Get my own profile
Public access
View all0 articles
1 article
available
not available
Based on funding mandates
Co-authors
Amine BELHADIAssociate Professor, Rabat Business School, MoroccoVerified email at uir.ac.ma
Anass SebbarUniversité Internationale de RabatVerified email at ieee.org
Mohammed BoulmalfProfessor of Computer Science, International University of RabatVerified email at uir.ac.ma
SACHIN KAMBLEFull Professor, EDHEC Business School, FranceVerified email at edhec.edu
Mustapha OudaniInternational University of RabatVerified email at uir.ac.ma
youssef baddiUniversity Chouaib DoukkaliVerified email at ucd.ac.ma
Mohamed Dafir ECH-CHERIF EL KET...Mohammed V University in RabatVerified email at um5.ac.ma
Anass CherrafiCadi Ayyad UniversityVerified email at uca.ac.ma
Oumaima FADIDoctorante à l'Université Internationale de RabatVerified email at uir.ac.ma
Mounir GhoghoUniversité Internationale de RabatVerified email at uir.ac.ma
Abdul Rehman KhanXuzhou University of TechnologyVerified email at xzit.edu.cn
Houda BenbrahimENSIAS, Mohammed V University in RabatVerified email at um5.ac.ma
Angappa GunasekaranProfessor of Operations Management, School of Business Administration, Penn State HarrisburgVerified email at psu.edu
Yassine MALEHProfessor of Cybersecurity & IT Governance | SMIEEE | Double PhD in Cybersecurity & IT ManagementVerified email at usms.ma
youness moukafihPhD student at International university of Rabat, University of LorraineVerified email at uir.ac.ma
Ghita MezzourData in Seconds (DASEC)Verified email at dasec.ma
Prof Shari M. YusofMeiji University, Universiti Teknologi Malaysia, University of BirminghamVerified email at utm.my
Ghizlane OrhanouFacuty of Sciences, Mohammed V University in Rabat
Kannan GovindanEIC- CLSCN, Asso Editor - TRE & Exec- Editor (JCLP), Director & CSORSC, University of Adelaide, SDUVerified email at adelaide.edu.au