


default search action
Mahmood Hussain Shah
Person information
- affiliation: Coventry University, Business School, UK
- affiliation (former): University of Central Lancashire, Lancashire Business School, Preston, UK
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2024
- [j24]Atika Ahmad Kemal
, Mahmood Hussain Shah
:
Digital innovation in social cash organizations - the effects of the institutional interactions for transforming organizational practices. Inf. Technol. People 37(5): 2092-2126 (2024) - 2022
- [j23]Sheshadri Chatterjee
, Ranjan Chaudhuri
, Mahmood Hussain Shah
, Pratik Maheshwari
:
Big data driven innovation for sustaining SME supply chain operation in post COVID-19 scenario: Moderating role of SME technology leadership. Comput. Ind. Eng. 168: 108058 (2022) - [j22]Mansour Naser Alraja
, Rabia Imran
, Basel Khashab, Mahmood Hussain Shah
:
Technological Innovation, Sustainable Green Practices and SMEs Sustainable Performance in Times of Crisis (COVID-19 pandemic). Inf. Syst. Frontiers 24(4): 1081-1105 (2022) - 2021
- [j21]Nisreen Ameen, Ali Tarhini
, Mahmood Hussain Shah
, Nnamdi O. Madichie
, Justin Paul
, Jyoti Choudrie:
Keeping customers' data secure: A cross-cultural study of cybersecurity compliance among the Gen-Mobile workforce. Comput. Hum. Behav. 114: 106531 (2021) - [j20]Saqib Shamim
, Yumei Yang
, Najam Ul Zia
, Mahmood Hussain Shah
:
Big data management capabilities in the hospitality sector: Service innovation and customer generated online quality ratings. Comput. Hum. Behav. 121: 106777 (2021) - [j19]Zahoor Ahmed Soomro
, Mahmood Hussain Shah
, Jason Thatcher
:
A framework for ID fraud prevention policies in E-tailing sector. Comput. Secur. 109: 102403 (2021) - [j18]Mahmoud Maqableh
, Zaid Obeidat, Ahmad M. Obeidat
, Mais Jaradat, Mahmood Hussain Shah
, Ra'ed Masa'deh
:
Examining the Determinants of Facebook Continuance Intention and Addiction: The Moderating Role of Satisfaction and Trust. Informatics 8(3): 62 (2021) - 2020
- [j17]Nisreen Ameen
, Ali Tarhini
, Mahmood Hussain Shah
, Nnamdi O. Madichie
:
Employees' behavioural intention to smartphone security: A gender-based, cross-national study. Comput. Hum. Behav. 104: 106184 (2020) - 2019
- [j16]Nisreen Ameen, Robert Willis, Media Noori Abdullah, Mahmood Hussain Shah
:
Towards the successful integration of e-learning systems in higher education in Iraq: A student perspective. Br. J. Educ. Technol. 50(3): 1434-1446 (2019) - [j15]Mahmood Hussain Shah
, Paul Jones
, Jyoti Choudrie:
Cybercrimes prevention: promising organisational practices. Inf. Technol. People 32(5): 1125-1129 (2019) - [j14]Abdullah Maitlo, Nisreen Ameen, Hamid Reza Peikari, Mahmood Hussain Shah
:
Preventing identity theft. Inf. Technol. People 32(5): 1184-1214 (2019) - [j13]Zahoor Ahmed Soomro
, Javed Ahmed, Mahmood Hussain Shah
, Khalil Khoumbati:
Investigating identity fraud management practices in e-tail sector: a systematic review. J. Enterp. Inf. Manag. 32(2): 301-324 (2019) - [j12]Mahmood Hussain Shah
, Abdullah Maitlo, Paul Jones
, Yahaya Y. Yusuf:
An investigation into agile learning processes and knowledge sharing practices to prevent identity theft in the online retail organisations. J. Knowl. Manag. 23(9): 1857-1884 (2019) - 2018
