default search action
Sameera Mubarak
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j9]Gopi Krishna Akella, Santoso Wibowo, Srimannarayana Grandhi, Sameera Mubarak:
A Systematic Review of Blockchain Technology Adoption Barriers and Enablers for Smart and Sustainable Agriculture. Big Data Cogn. Comput. 7(2): 86 (2023) - [c25]Santoso Wibowo, Rongbin Yang, Sameera Mubarak, Lillian Peiwen Li:
Exploring Privacy Concerns, Privacy Risks and Benefits on Users' Trust and Engagement in Continual Use of Service Robots. AMCIS 2023 - [c24]Sabbir Ahmed, Sameera Mubarak, Santoso Wibowo, Jia Tina Du:
Data Analytics Framework for Smart Waste Management Optimisation: A Key to Sustainable Future for Councils and Communities. DEXA (2) 2023: 134-139 - [c23]Fatima Tabassum, Sameera Mubarak, Lin Liu, Jia Tina Du:
How Many Features Do We Need to Identify Bots on Twitter? iConference (1) 2023: 312-327 - [c22]Haneen Heyasat, Sameera Mubarak, Nina Evans:
Security Culture and Security Education, Training and Awareness (SETA) Influencing Information Security Management. ICR 2023: 332-343 - [c21]Rongbin Yang, Santoso Wibowo, Sameera Mubarak:
An Investigation into Domestic Violence Victims' Adoption of Chatbots for Help-seeking: Based on the UTAUT2 and Health Belief Models. PACIS 2023: 31 - 2022
- [c20]Rongbin Yang, Santoso Wibowo, Sameera Mubarak, Mubarak Ali Rahamathulla:
How do students' personality traits affect their academic performance and stickiness towards e-learning?: The moderating effect of students' engagement. PACIS 2022: 48 - 2021
- [j8]Baber Majid Bhatti, Sameera Mubarak, Sev V. Nagalingam:
Information security implications of using NLP in IT outsourcing: a Diffusion of Innovation theory perspective. Autom. Softw. Eng. 28(2): 12 (2021) - [c19]Sameera Mubarak, Mubarak Ali Rahamathulla, Santoso Wibowo, Rongbin Yang:
Contributions of Guest Speakers to Online Delivery of IT Program. ACIS 2021: 5 - [c18]Baber Majid Bhatti, Sameera Mubarak, Sev V. Nagalingam:
Factors Impacting Information Security Risk Management in IT Outsourcing: An Agency Theory Perspective. PACIS 2021: 16 - [c17]Rongbin Yang, Sameera Mubarak, Santoso Wibowo, Mubarak Ali Rahamathulla:
Assessing the Effects of Perceived Qualities on E-learning Students' Attitude, Learning Engagement, and Stickiness During COVID-19. PACIS 2021: 204 - [c16]Gopi Krishna Akella, Santoso Wibowo, Srimannarayana Grandhi, Sameera Mubarak:
Design of a Blockchain-based Decentralized Architecture for Sustainable Agriculture : Research-in-Progress. SERA 2021: 102-107 - 2020
- [c15]Santoso Wibowo, Srimannarayana Grandhi, Sophia Xiaoxia Duan, Sameera Mubarak:
Trust-Building Framework for Blockchain Technology Adoption: The Moderating Role of Quality Practices. ACIS 2020: 90 - [c14]Baber Majid Bhatti, Sameera Mubarak, Sev V. Nagalingam:
Information Security Implications of Machine-Learning-Based Automation in ITO Service Delivery - An Agency Theory Perspective. ICONIP (2) 2020: 487-498 - [c13]Baber Majid Bhatti, Sameera Mubarak, Sev V. Nagalingam:
NLP-based enhancement of information security in ITO: a diffusion of innovation theory perspective. ASE Workshops 2020: 112-117 - [c12]Santoso Wibowo, Sameera Mubarak:
Exploring Stakeholders Perceived Risk and Trust Towards their Intention to Adopt Cloud Computing: A Theoretical Framework. PACIS 2020: 1
2010 – 2019
- 2019
- [c11]Sameera Mubarak, Haneen Heyasat, Santoso Wibowo:
Information Security Models are a Solution or Puzzle for SMEs? A Systematic Literature Review. ACIS 2019: 15 - [c10]Haneen Heyasat, Sameera Mubarak, Nina Evans:
A Framework for Information Security Management in Capital Markets. PACIS 2019: 20 - 2018
- [j7]Alireza Heravi, Sameera Mubarak, Kim-Kwang Raymond Choo:
Information privacy in online social networks: Uses and gratification perspective. Comput. Hum. Behav. 84: 441-459 (2018) - 2017
- [j6]Brett Eterovic-Soric, Kim-Kwang Raymond Choo, Helen Ashman, Sameera Mubarak:
Stalking the stalkers - detecting and deterring stalking behaviours using technology: A review. Comput. Secur. 70: 278-289 (2017) - [c9]Baber Majid Bhatti, Sameera Mubarak, Sev V. Nagalingam:
A Framework for Information Security Risk Management in IT Outsourcing. ACIS 2017: 98 - [c8]Alireza Heravi, Deepa Mani, Kim-Kwang Raymond Choo, Sameera Mubarak:
Making Decisions about Self-Disclosure in Online Social Networks. HICSS 2017: 1-10 - 2016
- [j5]Sameera Mubarak:
Developing a theory-based information security management framework for human service organizations. J. Inf. Commun. Ethics Soc. 14(3): 254-271 (2016) - [i2]Alireza Heravi, Sameera Mubarak, Kim-Kwang Raymond Choo:
Online Social Networking Has a Greater Effect on Others than on Me: A Third-Person Effect Perspective. CoRR abs/1605.04723 (2016) - [i1]Sameera Mubarak, Mubarak Ali Rahamathulla:
Online self-disclosure and wellbeing of adolescents: A systematic literature review. CoRR abs/1606.03527 (2016) - 2015
- [j4]Brenton Borgman, Sameera Mubarak, Kim-Kwang Raymond Choo:
Cyber security readiness in the South Australian Government. Comput. Stand. Interfaces 37: 1-8 (2015) - [c7]Alireza Heravi, Sameera Mubarak, Kim-Kwang Raymond Choo:
Online Social Networking Has a Greater Effect on Others than on Me: A Third-Person Effect Perspective. ACIS 2015: 91 - [c6]Kim-Kwang Raymond Choo, Alireza Heravi, Deepa Mani, Sameera Mubarak:
Employees' Intended Information Security Behaviour in Real Estate Organisations: a Protection Motivation Perspective. AMCIS 2015 - [c5]Deepa Mani, Alireza Heravi, Kim-Kwang Raymond Choo, Sameera Mubarak:
Information Privacy Concerns of Real Estate Customers and Information Security in the Real Estate Industry: an Empirical Analysis. AISC 2015: 53-56 - [c4]Sameera Mubarak, Deepa Mani:
Adolescents' Safe Online Behaviour: A Multi-Factor Analysis Based on Social Cognitive Theory. PACIS 2015: 239 - 2014
- [j3]Deepa Mani, Kim-Kwang Raymond Choo, Sameera Mubarak:
Information security in the South Australian real estate industry: A study of 40 real estate organisations. Inf. Manag. Comput. Secur. 22(1): 24-41 (2014) - [c3]Deepa Mani, Sameera Mubarak, Kim-Kwang Raymond Choo:
Understanding the Information Security Awareness Process in Real Estate Organizations Using the SECI Model. AMCIS 2014 - 2010
- [j2]Sameera Mubarak:
Trust Account Fraud And Effective Information Security Management. J. Digit. Forensics Secur. Law 5(3): 57-72 (2010)
2000 – 2009
- 2009
- [j1]Sameera Mubarak, Jill Slay:
Protecting clients from insider attacks on trust accounts. Inf. Secur. Tech. Rep. 14(4): 202-212 (2009) - 2007
- [c2]Sameera Mubarak:
A Critical Analysis on Theoretical Perspectives of Teaching Information Security in Tertiary Education. ACIS 2007 - 2006
- [c1]Sameera Mubarak, Jill Slay:
An explorative study on information security of trust accounts within law firms in South Australia: Implications for IT security management. ICDIM 2006: 55-62
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-05-24 20:13 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint