"Interpretation of Information Processing Regulations"
written by Sabah Al-Fedaghi,
published by Journal of Software Engineering and Applications, Vol.2 No.2, 2009
has been cited by the following article(s):
  • Google Scholar
  • CrossRef
[1] Tourism Regional Multiplier Effects in Tanzania: Analysis of Singita Grumeti Reserves Tourism in the Mara Region
Journal of Sustainable Development, 2016
[2] Communication-oriented business model based on flows
International Journal of Business Information Systems, 2014
[3] Technology and online education: Models for change
Contemporary Issues in Education Research (CIER), 2014
[4] Study on Law of European Union
S Ting - hknccp.org, 2014
[5] A Semiotics Approach to Semantic Mismatches
Service Science and Knowledge Innovation, 2014
[6] Communication–oriented business model based on flows
International Journal of Business Information Systems, 2014
[7] A Semiotics Approach to Semantic Mismatches.
2014
[8] Technology and Online Education: Models for Change.
Contemporary Issues in Education Research, 2014
[9] Toward flow-based semantics of activities
Int. J. Software Eng. Appl, 2013
[10] Tourism modelling for the space coast
Tourism As a Challenge, 2013
[11] FLOW-BASED CONCEPTUAL REPRESENTATION OF PROBLEMS.
Journal of Theoretical and Applied Information Technology, 2013
[12] Reconceptualization of Class-based Representation in UML
International Journal of Computer Science Issues(IJCSI), 2012
[13] Reconceptualization of Class onceptualization of Class onceptualization of Class-based Representation Representation Representation in UML
2012
[14] Perceived Privacy
Information Technology: New Generations (ITNG), 2012 Ninth International Conference on. IEEE, 2012
[15] Servant Sustainship Education for Sports Professionalization
CW Cook, I Florida - asbbs.org, 2012
[16] Ability Training Through Partnered Education
International Journal of Education and Information Technologies, 2011
[17] Examining moral judgment and ethical decision-making in information technology managers and their relationship
2010
[18] A Comparative Analysis of Auditing Within the Healthcare Database
2010
[19] Examining Moral Judgment and Ethical Decision-Making in Information Technology Managers and Their Relationship.
University of Phoenix, ProQuest Dissertations Publishing, 2010
[20] Conceptualizing and Generalizing Access Control
Information Science and Applications (ICISA), 2010 International Conference on. IEEE, 2010
[21] System-based approach to software vulnerability
Social Computing (SocialCom), 2010 IEEE Second International Conference on. IEEE, 2010