Papers:
S1: Business Applications
Session Chair: Dr. Yasin Miheisi
Marie Griffiths (University of Salford, United Kingdom); Leena Janahi (University of Salford, UK); Hesham al-Ammal (University of Bahrain, Bahrain) IT Governance from Theory to Practice: The Importance of Accountability http://dx.doi.org/10.14236/ewic/BCSIIT2014.1
Ghassan Kbar (Riyadh Techno Valley-Research Center, Saudi Arabia); Wathiq Mansoor (American University in Dubai, UAE) E-HRM and Outsourcing For Arabic Countries and Large Organisations http://dx.doi.org/10.14236/ewic/BCSIIT2014.2
Siva Sankaran (Charted Membership of BCS, UAE) Is Your IT Investment Adding Value to the Enterprise http://dx.doi.org/10.14236/ewic/BCSIIT2014.3
Ali al-Azzawi (HeiTech International, UAE) User Experience in Arabia: The Business Case for User-Centred Design and Usability Engineering http://dx.doi.org/10.14236/ewic/BCSIIT2014.4
S2: Educational Applications
Session Chair: Dr. Mohammad Saeed
Mustafa Al Emran (The British University in Dubai, UAE); Khaled F. Shaalan (The British University in Dubai & Cairo University, UAE) E-podium Technology: A Medium of Managing Knowledge at Al Buraimi University College via M-learning http://dx.doi.org/10.14236/ewic/BCSIIT2014.5
Salah Al-Khafaji (Sur University College, Oman); Balasubramanian Sriram (Sur University College, Oman) Using Online Learning Resources: A Self Learning Tool http://dx.doi.org/10.14236/ewic/BCSIIT2014.6
Hani Al Chalabi (Al Khawarizmi International College, UAE); Mustafa Al Emran (The British University in Dubai, UAE) Developing an IT Help Desk Troubleshooter Expert System for diagnosing and solving IT Problems http://dx.doi.org/10.14236/ewic/BCSIIT2014.7
Sohail Iqbal (Deakin University, Australia); Roy Mathew (Buraimi University College, Oman); Morshed Chowdhury (Deakin University, Australia); Jo Coldwell Neilson (Deakin University, Australia) Impact of Assurance of Learning (AOL) in Programming Course for Novices http://dx.doi.org/10.14236/ewic/BCSIIT2014.8
M1: Networks and Mobile Applications
Session Chair: Dr. Tahseen Al Doori
Oday Jerew (University Of Canberra, Australia); Kim Blackmore (The Australian National University, Australia); Masoud Mohammadian (Canberra University, Australia) Number of Paths and Neighbours Effect on Multipath Routing in Mobile Ad Hoc Networks http://dx.doi.org/10.14236/ewic/BCSIIT2014.9
Bushra Qayyum (University of Chester, UK); Mohammed Saeed (Al Khawarizmi International College, UAE) Data Aggregation in Wireless Sensor Networks with Minimum Delay and Minimum Use of Energy: A Comparative Study http://dx.doi.org/10.14236/ewic/BCSIIT2014.10
Dongchen Zhang (CCMC, P.R. China); Shoufeng Wang (China Mobile Group Design Institute Co., Ltd., P.R. China); Xiaoyan Xu (CCMC, P.R. China); Xingzheng Li (CCMC, P.R. China); Wenwen Yao (CCMC, P.R. China); Tinglan Wang (CCMC, P.R. China) A Novel Long Term Traffic Forecast Algorithm http://dx.doi.org/10.14236/ewic/BCSIIT2014.11
Saeed Al Mannaee (Khalifa University, UAE); Rashid Al Matar (Khalifa University, UAE); Yousef Al Ahmedi (Khalifa University, UAE); Jamal Zemerly (Khalifa University, UAE); Ahmed Bentiba (Khalifa University, UAE) ICAPS: Intelligent Context Aware Profile Switching http://dx.doi.org/10.14236/ewic/BCSIIT2014.12
David Ming Liu (EBTIC & KHALIFA University, UAE); Benjamin Hirsch (EBTIC & Khalifa University, UAE); Bashir Aden (Health Authority - Abu Dhabi, UAE); Ahmed Mohammad Abdalla (Health Authority - Abu Dhabi, UAE) Mobile Malaria Larval Source Surveillance http://dx.doi.org/10.14236/ewic/BCSIIT2014.13
M2: Security and Imaging Applications
Session Chair: Dr. Thomas Martin
Juha K Mattila (Aalto University, Finland) Protecting National Assets Against Information Operations in Post-modern World http://dx.doi.org/10.14236/ewic/BCSIIT2014.14
Daniel Tse (City University of Hong Kong, Hong Kong); Zihuan LI (City University of Hong Kong, Hong Kong); Ka Fai Wong (City University of Hong Kong, Hong Kong); Yuhui Tao (City University of Hong Kong, Hong Kong); Wei Liu (City University of Hong Kong, Hong Kong); Wai Hou Choi (City University of Hong Kong, Hong Kong) Two-factor Protection Scheme in Securing the Source Code of Android Applications http://dx.doi.org/10.14236/ewic/BCSIIT2014.15
Walid Alakk (Khalifa University, UAE); Hussain Al-Ahmad (Khalifa University) A New Watermarking Algorithm for Scanned Grey PDF Files Using Robust Logo and Hash Function http://dx.doi.org/10.14236/ewic/BCSIIT2014.16
Taha Dawod Jassim (University of Bradford, UK); Hussain Al-Ahmad (Khalifa University, UAE); Raed Abd-Alhameed (University of Bradford, UK); Ahmed Al-Gindy (Computer College, UAE) Two Levels Block Based Wavelet Watermarking Algorithm For Still Colour Images http://dx.doi.org/10.14236/ewic/BCSIIT2014.17