


default search action
BibTeX records: Ali Hussein Zolait
@article{DBLP:journals/imcs/ShaheenZ23, author = {Khalid Shaheen and Ali Hussein Zolait}, title = {The impacts of the cyber-trust program on the cybersecurity maturity of government entities in the Kingdom of Bahrain}, journal = {Inf. Comput. Secur.}, volume = {31}, number = {5}, pages = {529--544}, year = {2023}, url = {https://doi.org/10.1108/ICS-06-2022-0108}, doi = {10.1108/ICS-06-2022-0108}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/imcs/ShaheenZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijwltt/El-RahmanZ19, author = {Sahar A. El{-}Rahman and Ali Hussein Saleh Zolait}, title = {Automated Test Paper Generation Using Utility Based Agent and Shuffling Algorithm}, journal = {Int. J. Web Based Learn. Teach. Technol.}, volume = {14}, number = {1}, pages = {69--83}, year = {2019}, url = {https://doi.org/10.4018/IJWLTT.2019010105}, doi = {10.4018/IJWLTT.2019010105}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijwltt/El-RahmanZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcsm/El-RahmanZ18, author = {Sahar A. El{-}Rahman and Ali Hussein Saleh Zolait}, title = {Hyperspectral image analysis for oil spill detection: a comparative study}, journal = {Int. J. Comput. Sci. Math.}, volume = {9}, number = {2}, pages = {103--121}, year = {2018}, url = {https://doi.org/10.1504/IJCSM.2018.10012786}, doi = {10.1504/IJCSM.2018.10012786}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcsm/El-RahmanZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijesma/ZolaitIAS18, author = {Ali Hussein Zolait and Safeya Mohamed Isa and Hala Mahmood Ali and Veera Pandiyan Kaliani Sundram}, title = {Men vs. Women: Study of Online Shopping Habits and Factors Influencing Buying Decisions in Bahrain}, journal = {Int. J. {E} Serv. Mob. Appl.}, volume = {10}, number = {4}, pages = {61--73}, year = {2018}, url = {https://doi.org/10.4018/IJESMA.2018100104}, doi = {10.4018/IJESMA.2018100104}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijesma/ZolaitIAS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jeim/SundramBMZ18, author = {Veera Pandiyan Kaliani Sundram and Atikah Shamsul Bahrin and Zarina Binti Abdul Munir and Ali Hussein Zolait}, title = {The effect of supply chain information management and information system infrastructure: The mediating role of supply chain integration towards manufacturing performance in Malaysia}, journal = {J. Enterp. Inf. Manag.}, volume = {31}, number = {5}, pages = {751--770}, year = {2018}, url = {https://doi.org/10.1108/JEIM-06-2017-0084}, doi = {10.1108/JEIM-06-2017-0084}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jeim/SundramBMZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/ShamalaAZS17, author = {Palaniappan Shamala and Rabiah Ahmad and Ali Hussein Zolait and Muliati Sedek}, title = {Integrating information quality dimensions into information security risk management {(ISRM)}}, journal = {J. Inf. Secur. Appl.}, volume = {36}, pages = {1--10}, year = {2017}, url = {https://doi.org/10.1016/j.jisa.2017.07.004}, doi = {10.1016/J.JISA.2017.07.004}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/ShamalaAZS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsit/ShamalaAZS15, author = {Palaniappan Shamala and Rabiah Ahmad and Ali Hussein Zolait and Shahrin bin Sahib}, title = {Collective information structure model for Information Security Risk Assessment {(ISRA)}}, journal = {J. Syst. Inf. Technol.}, volume = {17}, number = {2}, pages = {193--219}, year = {2015}, url = {https://doi.org/10.1108/JSIT-02-2015-0013}, doi = {10.1108/JSIT-02-2015-0013}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsit/ShamalaAZS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/behaviourIT/Zolait14, author = {Ali Hussein Saleh Zolait}, title = {The nature and components of perceived behavioural control as an element of theory of planned behaviour}, journal = {Behav. Inf. Technol.}, volume = {33}, number = {1}, pages = {65--84}, year = {2014}, url = {https://doi.org/10.1080/0144929X.2011.630419}, doi = {10.1080/0144929X.2011.630419}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/behaviourIT/Zolait14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijbis/AlqasaIOZ14, author = {Khaled Mohammed Alqasa and Filzah Mohd Isa and Siti Norezam Othman and Ali Hussein Saleh Zolait}, title = {The impact of students' attitude and subjective norm on the behavioural intention to use services of banking system}, journal = {Int. J. Bus. Inf. Syst.}, volume = {15}, number = {1}, pages = {105--122}, year = {2014}, url = {https://doi.org/10.1504/IJBIS.2014.057967}, doi = {10.1504/IJBIS.2014.057967}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijbis/AlqasaIOZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijbis/ZolaitAABB14, author = {Ali Hussein Saleh Zolait and Reem R. Al{-}Anizi and Suhair Ababneh and Fatima BuAsalli and Noora Butaiba}, title = {User awareness of social media security: the public sector framework}, journal = {Int. J. Bus. Inf. Syst.}, volume = {17}, number = {3}, pages = {261--282}, year = {2014}, url = {https://doi.org/10.1504/IJBIS.2014.064973}, doi = {10.1504/IJBIS.2014.064973}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijbis/ZolaitAABB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijesma/AwadZ13, author = {Wasan Shaker Awad and Ali Hussein Zolait}, title = {E-Mail as an Official Communication Tool in Bahrain: Individual and Public Organization Perspectives}, journal = {Int. J. {E} Serv. Mob. Appl.}, volume = {5}, number = {1}, pages = {51--76}, year = {2013}, url = {https://doi.org/10.4018/jesma.2013010103}, doi = {10.4018/JESMA.2013010103}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijesma/AwadZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsit/DzazaliZ12, author = {Suhazimah Dzazali and Ali Hussein Saleh Zolait}, title = {Assessment of Information Security Maturity: An Exploration Study of Malaysian Public Service Organizations}, journal = {J. Syst. Inf. Technol.}, volume = {14}, number = {1}, pages = {23--57}, year = {2012}, url = {https://doi.org/10.1108/13287261211221128}, doi = {10.1108/13287261211221128}, timestamp = {Thu, 18 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsit/DzazaliZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijtd/ShehabZ11, author = {Omar Shehab and Ali Hussein Saleh Zolait}, title = {Semantic Search Engine and Object Database Guidelines for Service Oriented Architecture Models}, journal = {Int. J. Technol. Diffusion}, volume = {2}, number = {3}, pages = {47--71}, year = {2011}, url = {https://doi.org/10.4018/jtd.2011070105}, doi = {10.4018/JTD.2011070105}, timestamp = {Wed, 05 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijtd/ShehabZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijesma/AininZK10, author = {Sulaiman Ainin and Ali Hussein Saleh Zolait and N. G. Kaisin}, title = {Analysis of Mobile Users' Perception Towards {SMS} Voting}, journal = {Int. J. {E} Serv. Mob. Appl.}, volume = {2}, number = {1}, pages = {47--67}, year = {2010}, url = {https://doi.org/10.4018/jesma.2010101603}, doi = {10.4018/JESMA.2010101603}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijesma/AininZK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijtd/SulaimanZ10, author = {Ainin Sulaiman and Ali Hussein Saleh Zolait}, title = {Adoption of Short Messaging Service {(SMS)} in Malaysia}, journal = {Int. J. Technol. Diffusion}, volume = {1}, number = {1}, pages = {41--51}, year = {2010}, url = {https://doi.org/10.4018/jtd.2010010104}, doi = {10.4018/JTD.2010010104}, timestamp = {Mon, 13 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijtd/SulaimanZ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijtd/ZolaitIF10, author = {Ali Hussein Saleh Zolait and Abdul Razak Ibrahim and Ahmad Farooq}, title = {A Study on the Internet Security and its Implication for E-Commerce in Yemen}, journal = {Int. J. Technol. Diffusion}, volume = {1}, number = {3}, pages = {34--47}, year = {2010}, url = {https://doi.org/10.4018/jtd.2010070102}, doi = {10.4018/JTD.2010070102}, timestamp = {Mon, 13 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijtd/ZolaitIF10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijtd/IbrahimZS10, author = {Abdul Razak Ibrahim and Ali Hussein Zolait and Veera Pandiyan Sundram}, title = {Supply Chain Management Practices and Firm Performance: An Empirical Study of the Electronics Industry in Malaysia}, journal = {Int. J. Technol. Diffusion}, volume = {1}, number = {3}, pages = {48--55}, year = {2010}, url = {https://doi.org/10.4018/jtd.2010070103}, doi = {10.4018/JTD.2010070103}, timestamp = {Mon, 13 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijtd/IbrahimZS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsit/ZolaitICS10, author = {Ali Hussein Zolait and Abdul Razak Ibrahim and V. G. R. Chandran and Veera Pandiyan Sundram}, title = {Supply chain integration: an empirical study on manufacturing industry in Malaysia}, journal = {J. Syst. Inf. Technol.}, volume = {12}, number = {3}, pages = {210--221}, year = {2010}, url = {https://doi.org/10.1108/13287261011070830}, doi = {10.1108/13287261011070830}, timestamp = {Thu, 18 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsit/ZolaitICS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/giq/DzazaliSZ09, author = {Suhazimah Dzazali and Ainin Sulaiman and Ali Hussein Saleh Zolait}, title = {Information security landscape and maturity level: Case study of Malaysian Public Service {(MPS)} organizations}, journal = {Gov. Inf. Q.}, volume = {26}, number = {4}, pages = {584--593}, year = {2009}, url = {https://doi.org/10.1016/j.giq.2009.04.004}, doi = {10.1016/J.GIQ.2009.04.004}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/giq/DzazaliSZ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijbis/DzazaliAZ09, author = {Suhazimah Dzazali and Sulaiman Ainin and Ali Hussein Saleh Zolait}, title = {Employing the social-technical perspective in identifying security management systems in organisations}, journal = {Int. J. Bus. Inf. Syst.}, volume = {4}, number = {4}, pages = {419--439}, year = {2009}, url = {https://doi.org/10.1504/IJBIS.2009.024504}, doi = {10.1504/IJBIS.2009.024504}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijbis/DzazaliAZ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccsecis/ZolaitS08, author = {Ali Hussein Saleh Zolait and Ainin Sulaiman}, title = {Incorporating the Innovation Attributes Introduced by Rogers'Theory into Theory of Reasoned Action: An Examination of Internet Banking Adoption in Yemen}, journal = {Comput. Inf. Sci.}, volume = {1}, number = {1}, pages = {36--51}, year = {2008}, url = {https://doi.org/10.5539/cis.v1n1p36}, doi = {10.5539/CIS.V1N1P36}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccsecis/ZolaitS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.