@inproceedings{TaherdoostM09, title = {An examination of smart card technology acceptance using adoption model}, author = {Hamed Taherdoost and Maslin Masrom}, year = {2009}, doi = {10.1109/ITI.2009.5196103}, url = {http://dx.doi.org/10.1109/ITI.2009.5196103}, researchr = {https://researchr.org/publication/TaherdoostM09}, cites = {0}, citedby = {0}, pages = {329-334}, booktitle = {Proceedings of the ITI 2009 31st International Conference on Information Technology Interfaces, Cavtat/Dubrovnik, Croatia, June 22-25, 2009}, editor = {Vesna Luzar-Stiffler and Iva Jarec and Zoran Bekic}, publisher = {IEEE}, isbn = {978-953-7138-15-8}, } @inproceedings{TaherdoostNM09, title = {Development a Smart Card Acceptance Model from Ethical Perspective}, author = {Hamed Taherdoost and Meysam Namayandeh and Maslin Masrom}, year = {2009}, tags = {meta-model, model-driven development, Meta-Environment}, researchr = {https://researchr.org/publication/TaherdoostNM09}, cites = {0}, citedby = {0}, pages = {235-239}, booktitle = {Proceedings of the 2009 International Conference on Frontiers in Education: Computer Science & Computer Engineering, FECS 2009, July 13-16, 2009, Las Vegas Nevada, USA}, editor = {Hamid R. Arabnia and Azita Bahrami and Victor A. Clincy}, publisher = {CSREA Press}, isbn = {1-60132-104-X}, } @inproceedings{NamayandehTJ10, title = {Computer Ethics - Review of Global Perspective}, author = {Meysam Namayandeh and Hamed Taherdoost and Neda Jalaliyoon}, year = {2010}, tags = {reviewing}, researchr = {https://researchr.org/publication/NamayandehTJ10}, cites = {0}, citedby = {0}, pages = {368-374}, booktitle = {Proceedings of the 2010 International Conference on Security & Management, SAM 2010, July 12-15, 2010, Las Vegas Nevada, USA, 2 Volumes}, editor = {Hamid R. Arabnia and Kevin Daimi and Michael R. Grimaila and George Markowsky and Selim Aissi and Victor A. Clincy and Leonidas Deligiannidis and Donara Gabrielyan and Gevorg Margarov and Ashu M. G. Solo and Craig Valli and Patricia A. H. Williams}, publisher = {CSREA Press}, isbn = {1-60132-163-5}, } @inproceedings{ZamaniMAJTZ09, title = {A secure audio steganography approach}, author = {Mazdak Zamani and Azizah Bt Abdul Manaf and Rabiah Bt Ahmad and Farhang Jaryani and Hamed Taherdoost and Akram M. Zeki}, year = {2009}, url = {http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=5402644}, tags = {systematic-approach}, researchr = {https://researchr.org/publication/ZamaniMAJTZ09}, cites = {0}, citedby = {0}, pages = {1-6}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, ICITST 2009, London, UK, November 9-12, 2009}, publisher = {IEEE}, }