                  Ali Hussein Zolait},
  title        = {The effect of supply chain information management and information
                  system infrastructure: The mediating role of supply chain integration
                  towards manufacturing performance in Malaysia},
  journal      = {J. Enterp. Inf. Manag.},
  volume       = {31},
  number       = {5},
  pages        = {751--770},
  year         = {2018},
  url          = {https://doi.org/10.1108/JEIM-06-2017-0084},
  doi          = {10.1108/JEIM-06-2017-0084},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jeim/SundramBMZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/ShamalaAZS17,
  author       = {Palaniappan Shamala and
                  Rabiah Ahmad and
                  Ali Hussein Zolait and
                  Muliati Sedek},
  title        = {Integrating information quality dimensions into information security
                  risk management {(ISRM)}},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {36},
  pages        = {1--10},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.jisa.2017.07.004},
  doi          = {10.1016/J.JISA.2017.07.004},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/ShamalaAZS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsit/ShamalaAZS15,
  author       = {Palaniappan Shamala and
                  Rabiah Ahmad and
                  Ali Hussein Zolait and
                  Shahrin bin Sahib},
  title        = {Collective information structure model for Information Security Risk
                  Assessment {(ISRA)}},
  journal      = {J. Syst. Inf. Technol.},
  volume       = {17},
  number       = {2},
  pages        = {193--219},
  year         = {2015},
  url          = {https://doi.org/10.1108/JSIT-02-2015-0013},
  doi          = {10.1108/JSIT-02-2015-0013},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jsit/ShamalaAZS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/behaviourIT/Zolait14,
  author       = {Ali Hussein Saleh Zolait},
  title        = {The nature and components of perceived behavioural control as an element
                  of theory of planned behaviour},
  journal      = {Behav. Inf. Technol.},
  volume       = {33},
  number       = {1},
  pages        = {65--84},
  year         = {2014},
  url          = {https://doi.org/10.1080/0144929X.2011.630419},
  doi          = {10.1080/0144929X.2011.630419},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/behaviourIT/Zolait14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijbis/AlqasaIOZ14,
  author       = {Khaled Mohammed Alqasa and
                  Filzah Mohd Isa and
                  Siti Norezam Othman and
                  Ali Hussein Saleh Zolait},
  title        = {The impact of students' attitude and subjective norm on the behavioural
                  intention to use services of banking system},
  journal      = {Int. J. Bus. Inf. Syst.},
  volume       = {15},
  number       = {1},
  pages        = {105--122},
  year         = {2014},
  url          = {https://doi.org/10.1504/IJBIS.2014.057967},
  doi          = {10.1504/IJBIS.2014.057967},
  timestamp    = {Sat, 25 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijbis/AlqasaIOZ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijbis/ZolaitAABB14,
  author       = {Ali Hussein Saleh Zolait and
                  Reem R. Al{-}Anizi and
                  Suhair Ababneh and
                  Fatima BuAsalli and
                  Noora Butaiba},
  title        = {User awareness of social media security: the public sector framework},
  journal      = {Int. J. Bus. Inf. Syst.},
  volume       = {17},
  number       = {3},
  pages        = {261--282},
  year         = {2014},
  url          = {https://doi.org/10.1504/IJBIS.2014.064973},
  doi          = {10.1504/IJBIS.2014.064973},
  timestamp    = {Sat, 25 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijbis/ZolaitAABB14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesma/AwadZ13,
  author       = {Wasan Shaker Awad and
                  Ali Hussein Zolait},
  title        = {E-Mail as an Official Communication Tool in Bahrain: Individual and
                  Public Organization Perspectives},
  journal      = {Int. J. {E} Serv. Mob. Appl.},
  volume       = {5},
  number       = {1},
  pages        = {51--76},
  year         = {2013},
  url          = {https://doi.org/10.4018/jesma.2013010103},
  doi          = {10.4018/JESMA.2013010103},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijesma/AwadZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsit/DzazaliZ12,
  author       = {Suhazimah Dzazali and
                  Ali Hussein Saleh Zolait},
  title        = {Assessment of Information Security Maturity: An Exploration Study
                  of Malaysian Public Service Organizations},
  journal      = {J. Syst. Inf. Technol.},
  volume       = {14},
  number       = {1},
  pages        = {23--57},
  year         = {2012},
  url          = {https://doi.org/10.1108/13287261211221128},
  doi          = {10.1108/13287261211221128},
  timestamp    = {Thu, 18 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jsit/DzazaliZ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijtd/ShehabZ11,
  author       = {Omar Shehab and
                  Ali Hussein Saleh Zolait},
  title        = {Semantic Search Engine and Object Database Guidelines for Service
                  Oriented Architecture Models},
  journal      = {Int. J. Technol. Diffusion},
  volume       = {2},
  number       = {3},
  pages        = {47--71},
  year         = {2011},
  url          = {https://doi.org/10.4018/jtd.2011070105},
  doi          = {10.4018/JTD.2011070105},
  timestamp    = {Wed, 05 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijtd/ShehabZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesma/AininZK10,
  author       = {Sulaiman Ainin and
                  Ali Hussein Saleh Zolait and
                  N. G. Kaisin},
  title        = {Analysis of Mobile Users' Perception Towards {SMS} Voting},
  journal      = {Int. J. {E} Serv. Mob. Appl.},
  volume       = {2},
  number       = {1},
  pages        = {47--67},
  year         = {2010},
  url          = {https://doi.org/10.4018/jesma.2010101603},
  doi          = {10.4018/JESMA.2010101603},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijesma/AininZK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijtd/SulaimanZ10,
  author       = {Ainin Sulaiman and
                  Ali Hussein Saleh Zolait},
  title        = {Adoption of Short Messaging Service {(SMS)} in Malaysia},
  journal      = {Int. J. Technol. Diffusion},
  volume       = {1},
  number       = {1},
  pages        = {41--51},
  year         = {2010},
  url          = {https://doi.org/10.4018/jtd.2010010104},
  doi          = {10.4018/JTD.2010010104},
  timestamp    = {Mon, 13 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijtd/SulaimanZ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijtd/ZolaitIF10,
  author       = {Ali Hussein Saleh Zolait and
                  Abdul Razak Ibrahim and
                  Ahmad Farooq},
  title        = {A Study on the Internet Security and its Implication for E-Commerce
                  in Yemen},
  journal      = {Int. J. Technol. Diffusion},
  volume       = {1},
  number       = {3},
  pages        = {34--47},
  year         = {2010},
  url          = {https://doi.org/10.4018/jtd.2010070102},
  doi          = {10.4018/JTD.2010070102},
  timestamp    = {Mon, 13 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijtd/ZolaitIF10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijtd/IbrahimZS10,
  author       = {Abdul Razak Ibrahim and
                  Ali Hussein Zolait and
                  Veera Pandiyan Sundram},
  title        = {Supply Chain Management Practices and Firm Performance: An Empirical
                  Study of the Electronics Industry in Malaysia},
  journal      = {Int. J. Technol. Diffusion},
  volume       = {1},
  number       = {3},
  pages        = {48--55},
  year         = {2010},
  url          = {https://doi.org/10.4018/jtd.2010070103},
  doi          = {10.4018/JTD.2010070103},
  timestamp    = {Mon, 13 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijtd/IbrahimZS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsit/ZolaitICS10,
  author       = {Ali Hussein Zolait and
                  Abdul Razak Ibrahim and
                  V. G. R. Chandran and
                  Veera Pandiyan Sundram},
  title        = {Supply chain integration: an empirical study on manufacturing industry
                  in Malaysia},
  journal      = {J. Syst. Inf. Technol.},
  volume       = {12},
  number       = {3},
  pages        = {210--221},
  year         = {2010},
  url          = {https://doi.org/10.1108/13287261011070830},
  doi          = {10.1108/13287261011070830},
  timestamp    = {Thu, 18 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jsit/ZolaitICS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/giq/DzazaliSZ09,
  author       = {Suhazimah Dzazali and
                  Ainin Sulaiman and
                  Ali Hussein Saleh Zolait},
  title        = {Information security landscape and maturity level: Case study of Malaysian
                  Public Service {(MPS)} organizations},
  journal      = {Gov. Inf. Q.},
  volume       = {26},
  number       = {4},
  pages        = {584--593},
  year         = {2009},
  url          = {https://doi.org/10.1016/j.giq.2009.04.004},
  doi          = {10.1016/J.GIQ.2009.04.004},
  timestamp    = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/giq/DzazaliSZ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijbis/DzazaliAZ09,
  author       = {Suhazimah Dzazali and
                  Sulaiman Ainin and
                  Ali Hussein Saleh Zolait},
  title        = {Employing the social-technical perspective in identifying security
                  management systems in organisations},
  journal      = {Int. J. Bus. Inf. Syst.},
  volume       = {4},
  number       = {4},
  pages        = {419--439},
  year         = {2009},
  url          = {https://doi.org/10.1504/IJBIS.2009.024504},
  doi          = {10.1504/IJBIS.2009.024504},
  timestamp    = {Sat, 25 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijbis/DzazaliAZ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ccsecis/ZolaitS08,
  author       = {Ali Hussein Saleh Zolait and
                  Ainin Sulaiman},
  title        = {Incorporating the Innovation Attributes Introduced by Rogers'Theory
                  into Theory of Reasoned Action: An Examination of Internet Banking
                  Adoption in Yemen},
  journal      = {Comput. Inf. Sci.},
  volume       = {1},
  number       = {1},
  pages        = {36--51},
  year         = {2008},
  url          = {https://doi.org/10.5539/cis.v1n1p36},
  doi          = {10.5539/CIS.V1N1P36},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ccsecis/ZolaitS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}