Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Association of Arab Universities

Journal

Discipline
Keyword
Publication Year
Publication

Articles 1 - 30 of 189

Full-Text Articles in Entire DC Network

Workplace Bullying And Its Relation To Anxiety About Professional Futureالتنمر الوظيفي وعلاقته بقلق المستقبل المهني دراسة ميدانية على عينة من العاملين في جامعة دمشق, Ezzat Arabe Katbee Aug 2024

Workplace Bullying And Its Relation To Anxiety About Professional Futureالتنمر الوظيفي وعلاقته بقلق المستقبل المهني دراسة ميدانية على عينة من العاملين في جامعة دمشق, Ezzat Arabe Katbee

Association of Arab Universities Journal for Education and Psychology

This research aims to identify the relationship between workplace bullying and anxiety about professional among a sample of Damascus university employees. The sample consists of 500 employees, (235) females and (265) males.The results came as follows:There is a significant statically relation between workplace bullying and anxiety about professional among the sample.There are no significant statically differences in the scores of the sample at anxiety about professional future questionnaire according to the gender variable.There are significant statically differences in the scores of the sample at questionnaire according to the gender variable. workplace bullyingTo investigate the hypotheses the researcher used workplace bullying …


The Extent Teacher Of History In Public Schools In Ajloun Governorate Utilize Ict In The Application Of The Udl From Their Perspective, Fatima Al-Momani Jul 2024

The Extent Teacher Of History In Public Schools In Ajloun Governorate Utilize Ict In The Application Of The Udl From Their Perspective, Fatima Al-Momani

Jordan Journal of Applied Science-Humanities Series

This study aimed to identify the extent teacher of history in public schools in Ajloun Governorate utilize ICT (information and communications technology) in the application of the UDL (Universal Design for Learning) from their perspective, the study used the descriptive survey approach, questionnaire has been used, the sample of study consisted of (77) female and male teachers. However, the finding of study showed that the degree of the extent teacher of history in public schools in Ajloun Governorate utilize ICT in the application of the UDL from their perspective was moderated at the domain level; the field of "application the …


Securing Body Area Networks With Fingerprint Cryptography And Authentication In Manet, Alaa M. Elbanaa, Roayat Ismail Abdelfatah, Mohamed E. Nasr Jul 2024

Securing Body Area Networks With Fingerprint Cryptography And Authentication In Manet, Alaa M. Elbanaa, Roayat Ismail Abdelfatah, Mohamed E. Nasr

Journal of Engineering Research

Standard MANETs face issues like incorrect transmission and vulnerability to unauthorized node access, posing significant security concerns, especially regarding authentication procedures. To address these challenges, researchers are exploring innovative approaches to enhance authentication mechanisms within MANETs. In this paper, we present a novel solution integrating a Body Area Network (BAN) scheme to capture biomedical data from sensors such as ECG and EEG, facilitating data transmission across MANETs. Furthermore, we employ a hybrid Elgamal algorithm for encrypting biomedical data, bolstered by fingerprint biometrics to fortify the cryptographic process, enhancing network security. Additionally, we conduct comparative analyses, exploring different key sizes and …


Online Self-Presentation And Its Relationship To The Level Of Exposure To Cyber-Harassment Among A Sample Of The University Of Jordan Students, Randah Odeh Barakat, Islam F. Alzu'bi Jul 2024

Online Self-Presentation And Its Relationship To The Level Of Exposure To Cyber-Harassment Among A Sample Of The University Of Jordan Students, Randah Odeh Barakat, Islam F. Alzu'bi

An-Najah University Journal for Research - B (Humanities)

The study aimed to identify the level of online self-presentation and its relationship to the level of exposure to cyber-harassment among a sample of the University of Jordan students consisting of (385) male and female bachelor's students from the Faculty of Arts. The questionnaires that are built for the level of online self-presentation and level of exposure to cyber-harassment were constructed and evaluated for their validity and reliability. The results indicated that the level of online self-presentation and the level of exposure to cyber-harassment among students were moderate, the level of online self-presentation was positively correlated with the level of …


واقع الإدمان السلوكي, Rouba Awad Jun 2024

واقع الإدمان السلوكي, Rouba Awad

Al Jinan الجنان

This study aimed to focus on the reality of online behavioral addiction among the teenagers at the Technical Industrial Institute seeking to know the extent of their addiction, where the description survey method was used, and the study sample considered of (407). This study was used addiction behavioral scale according to cognitive behavioral “Davis” model for Generalized Problematic Internet Use Scale2 (GPIUS2), where the study found that the five fields are below the average which indicates the disagree of sample’s tendency about online behavioral addiction.


درجة وعي المعلمين بالأمن السيبراني, Khaled Suleiman Samhan Alshwarh Jun 2024

درجة وعي المعلمين بالأمن السيبراني, Khaled Suleiman Samhan Alshwarh

Journal of the Association of Arab Universities for Research in Higher Education (مجلة اتحاد الجامعات العربية (للبحوث في التعليم العالي

هدف المقال التعرف على درجة وعي المعلمين بالأمن السيبراني من خلال بيان مدى إدراك المعلمين لمفاهيم الأمن السيبراني من وجهة نظرهم، وتوضيح دور الإدارة المدرسية في نشر ثقافة الأمن السيبراني لدى الطلبة من وجهة نظر المعلمين، وبيان معوقات نشر ثقافة الأمن السيبراني في المدارس الأردنية من وجهة نظر المعلمين، والتحقق من وجود فروق ذات دلالة إحصائية عند مستوى الدلالة (a≤0.05) لدرجة وعي المعلمين بالأمن السيبراني تعزى للمتغيرات الديمغرافية لعينة الدراسة. ولتحقيق هذه الأهداف، تم استخدام المنهج الوصفي التحليلي. وتم توزيع استبانة الدراسة التي احتوت على 28 فقرة على (809) معلماً ومعلمة تمّ اختيارهم بالطريقة العشوائية الطبقية من مدارس مديرية تربية …


واقع حرية الرأي والتعبير في منصات التواصل الاجتماعي لدى المستخدم الفلسطيني, Nadeen Hani Khalil Husary Jun 2024

واقع حرية الرأي والتعبير في منصات التواصل الاجتماعي لدى المستخدم الفلسطيني, Nadeen Hani Khalil Husary

Journal of the Association of Arab Universities for Research in Higher Education (مجلة اتحاد الجامعات العربية (للبحوث في التعليم العالي

هدف المقال بيان أهمية توجيه دور منصات التواصل الاجتماعي في إبراز الحق في حرية التعبير عن الرأي لدى المستخدم الفلسطيني في ظل الاحتلال الإسرائيلي، عبر التداول الرقمي والسردية للأحداث في فلسطين، وما نتج عن ممارسة هذا الحق من تقييد للحريات، وفرض عقوبات، واعتقالات، واتهامات بحق المستخدمين والناشطين الفلسطينيين. واعتمدت الدراسة على المنهج الوصفي التحليلي؛ في وصف دور منصات التواصل الاجتماعي في الحديث عن القضية الفلسطينية، وفي حرية التعبير عن الرأي للمستخدم الفلسطيني في ظل الاحتلال الاسرائيلي، بالإضافة للوقوف على طبيعة استخدام هذه المنصات وما ينتج عنه من انتهاكات من قبل سلطات الاحتلال وإدارات شركات التواصل الاجتماعي من خلال المقابلات المعمقة. …


نسبة توافر مهارات التفكير البصري في أنشطة دروس المهارات اللغوية وأنماطها في كتب "أُحبُّ لغتي" لصفوف الحلقة الأولى (4-1) من التعليم الأساسي بسلطنة عُمان, Aziz Salim Albusaidy, Fatima Muhammad Al-Kaf Jun 2024

