default search action
Mona A. Mohamed
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j10]Beenish Moalla Chaudhry, Shekufeh Shafeie, Mona A. Mohamed:
Theoretical Models for Acceptance of Human Implantable Technologies: A Narrative Review. Informatics 10(3): 69 (2023) - [c7]Shekufeh Shafeie, Mona A. Mohamed, Tahir Bachar Issa, Beenish Moalla Chaudhry:
Using Machine Learning to Model Potential Users with Health Risk Concerns Regarding Microchip Implants. HCI (41) 2023: 574-592 - 2022
- [j9]Shekufeh Shafeie, Beenish Moalla Chaudhry, Mona A. Mohamed:
Modeling Subcutaneous Microchip Implant Acceptance in the General Population: A Cross-Sectional Survey about Concerns and Expectations. Informatics 9(1): 24 (2022) - 2021
- [j8]Mona M. Alnahari, Joyram Chakraborty, Mona A. Mohamed:
Web Accessibility Research and Practice: The Need for Arabic Web Accessibility Improvement. Int. J. Art Cult. Des. Technol. 10(1): 36-49 (2021) - [j7]Mona A. Mohamed, Tobin E. Porterfield, Joyram Chakraborty:
Cross-cultural effects on graphical password memorability and design. J. Syst. Inf. Technol. 23(1): 82-108 (2021) - [c6]Beenish M. Chaudhry, Dipanwita Dasgupta, Mona A. Mohamed, Nitesh V. Chawla:
Teaching Tablet Technology to Older Adults. HCI (42) 2021: 168-182 - 2020
- [j6]Mona A. Mohamed, Sahar Mohamed Ghanem, Magdy H. Nagi:
Privacy-preserving for distributed data streams: towards l-diversity. Int. Arab J. Inf. Technol. 17(1): 52-64 (2020) - [j5]Mona A. Mohamed, Joyram Chakraborty, Sharma Pillutla:
Effects of culture on graphical password image selection and design. J. Syst. Inf. Technol. 22(1): 73-95 (2020) - [c5]Mona A. Mohamed:
Modeling of Subcutaneous Implantable Microchip Intention of Use. IHSI 2020: 842-847
2010 – 2019
- 2019
- [j4]Zhan-Hong Li, Mona A. Mohamed, A. M. Vinu Mohan, Zhigang Zhu, Vinay Sharma, Geetesh K. Mishra, Rupesh K. Mishra:
Application of Electrochemical Aptasensors toward Clinical Diagnostics, Food, and Environmental Monitoring: Review. Sensors 19(24): 5435 (2019) - [c4]Mona A. Mohamed:
The Effects of Culture on Authentication Cognitive Dimensions. IHSI 2019: 37-42 - 2018
- [c3]Mona A. Mohamed, Joyram Chakraborty, Josh Dehlinger:
The Role of Mental Model in Graphical Password Selection and Design. IHSI 2018: 608-613 - 2017
- [j3]Mona A. Mohamed, Joyram Chakraborty, Josh Dehlinger:
Trading off usability and security in user interface design through mental models. Behav. Inf. Technol. 36(5): 493-516 (2017) - 2016
- [c2]Sujan Shrestha, Joyram Chakraborty, Mona A. Mohamed:
A comparative pilot study of historical artifacts in a CAVE automatic virtual reality environment versus paper-based artifacts. MobileHCI Adjunct 2016: 968-977 - 2014
- [j2]Sahar Mohamed Ghanem, Mona A. Mohamed, Magdy H. Nagi:
Towards robust classifiers using optimal rule discovery. Int. J. Data Min. Model. Manag. 6(3): 261-284 (2014) - 2011
- [c1]Sahar Mohamed Ghanem, Mona A. Mohamed, Magdy H. Nagi:
EDP-ORD: Efficient distributed/parallel Optimal Rule Discovery. ISCC 2011: 956-963 - 2010
- [j1]Mirghani S. Mohamed, Mona A. Mohamed, Kevin J. O'Sullivan:
Information and Communication Technology (ICT) Policy: A Quantitative Assessment for Sustainable Development. J. Inf. Knowl. Manag. 9(3): 227-239 (2010)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-06-24 20:08 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint