Search Results - "Aljedaani, Bakheet"

  • Showing 1 - 10 results of 10
Refine Results
  1. 1

    Challenges With Developing Secure Mobile Health Applications: Systematic Review by Aljedaani, Bakheet, Babar, M Ali

    Published in JMIR mHealth and uHealth (21-06-2021)
    “…Background Mobile health (mHealth) apps have gained significant popularity over the last few years due to their tremendous benefits, such as lowering health…”
    Get full text
    Journal Article
  2. 2

    End-users’ knowledge and perception about security of clinical mobile health apps: A case study with two Saudi Arabian mHealth providers by Aljedaani, Bakheet, Ahmad, Aakash, Zahedi, Mansooreh, Babar, M. Ali

    Published in The Journal of systems and software (01-01-2023)
    “…Mobile health apps (mHealth apps) are being increasingly adopted in the healthcare sector, enabling stakeholders such as medics and patients, to utilize health…”
    Get full text
    Journal Article
  3. 3

    An empirical study on secure usage of mobile health apps: The attack simulation approach by Aljedaani, Bakheet, Ahmad, Aakash, Zahedi, Mansooreh, Babar, Muhammad Ali

    Published in Information and software technology (01-11-2023)
    “…•The study investigated conducted an empirical study to monitor and analyze the actions and behaviors of mHealth app users – relying on an attack simulation…”
    Get full text
    Journal Article
  4. 4

    An Empirical Study on Developing Secure Mobile Health Apps: The Developers' Perspective by Aljedaani, Bakheet, Ahmad, Aakash, Zahedi, Mansooreh, Babar, M. Ali

    “…Mobile apps exploit embedded sensors and wireless connectivity of a device to empower users with portable computations, context-aware communication, and…”
    Get full text
    Conference Proceeding
  5. 5

    Challenges in Developing Secure Mobile Health Applications, A Systematic Review by Aljedaani, Bakheet, Babar, M. Ali

    Published 21-07-2020
    “…Mobile health (mHealth) applications (apps) have gained significant popularity over the last few years due to its tremendous benefits, such as lowering…”
    Get full text
    Journal Article
  6. 6

    An Empirical Study on Secure Usage of Mobile Health Apps: The Attack Simulation Approach by Aljedaani, Bakheet, Ahmad, Aakash, Zahedi, Mansooreh, Babar, M. Ali

    Published 14-11-2022
    “…Mobile applications, mobile apps for short, have proven their usefulness in enhancing service provisioning across a multitude of domains that range from smart…”
    Get full text
    Journal Article
  7. 7

    An Exploration Study on Developing Blockchain Systems the Practitioners Perspective by Aljedaani, Bakheet, Ahmad, Aakash, Fahmideh, Mahdi, Khan, Arif Ali, Shen, Jun

    Published 25-07-2024
    “…Context: Blockchain-based software (BBS) exploits the concepts and technologies popularized by cryptocurrencies offering decentralized transaction ledgers with…”
    Get full text
    Journal Article
  8. 8

    End-Users' Knowledge and Perception about Security of Mobile Health Apps: A Case Study with Two Saudi Arabian mHealth Providers by Aljedaani, Bakheet, Ahmad, Aakash, Zahedi, Mansooreh, Babar, M. Ali

    Published 25-01-2021
    “…Mobile health applications (mHealth apps for short) are being increasingly adopted in the healthcare sector, enabling stakeholders such as governments, health…”
    Get full text
    Journal Article
  9. 9

    Security Awareness of End-Users of Mobile Health Applications: An Empirical Study by Aljedaani, Bakheet, Ahmad, Aakash, Zahedi, Mansooreh, Babar, M. Ali

    Published 29-08-2020
    “…Mobile systems offer portable and interactive computing, empowering users, to exploit a multitude of context-sensitive services, including mobile healthcare…”
    Get full text
    Journal Article
  10. 10

    An Empirical Study on Developing Secure Mobile Health Apps: The Developers Perspective by Aljedaani, Bakheet, Ahmad, Aakash, Zahedi, Mansooreh, Babar, M. Ali

    Published 07-08-2020
    “…Mobile apps exploit embedded sensors and wireless connectivity of a device to empower users with portable computations, context-aware communication, and…”
    Get full text
    Journal Article