Follow
Bobby Swar
Bobby Swar
Concordia University of Edmonton
Verified email at concordia.ab.ca
Title
Cited by
Cited by
Year
Social media risks and benefits: A public sector perspective
GF Khan, B Swar, SK Lee
Social science computer review 32 (5), 606-627, 2014
3142014
Information overload, psychological ill-being, and behavioral intention to continue online healthcare information search
B Swar, T Hameed, I Reychav
Computers in human behavior 70, 416-425, 2017
3022017
Determinants of relationship quality for IS/IT outsourcing success in public sector
B Swar, J Moon, J Oh, C Rhee
Information Systems Frontiers 14, 457-475, 2012
1402012
Fear of missing out, social media engagement, smartphone addiction and distraction: Moderating role of self-help mobile apps-based interventions in the youth
B Swar, T Hameed
International Conference on Health Informatics 6, 139-146, 2017
832017
A socio-technical perspective on e-government issues in developing countries: A scientometrics approach
GF Khan, J Moon, HW Park, B Swar, JJ Rho
Scientometrics 87 (2), 267-286, 2011
702011
E-government service use intentions in Afghanistan: technology adoption and the digital divide in a war-torn country
GF Khan, J Moon, B Swar, H Zo, JJ Rho
Information Development 28 (4), 281-299, 2012
592012
Innovation in IT outsourcing relationships: where is the best practice of IT outsourcing in the public sector?
J Moon, B Swar, Y Chan Choe, M Chung, G Hyun Jung
Innovation 12 (2), 217-226, 2010
562010
IT outsourcing success in the public sector: Lessons from e-government practices in Korea
J Moon, YC Choe, M Chung, GH Jung, B Swar
Information Development 32 (2), 142-160, 2016
482016
Mapping ICT knowledge infrastructure in South Asia
B Swar, GF Khan
Scientometrics 99 (1), 117-137, 2014
402014
Analysis of scada security using penetration testing: A case study on modbus tcp protocol
J Luswata, P Zavarsky, B Swar, D Zvabva
2018 29th Biennial symposium on communications (BSC), 1-5, 2018
362018
Deep packet inspection in industrial automation control system to mitigate attacks exploiting modbus/TCP vulnerabilities
ON Nyasore, P Zavarsky, B Swar, R Naiyeju, S Dabra
2020 IEEE 6th Intl Conference on Big Data Security on Cloud (BigDataSecurity …, 2020
312020
An analysis of the information technology outsourcing domain: A social network and Triple helix approach
B Swar, GF Khan
Journal of the American Society for Information Science and Technology 64 …, 2013
282013
A survey on the impacts of quantum computers on information security
M Njorbuenwu, B Swar, P Zavarsky
2019 2nd International conference on data intelligence and security (ICDIS …, 2019
182019
Security audit of docker container images in cloud architecture
WSS Ahamed, P Zavarsky, B Swar
2021 2nd International Conference on Secure Cyber Computing and …, 2021
172021
Prevention of ransomware execution in enterprise environment on windows os: Assessment of application whitelisting solutions
H Turaev, P Zavarsky, B Swar
2018 1st International Conference on Data Intelligence and Security (ICDIS …, 2018
172018
A vulnerability study of Mhealth chronic disease management (CDM) applications (apps)
T Mabo, B Swar, S Aghili
Trends and Advances in Information Systems and Technologies: Volume 1 6, 587-598, 2018
162018
LMS implementation in startup institutions: Case study of three projects
S Butakov, O Solodky, B Swar
Learning Management Systems and instructional design: Best practices in …, 2013
132013
Public sectors’ perception on critical relationship factors in IS/IT outsourcing: analysis of the literature and a Delphi examination
B Swar, J Moon, GF Khan
International Journal of Services Technology and Management 17 (1), 1-21, 2012
132012
Knowledge extraction and integration for information gathering in penetration testing
A Kothia, B Swar, F Jaafar
2019 IEEE 19th International Conference on Software Quality, Reliability and …, 2019
102019
Government 2.0: Utilization model, implementation scenarios, and relationships
GF Khan, B Swar
Pre-ECIS (21st European Conference on Information Systems) workshop: E …, 2013
92013
The system can't perform the operation now. Try again later.
Articles 1–20