نسبة توافر مهارات التفكير البصري في أنشطة دروس المهارات اللغوية وأنماطها في كتب "أُحبُّ لغتي" لصفوف الحلقة الأولى (4-1) من التعليم الأساسي بسلطنة عُمان, Aziz Salim Albusaidy, Fatima Muhammad Al-Kaf

Journal of the Association of Arab Universities for Research in Higher Education (مجلة اتحاد الجامعات العربية (للبحوث في التعليم العالي

هدف المقال إلى تحديد نسبة توافر مهارات التفكير البصري في أنشطة دروس المهارات اللغوية وأنماطها في كتب "أُحِبُّ لُغَتِي" لصفوف الحلقة الأولى (4-1) من التعليم الأساسي بسلطنة عُمان. استخدم الباحثان بطاقة تحليل محتوى مكونة من (22) مهارة، وقد تكون مجتمع الدراسة من أنشطة دروس مهارات اللغة العربية في كتب" أُحِبُّ لُغَتِي" لصفوف الحلقة الأولى (4-1) من التعليم الأساسي بسلطنة عُمان والبالغ عددها (527) نشاطا. وتوصلت الدراسة إلى النتائج الآتية: مهارة التعرّف على الشكل ووصفه أكثر مهارات التفكير البصري توافرا في أنشطة دروس المهارات اللغوية وأنماطها في كتب "أُحِبُّ لُغَتِي" لصفوف الحلقة الأولى (4-1) من التعليم الأساسي بسلطنة عُمان؛ حيث بلغت …


Trying Out The Electronic Case Management System In The Uae And Its Compliance With Fundamental Judicial Guarantees, Abdulla A. Alkhatib May 2024

Trying Out The Electronic Case Management System In The Uae And Its Compliance With Fundamental Judicial Guarantees, Abdulla A. Alkhatib

An-Najah University Journal for Research - B (Humanities)

This study considers the Electronic Case Management System (ECMS) and the challenges it faces in achieving basic litigation guarantees, according to the legislation of the UAE, and comparing them with the practices followed by the judicial authorities. The importance of the study lies in the fact that electronic justice has replaced the traditional justice system, where all procedures from registering the case, submitting memoranda, conducting trials, issuing judgments, appealing, and implementing them are carried out through it remotely. This raised the question about the extent to which ECMS provides basic litigation guarantees, specifically the principles of equality, confrontation, defense, and …


Effect Of User Satisfaction Between Cloud Learning Applications & University Education Agility, Nader Mohammad Aljawarneh May 2024

Effect Of User Satisfaction Between Cloud Learning Applications & University Education Agility, Nader Mohammad Aljawarneh

Journal of Statistics Applications & Probability

University agility has been a critical issue for higher education institutions, little research has focused on university agility and user satisfaction. Drawing on technology acceptance, process, and expectation theories, this paper investigates the mediating role of user satisfaction between cloud learning applications and university education agility. Variance-based structure in the northern region, results show that user satisfaction mediates the link between cloud learning applications and university agility. Implications for practice are discussed.


The Evolution Of Palestinian Narrative: ‘Mo' As An Illustration, Ihsan Abualrob, Ayman Talal Yousef Apr 2024

The Evolution Of Palestinian Narrative: ‘Mo' As An Illustration, Ihsan Abualrob, Ayman Talal Yousef

An-Najah University Journal for Research - B (Humanities)

The article aims to explore the present-day challenges facing the Palestinian narrative. It delves into the ways in which the narrative has been shaped by historical events namely the Nakba, the Naksa, and the Oslo Accords, and how these events have left a lasting impact on the Palestinian identity. The article then examines the potential for the development of a new form of cultural resistance utilizing personal stories; as demonstrated by the Netflix show ‘Mo’. The show proffers a novel approach incorporating Palestinain political messages onto comedy and drama, and therefore has the potential to reach a wider audience. In …


Allocation Of Phasor Measurement Units In The Wide-Area Measurement System, Samir Dawoud, Mohamed Elnemr, Alyaa Yehia Mar 2024

Allocation Of Phasor Measurement Units In The Wide-Area Measurement System, Samir Dawoud, Mohamed Elnemr, Alyaa Yehia

Journal of Engineering Research

WIDE Area in the power system which has been introduced to power system literature in the late 1980s. They are now commercially in power systems for purposes of monitoring, operation, and control. The wide area is a combination between the phasor measurement unit (PMU) and communication infrastructure (CI). In this paper, the location of the PMU and the CI can be optimized to involve system observability. There are a lot of methods to solve the optimal placement of PMU. The communication infrastructure is designed and implemented to collect the data from PMU and transfer data to the control center. In …


Cyberterrorism: Methods, Objectives And Coping Mechanisms, A. M. Aldada, O. Ali Mar 2024

Cyberterrorism: Methods, Objectives And Coping Mechanisms, A. M. Aldada, O. Ali

The World Research of Political Science Journal

Cyberterrorism is distinguished from other types of terrorism by the modern way of using information resources and electronic means brought by the technology civilization in the information age. Therefore, electronic systems and information infrastructure are the target of terrorists. The criminal danger of terrorist groups and organizations has increased, so they have employed their energy to benefit from this technology and exploit it to complete their criminal operations and illegal purposes. The danger of electronic terrorism is increasing in developed countries, whose infrastructure is managed by computers and information networks, which makes it an easy target. In which explosives are …


The Impact Of New Transformations In The Concept Of Terrorism On International Relations, Ali Mousa Aldada, Mahmoud Khalifa Mar 2024

The Impact Of New Transformations In The Concept Of Terrorism On International Relations, Ali Mousa Aldada, Mahmoud Khalifa

The World Research of Political Science Journal

The new transformations in the concept of terrorism have resulted in many developments on the international scene, contributing to the formation of the global system and control of the nature of the relationship between its units. The research aims to analyze these transformations, which led to the establishment of new rules for international politics; this is because the issue of terrorism has become global and does not concern a state or group of conditions but rather concerns all actors in the field of international relations. Through research, it became clear that the most critical transformations in terrorism revolve around confronting …


Geopolitics Of Cyberspace And Expansion Of Terrorism In The Central Asia, Mohammad Amin Zabihi, Saeed Shokohi, Sajad Abed Mar 2024

Geopolitics Of Cyberspace And Expansion Of Terrorism In The Central Asia, Mohammad Amin Zabihi, Saeed Shokohi, Sajad Abed

The World Research of Political Science Journal

Abstract: Terrorism, like any other phenomenon has enjoyed evolution during the course of history and it has become a paramount, influential factor in almost every aspect of national and international equations. Nowadays, terrorists, like any other activist group, use modern technologies in almost evert aspect of their strategies; thus, one should consider the role of these modern technologies that contribute to the furtherance of their malicious deeds. Therefore, it is necessary to investigate the ways terrorists act through, and importantly, the tools and instruments they exploit in order to achieve their goals. Arguably, cyberspace and other related tools and materials …


الآثار النفسية والسلوكية للعنف المدرسي وانعكاساتها على طلبة المدارس الأساسية في مديرية التربية والتعليم للواء قصبة مادبا, May Yacoub Micheal Al-Qussous Mar 2024

الآثار النفسية والسلوكية للعنف المدرسي وانعكاساتها على طلبة المدارس الأساسية في مديرية التربية والتعليم للواء قصبة مادبا, May Yacoub Micheal Al-Qussous

Journal of the Association of Arab Universities for Research in Higher Education (مجلة اتحاد الجامعات العربية (للبحوث في التعليم العالي

هدف المقال التعرف إلى الآثار النفسية والسلوكية للعنف المدرسي وانعكاساتها على طلبة المدارس الأساسية في مديرية التربية والتعليم للواء قصبة مادبا ، حيث استخدمت الباحثة المنهج الوصفي التحليلي، من خلال عينة تكونت من (102) طالبًا وطالبة من طلبة المدارس الأساسية الحكومية في مديرية لواء قصبة مادبا، ممن تتراوح أعمارهم بين (6 - 11) سنة، وقد اشتملت أدوات الدراسة على مقياس العنف المدرسي، وتم التحقق من خصائصه السيكومترية قبل تطبيقه، وأظهرت نتائج البحث أن مستوى الآثار النفسية والسلوكية للعنف المدرسي مستوى متوسط، وأكثر مظاهر العنف المدرسي انتشارًا هي البعد الجسدي، يليها البعد اللفظي، وفي المرتبة الأخيرة البعد المادي، كما بينت نتائج …


استخدامات فضاءات الميديا الاجتماعية وتمثلاتها "المجموعات المغلقة على فايسبوك أنموذجا, Hela Ben Ali Barnat, Faten Abdel Hamid Ben Lagha Mar 2024

استخدامات فضاءات الميديا الاجتماعية وتمثلاتها "المجموعات المغلقة على فايسبوك أنموذجا, Hela Ben Ali Barnat, Faten Abdel Hamid Ben Lagha

Journal of the Association of Arab Universities for Research in Higher Education (مجلة اتحاد الجامعات العربية (للبحوث في التعليم العالي

هدف المقال تفسير التجارب الاتصالية والتفاعلية الافتراضية عبر المجموعات المغلقة للفيسبوك، وما يمكن أن تعكسه من تعميق مفهوم الجماعة في بيئة رقميّة غير منفتحة على عموم المستخدمين. جاءت الدِّراسة في نطاق الدِّراسات الكيفية، واعتمدت أداة المقابلة لجمع البيانات من أفراد العيِّنة (30 مفردة) للإجابة عن محاور الدراسة الآتية: عادات الاستخدام وأنماطه ودوافع الاستخدام وتمثلات المستخدمين للمجموعات المغلقة. أظهرت أبرز نتائج الدراسة: أنّ أهميّة هذه المجموعات تتشكل من خلال مواضيعها، وقيمة المحتوى ومساحة الخصوصيّة التي توفرها للمستخدم، كما إنها تشكل فضاءً إخباريا بديلاً يساعد المستخدمين خاصة على متابعة المستجدات وفهمها، وتبيّن أنّ بعض هذه المجموعات تمثل مساحة للتشجيع على مشاركة المعلومات …


The Impact Of E-Learning On Faculty Members’ Performance: The Mediating Role Of Sustainable Development At Police Science Academy In Sharjah, Ghassan Alomari, Fakhri Bani Doumi, Mohammed Al-Kasasbeh, Imad Rabee, Haitham Alzoubi Mar 2024

The Impact Of E-Learning On Faculty Members’ Performance: The Mediating Role Of Sustainable Development At Police Science Academy In Sharjah, Ghassan Alomari, Fakhri Bani Doumi, Mohammed Al-Kasasbeh, Imad Rabee, Haitham Alzoubi

Jerash for Research and Studies Journal مجلة جرش للبحوث والدراسات

The objective of the research was to assess the influence of electronic education (e-learning) on faculty members’ performance through sustainable development at the Police Science Academy (PSA) in Sharjah.

The analysis unit of the study consisted of all full and part-time faculty members at PSA in Sharjah. Thirty-three questionnaires were distributed by Google Forms, and 30 questionnaires were retrieved. The study is explanatory, and it is quantitative in nature.

The study revealed that e-learning and its dimensions (human resources, technological infrastructure, electronic curriculum, electronic exam, electronic legislation, privacy and security, and organizational culture) are significantly associated with faculty member performance. …


Coexistence Skills Among Mothers Of Children With Multiple Disabilities In The Northern Region Of Jordan (Irbid), Najwa Abdel Hamid Darawsheh, Majid Mohammad Al-Khataybeh, Hanadi Alrashdan, Sonia Abed Alhamed Drawsheh, Afaf Saleem Abu Grarh, Meriam Sulaiman Abu Dogush Mar 2024

Coexistence Skills Among Mothers Of Children With Multiple Disabilities In The Northern Region Of Jordan (Irbid), Najwa Abdel Hamid Darawsheh, Majid Mohammad Al-Khataybeh, Hanadi Alrashdan, Sonia Abed Alhamed Drawsheh, Afaf Saleem Abu Grarh, Meriam Sulaiman Abu Dogush

Journal of Statistics Applications & Probability

The study aimed to verify the effectiveness of a cognitive-behavioral counseling program to develop the coping skills of mothers of children with multiple disabilities in the northern region of Jordan(IRBID), to achieve the objectives of the study, a quasi-experimental approach was used. The study sample consisted of (24) mothers, the results showed that the coping skills of mothers of children with disabilities, the multiple disabilities were all moderate, and no statistically significant differences appeared between the average scores of the experimental group in the post and follow-up measurements.


Blockchain Technology Trends In Different Sectors: A Review, Afaf M. Bugawa Mar 2024

Blockchain Technology Trends In Different Sectors: A Review, Afaf M. Bugawa

Journal of Statistics Applications & Probability

Purpose: Currency transactions between companies or people are often controlled and characterized by third- party organizations. To make any such transaction or set up any digital payment transaction, a credit card company or bank acts as a middleman who helps to complete the transaction. The service provider charges a fee for this. Such transaction systems tend to be centralized, as the information involved in the process is managed and controlled by a third party, not the transacting parties. Blockchain technology innovates upon the transaction mechanism because it helps decentralize the environment by eliminating the third party in the transaction process. …


Detection Of Ddos Attacks Using Enhanced Fs With Brsa- Based Deep Learning Model In Iot Environment, Adwan A. Alanazi, Arwa D. Alzughaibi, Ghada Amoudi, Manahill I. A. Anja, Abdelgalal O. I. Abaker, Salem Alkhalaf Jan 2024

Detection Of Ddos Attacks Using Enhanced Fs With Brsa- Based Deep Learning Model In Iot Environment, Adwan A. Alanazi, Arwa D. Alzughaibi, Ghada Amoudi, Manahill I. A. Anja, Abdelgalal O. I. Abaker, Salem Alkhalaf

Information Sciences Letters

Network assaults and floods, are rising due to the increasing number of IoT devices, posing security and dependability concerns. These attacks cause a denial of service (DoS) and network interruption for IoT devices. Researchers have established multiple methods to track down assaults on weak IoT gadgets. This study provides a deep learning and swarm metaheuristic technique for detecting DDoS assaults in an Internet of Things (IoT) setting. The group search firefly method, a revolutionary improvement on the classic firefly algorithm, is used as a feature selection tool to zero in on the best candidates. In addition, the hyperparameters of the …


Cloud Services Selection On The Base Of Decision Support System, Berik Akhmetov, Lyazzat Atymtayeva, Yevheniy Nikitenko, Valery Lakhno, Bakhytzhan Akhmetov, Bagdat Yagaliyeva Jan 2024

Cloud Services Selection On The Base Of Decision Support System, Berik Akhmetov, Lyazzat Atymtayeva, Yevheniy Nikitenko, Valery Lakhno, Bakhytzhan Akhmetov, Bagdat Yagaliyeva

Information Sciences Letters

Recently, enterprises are increasingly using cloud services for efficient work, including decision making. This paper proposes a non-classical version of the Decision Support System (DSS), which provides the choice of the best IT service when migrating an enterprise to a cloud environment. This should increase the efficiency of management decisions in the development of an enterprise’s IT strategy. We have studied the problems of effective implementation of a cloud IT environment in an enterprise (organization), considering information security (IS) risks. At the same time, we have proposed modern approaches to the development of models for the migration of enterprises (organizations) …


Pedagogical Education In The New Kazakhstan: Technological And Methodological Aspects Of Distance Learning For Future Teachers, B. Klara, Y. Mirsat, K. Perizat, A. Amina, A. Turalbayeva, K. Seisekul Jan 2024

Pedagogical Education In The New Kazakhstan: Technological And Methodological Aspects Of Distance Learning For Future Teachers, B. Klara, Y. Mirsat, K. Perizat, A. Amina, A. Turalbayeva, K. Seisekul

Information Sciences Letters

The article defines the technological and methodological aspects of the formation of digital creative competencies of future teachers in the conditions of distance education in the Republic of Kazakhstan and reveals the essence of the concepts of competence, digital competence, digital-technological competence, digital-methodical competence, creativity, smart model and didactic characteristics of digital technologies. In the article, the essence of the components of competence is characterized in a new context: organizational ability; empathic ability; reflexive ability. An online questionnaire was compiled, and an online test was conducted. A mobile application for the online test was developed. Participants included future teachers of …


Cryptovirology Ransomware: A Review Of Dissemination And Mitigation Techniques, Muhammad Imran Sarwar, Louai A. Maghrabi, Kashif Nisar, Imran Khan Jan 2024

Cryptovirology Ransomware: A Review Of Dissemination And Mitigation Techniques, Muhammad Imran Sarwar, Louai A. Maghrabi, Kashif Nisar, Imran Khan

Information Sciences Letters

Digital assets are generally regarded as one of the most valuable assets for an organization. When they are captured for ransom purposes, a serious problem arises, and ransomware is responsible for this. When ransomware gets onto a computer or other electronic device, the data on it is encrypted, made inaccessible, or taken away until a ransom is paid. The culprits behind these activities release and disseminate new and sophisticated variants of illicit wealth and notorious practices. Hardware and antivirus software that detect intrusions are not a permanent solution, as hackers can bypass them easily. After ransomware has been executed on …


Dynamics Of Interactive Audience In The Digital Environment: An Analytical Study With An Application To The Bbc Trending Program, Faisal K. Nagmeldin, Ghada M. Osman Jan 2024

Dynamics Of Interactive Audience In The Digital Environment: An Analytical Study With An Application To The Bbc Trending Program, Faisal K. Nagmeldin, Ghada M. Osman

Information Sciences Letters

This study aimed to investigate the dynamics of virtual audience interaction on social media platforms, specifically Facebook and YouTube. Additionally, it sought to identify the characteristics of the mobile audience in the digital environment and understand the reasons for audience engagement in the digital space. To achieve these objectives, a descriptive methodology was employed, analyzing both verbal and non-verbal language used in audience interactions. The survey method, using content analysis, was the primary approach utilized, leading to the following key findings. The study analyzed the topics covered in selected trending episodes and assessed audience sentiments towards these topics. The research …


Fintech Security Challenges In The Financial Services Industry: A Systematic Literature Review (2018-2022), Afaf Bugawa, Manar Baher, Mohamed Al Zayani Jan 2024

Fintech Security Challenges In The Financial Services Industry: A Systematic Literature Review (2018-2022), Afaf Bugawa, Manar Baher, Mohamed Al Zayani

Information Sciences Letters

Over the past year, financial technology (Fintech) has attracted more and more attention to practice and research. The emergence of financial technology is one of the major modifications to the financial environment caused by technical breakthroughs and the global financial crisis. Studies of financial technology have recently expanded into a number of areas, to the practical side. In addition to helping the Financial Services Industry enhance security, a clear understanding of uses of the fintech ecosystem will be instrumental in developing the most popular and secure fintech application. In order to identify topics for the financial technology research agenda, this …


Transformational Practices Of Academic Leaders In Universities: Suggestions For Improvement, Abdelsalam F. Alawamrah, Najwa A. Darawsheh, Hanadi Alrashdan, Nadia H. Ghalia, Mawaheb Mustafa, Alham Darawsheh Jan 2024

Transformational Practices Of Academic Leaders In Universities: Suggestions For Improvement, Abdelsalam F. Alawamrah, Najwa A. Darawsheh, Hanadi Alrashdan, Nadia H. Ghalia, Mawaheb Mustafa, Alham Darawsheh

Information Sciences Letters

The study aimed to identify the transformational practices of academic leaders in Jordanian universities: proposals for improvement. The qualitative approach was adopted, and interviews were conducted with (30) faculty members from Jordanian universities. The results of these interviews showed that the faculty members presented five proposals to improve the transformational practices of academic leaders. It included: Jordanian universities’ efforts to develop digital infrastructure and activate it within their centers and administrative and organizational structures, and universities’ efforts to provide modern electronic and technical platforms that suit the requirements of workers and suit their current technical skills, and Jordanian universities’ efforts …


Market Analysis And Bidding Strategy Of Hybrid Renewable Energy Systems Considering Emissions, Fatma Elzahraa, Mohamed Elnemr, Samir Dawoud Jan 2024

Market Analysis And Bidding Strategy Of Hybrid Renewable Energy Systems Considering Emissions, Fatma Elzahraa, Mohamed Elnemr, Samir Dawoud

Journal of Engineering Research

The competition in the electricity markets makes it difficult to choose a suitable strategy for maximizing profit while reducing harmful emissions. To have an adequate energy price for consumers while minimizing the harmful emissions to the atmosphere and maximizing profits of all participants in the electricity market needs an aggressive bidding strategy. Developing these bidding strategies with the integration of renewable energy (RE) in the electricity market became important. This research studies various bidding strategies for maximizing profits in the deregulated energy market since participants are keen on developing bidding strategies considering emissions. These bidding strategies will consider the integration …


Website Phishing Detection Using Machine Learning Techniques, R. Alazaidah, A. Al-Shaikh, M. R. Al-Mousa, H. Khafajah, G. Samara, M. Alzyoud Jan 2024

Website Phishing Detection Using Machine Learning Techniques, R. Alazaidah, A. Al-Shaikh, M. R. Al-Mousa, H. Khafajah, G. Samara, M. Alzyoud

Journal of Statistics Applications & Probability

Phishing is a cybercrime that is constantly increasing in the recent years due to the increased use of the Internet and its applications. It is one of the most common types of social engineering that aims to disclose or steel users sensitive or personal information. In this paper, two main objectives are considered. The first is to identify the best classifier that can detect phishing among twenty-four different classifiers that represent six learning strategies. The second objective aims to identify the best feature selection method for websites phishing datasets. Using two datasets that are related to Phishing with different characteristics …


Challenges Of Cloud Computing In Jordanian Govt.: Insights From Telcos, Issam Jebreen, Mouath Alqaisi, Ahmad Al-Qerem, Amer Abu Salem Jan 2024

Challenges Of Cloud Computing In Jordanian Govt.: Insights From Telcos, Issam Jebreen, Mouath Alqaisi, Ahmad Al-Qerem, Amer Abu Salem

Journal of Statistics Applications & Probability

Cloud computing offers many benefits to governments, including increased efficiency, flexibility, and cost savings. However, there are also significant challenges to adopting cloud computing services. In the case of the Jordanian government, some of these challenges include concerns about data security and privacy, lack of technical expertise, limited funding and resources, and cultural resistance to change. This paper examines the challenges faced by the Jordanian government in adopting cloud computing services and evaluates their impact on government institutions. The study collected data from three local telecommunications companies in Jordan to identify potential challenges and assess their significance through a questionnaire. …