- [j11]Nisreen Ameen, Robert Willis, Mahmood Hussain Shah
:
An examination of the gender gap in smartphone adoption and use in Arab countries: A cross-national study. Comput. Hum. Behav. 89: 148-162 (2018) - [j10]Hamid Reza Peikari, Thurasamy Ramayah
, Mahmood Hussain Shah
, Lo May Chiun
:
Patients' perception of the information security management in health centers: the role of organizational and human factors. BMC Medical Informatics Decis. Mak. 18(1): 102:1-102:13 (2018) - 2016
- [j9]Zahoor Ahmed Soomro
, Mahmood Hussain Shah
, Javed Ahmed:
Information security management needs more holistic approach: A literature review. Int. J. Inf. Manag. 36(2): 215-225 (2016) - 2014
- [j8]Mahmood Hussain Shah
, Hamid Reza Peikari, Norjaya Mohd Yasin:
The determinants of individuals' perceived e-security: Evidence from Malaysia. Int. J. Inf. Manag. 34(1): 48-57 (2014) - [j7]Mahmood Hussain Shah
, Nevena Rahneva, Rizwan Ahmed:
Knowledge Management Practice at a Bulgarian Bank: A Case Study. Int. J. Knowl. Manag. 10(3): 54-69 (2014) - 2009
- [j6]Mahmood Hussain Shah
, Mohammad Mohsin, Zaigham Mohmood, Romana Aziz:
Organisational Barriers in Offering E-Banking. J. Electron. Commer. Organ. 7(2): 67-82 (2009) - 2008
- [j5]Rizwan Ahmed, Tracy Hall
, Paul Wernick, Stewart Robinson
, Mahmood Hussain Shah
:
Software process simulation modelling: A survey of practice. J. Simulation 2(2): 91-102 (2008) - 2007
- [j4]Mahmood Hussain Shah
, Ashley Braganza, Vincenzo Morabito:
A survey of critical success factors in e-Banking: an organisational perspective. Eur. J. Inf. Syst. 16(4): 511-524 (2007) - [j3]Haroun Alryalat, Yogesh Kumar Dwivedi
, Jasna Kuljis, Ray J. Paul, Mahmood Hussain Shah
:
An overview of online stock trading: history, characteristics, opportunities, challenges and the impact of the SEC regulation reform on trading structure. Int. J. Bus. Inf. Syst. 2(1): 58-74 (2007) - [j2]Khalil Khoumbati, Syed Ghulam Sarwar Shah, Yogesh Kumar Dwivedi
, Mahmood Hussain Shah:
Evaluation of investment for enterprise application integration technology in healthcare organisations: a cost-benefit approach. Int. J. Electron. Heal. 3(4): 453-467 (2007) - 2006
- [j1]Mahmood Hussain Shah
, Feroz Ahmed Siddiqui:
Organisational critical success factors in adoption of e-banking at the Woolwich bank. Int. J. Inf. Manag. 26(6): 442-456 (2006)
Conference and Workshop Papers
- 2022
- [c5]Asad Raza
, Shahzad Memon, Muhammad Ali Nizamani, Mahmood Hussain Shah
:
Machine Learning-Based Security Solutions for Critical Cyber-Physical Systems. ISDFS 2022: 1-6 - 2020
- [c4]Mahmood Hussain Shah, Raza Muhammad, Nisreen Ameen:
Cybersecurity Readiness of E-tail Organisations: A Technical Perspective. I3E (1) 2020: 153-160 - 2011
- [c3]Mahmood Hussain Shah
, Romanus Izuchukwu Okeke:
A Framework for Internal Identity Theft Prevention in Retail Industry. EISIC 2011: 366-371 - 2009
- [c2]Marion Schulze, Mahmood Hussain Shah
:
The Step Method - Battling Identity Theft Using E-Retailers' Websites. I3E 2009: 173-183 - 2005
- [c1]Guy Saward, Mahmood Hussain Shah
, Tracy Hall:
Using Existing Website Ontologies to Assist Navigation and Exploration. AWIC 2005: 387-393
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-21 00:15 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint