Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Education (15)
- Engineering (13)
- Social and Behavioral Sciences (13)
- Law (10)
- Physical Sciences and Mathematics (10)
-
- Arts and Humanities (8)
- Business (7)
- Computer Engineering (7)
- Computer Sciences (7)
- Applied Mathematics (6)
- Digital Communications and Networking (4)
- Mathematics (4)
- Physics (4)
- Communication (3)
- Electrical and Computer Engineering (3)
- Medicine and Health Sciences (3)
- Psychology (3)
- Architecture (2)
- Biomedical Informatics (2)
- Criminal Law (2)
- Curriculum and Social Inquiry (2)
- Health Information Technology (2)
- Information Security (2)
- Nanotechnology (2)
- Power and Energy (2)
- Social Psychology (2)
- Artificial Intelligence and Robotics (1)
- Automotive Engineering (1)
- Business Administration, Management, and Operations (1)
- Civil Procedure (1)
- Keyword
-
- Blockchain (7)
- Security (7)
- Cybersecurity (6)
- Machine learning (6)
- Classification (4)
-
- Cybercrime (4)
- Information Technology (4)
- Phishing (4)
- Privacy (4)
- Awareness (3)
- Big Data (3)
- Cloud Computing (3)
- Cryptocurrency (3)
- Financial technology (3)
- Fintech (3)
- Jordan. (3)
- Machine Learning (3)
- Modeling (3)
- Modern Technologies (3)
- Public sector (3)
- Advanced phishing tools (2)
- Anti-phishing. (2)
- Architectural design (2)
- Artificial intelligence (2)
- Authentication (2)
- BIM (2)
- Banking (2)
- Business Model Canvas (2)
- Business Models (2)
- COVID-19; E-Learning; Lower usage; TAM; Blackboard system. (2)
- Publication Year
- Publication
-
- Information Sciences Letters (58)
- Applied Mathematics & Information Sciences (51)
- Journal of Statistics Applications & Probability (12)
- Journal of Engineering Research (11)
- An-Najah University Journal for Research - B (Humanities) (9)
-
- Journal of the Association of Arab Universities for Research in Higher Education (مجلة اتحاد الجامعات العربية (للبحوث في التعليم العالي (9)
- Future Computing and Informatics Journal (6)
- Journal of the Arab American University مجلة الجامعة العربية الامريكية للبحوث (5)
- مجلة جامعة الإمارات للبحوث القانونية UAEU LAW JOURNAL (4)
- AAU Journal of Business and Law مجلة جامعة العين للأعمال والقانون (3)
- Jordanian Educational Journal (3)
- The World Research of Political Science Journal (3)
- Hebron University Research Journal-B (Humanities) - (مجلة جامعة الخليل للبحوث- ب (العلوم الانسانيه (2)
- Jerash for Research and Studies Journal مجلة جرش للبحوث والدراسات (2)
- Palestine Technical University Research Journal (2)
- Al Jinan الجنان (1)
- Al-Balqa Journal for Research and Studies البلقاء للبحوث والدراسات (1)
- Association of Arab Universities Journal for Arts مجلة اتحاد الجامعات العربية للآداب (1)
- Association of Arab Universities Journal for Education and Psychology (1)
- Future Dental Journal (1)
- Future Engineering Journal (1)
- Hebron University Research Journal-A (Natural Sciences) - (مجلة جامعة الخليل للبحوث- أ (العلوم الطبيعيه (1)
- International Arab Journal of Dentistry (1)
- Jordan Journal of Applied Science-Humanities Series (1)
Articles 1 - 30 of 189
Full-Text Articles in Entire DC Network
Workplace Bullying And Its Relation To Anxiety About Professional Futureالتنمر الوظيفي وعلاقته بقلق المستقبل المهني دراسة ميدانية على عينة من العاملين في جامعة دمشق, Ezzat Arabe Katbee
Workplace Bullying And Its Relation To Anxiety About Professional Futureالتنمر الوظيفي وعلاقته بقلق المستقبل المهني دراسة ميدانية على عينة من العاملين في جامعة دمشق, Ezzat Arabe Katbee
Association of Arab Universities Journal for Education and Psychology
This research aims to identify the relationship between workplace bullying and anxiety about professional among a sample of Damascus university employees. The sample consists of 500 employees, (235) females and (265) males.The results came as follows:There is a significant statically relation between workplace bullying and anxiety about professional among the sample.There are no significant statically differences in the scores of the sample at anxiety about professional future questionnaire according to the gender variable.There are significant statically differences in the scores of the sample at questionnaire according to the gender variable. workplace bullyingTo investigate the hypotheses the researcher used workplace bullying …
The Extent Teacher Of History In Public Schools In Ajloun Governorate Utilize Ict In The Application Of The Udl From Their Perspective, Fatima Al-Momani
The Extent Teacher Of History In Public Schools In Ajloun Governorate Utilize Ict In The Application Of The Udl From Their Perspective, Fatima Al-Momani
Jordan Journal of Applied Science-Humanities Series
This study aimed to identify the extent teacher of history in public schools in Ajloun Governorate utilize ICT (information and communications technology) in the application of the UDL (Universal Design for Learning) from their perspective, the study used the descriptive survey approach, questionnaire has been used, the sample of study consisted of (77) female and male teachers. However, the finding of study showed that the degree of the extent teacher of history in public schools in Ajloun Governorate utilize ICT in the application of the UDL from their perspective was moderated at the domain level; the field of "application the …
Securing Body Area Networks With Fingerprint Cryptography And Authentication In Manet, Alaa M. Elbanaa, Roayat Ismail Abdelfatah, Mohamed E. Nasr
Securing Body Area Networks With Fingerprint Cryptography And Authentication In Manet, Alaa M. Elbanaa, Roayat Ismail Abdelfatah, Mohamed E. Nasr
Journal of Engineering Research
Standard MANETs face issues like incorrect transmission and vulnerability to unauthorized node access, posing significant security concerns, especially regarding authentication procedures. To address these challenges, researchers are exploring innovative approaches to enhance authentication mechanisms within MANETs. In this paper, we present a novel solution integrating a Body Area Network (BAN) scheme to capture biomedical data from sensors such as ECG and EEG, facilitating data transmission across MANETs. Furthermore, we employ a hybrid Elgamal algorithm for encrypting biomedical data, bolstered by fingerprint biometrics to fortify the cryptographic process, enhancing network security. Additionally, we conduct comparative analyses, exploring different key sizes and …
Online Self-Presentation And Its Relationship To The Level Of Exposure To Cyber-Harassment Among A Sample Of The University Of Jordan Students, Randah Odeh Barakat, Islam F. Alzu'bi
Online Self-Presentation And Its Relationship To The Level Of Exposure To Cyber-Harassment Among A Sample Of The University Of Jordan Students, Randah Odeh Barakat, Islam F. Alzu'bi
An-Najah University Journal for Research - B (Humanities)
The study aimed to identify the level of online self-presentation and its relationship to the level of exposure to cyber-harassment among a sample of the University of Jordan students consisting of (385) male and female bachelor's students from the Faculty of Arts. The questionnaires that are built for the level of online self-presentation and level of exposure to cyber-harassment were constructed and evaluated for their validity and reliability. The results indicated that the level of online self-presentation and the level of exposure to cyber-harassment among students were moderate, the level of online self-presentation was positively correlated with the level of …
واقع الإدمان السلوكي, Rouba Awad
واقع الإدمان السلوكي, Rouba Awad
Al Jinan الجنان
This study aimed to focus on the reality of online behavioral addiction among the teenagers at the Technical Industrial Institute seeking to know the extent of their addiction, where the description survey method was used, and the study sample considered of (407). This study was used addiction behavioral scale according to cognitive behavioral “Davis” model for Generalized Problematic Internet Use Scale2 (GPIUS2), where the study found that the five fields are below the average which indicates the disagree of sample’s tendency about online behavioral addiction.
درجة وعي المعلمين بالأمن السيبراني, Khaled Suleiman Samhan Alshwarh
درجة وعي المعلمين بالأمن السيبراني, Khaled Suleiman Samhan Alshwarh
Journal of the Association of Arab Universities for Research in Higher Education (مجلة اتحاد الجامعات العربية (للبحوث في التعليم العالي
هدف المقال التعرف على درجة وعي المعلمين بالأمن السيبراني من خلال بيان مدى إدراك المعلمين لمفاهيم الأمن السيبراني من وجهة نظرهم، وتوضيح دور الإدارة المدرسية في نشر ثقافة الأمن السيبراني لدى الطلبة من وجهة نظر المعلمين، وبيان معوقات نشر ثقافة الأمن السيبراني في المدارس الأردنية من وجهة نظر المعلمين، والتحقق من وجود فروق ذات دلالة إحصائية عند مستوى الدلالة (a≤0.05) لدرجة وعي المعلمين بالأمن السيبراني تعزى للمتغيرات الديمغرافية لعينة الدراسة. ولتحقيق هذه الأهداف، تم استخدام المنهج الوصفي التحليلي. وتم توزيع استبانة الدراسة التي احتوت على 28 فقرة على (809) معلماً ومعلمة تمّ اختيارهم بالطريقة العشوائية الطبقية من مدارس مديرية تربية …
واقع حرية الرأي والتعبير في منصات التواصل الاجتماعي لدى المستخدم الفلسطيني, Nadeen Hani Khalil Husary
واقع حرية الرأي والتعبير في منصات التواصل الاجتماعي لدى المستخدم الفلسطيني, Nadeen Hani Khalil Husary
Journal of the Association of Arab Universities for Research in Higher Education (مجلة اتحاد الجامعات العربية (للبحوث في التعليم العالي
هدف المقال بيان أهمية توجيه دور منصات التواصل الاجتماعي في إبراز الحق في حرية التعبير عن الرأي لدى المستخدم الفلسطيني في ظل الاحتلال الإسرائيلي، عبر التداول الرقمي والسردية للأحداث في فلسطين، وما نتج عن ممارسة هذا الحق من تقييد للحريات، وفرض عقوبات، واعتقالات، واتهامات بحق المستخدمين والناشطين الفلسطينيين. واعتمدت الدراسة على المنهج الوصفي التحليلي؛ في وصف دور منصات التواصل الاجتماعي في الحديث عن القضية الفلسطينية، وفي حرية التعبير عن الرأي للمستخدم الفلسطيني في ظل الاحتلال الاسرائيلي، بالإضافة للوقوف على طبيعة استخدام هذه المنصات وما ينتج عنه من انتهاكات من قبل سلطات الاحتلال وإدارات شركات التواصل الاجتماعي من خلال المقابلات المعمقة. …
نسبة توافر مهارات التفكير البصري في أنشطة دروس المهارات اللغوية وأنماطها في كتب "أُحبُّ لغتي" لصفوف الحلقة الأولى (4-1) من التعليم الأساسي بسلطنة عُمان, Aziz Salim Albusaidy, Fatima Muhammad Al-Kaf
نسبة توافر مهارات التفكير البصري في أنشطة دروس المهارات اللغوية وأنماطها في كتب "أُحبُّ لغتي" لصفوف الحلقة الأولى (4-1) من التعليم الأساسي بسلطنة عُمان, Aziz Salim Albusaidy, Fatima Muhammad Al-Kaf
Journal of the Association of Arab Universities for Research in Higher Education (مجلة اتحاد الجامعات العربية (للبحوث في التعليم العالي
هدف المقال إلى تحديد نسبة توافر مهارات التفكير البصري في أنشطة دروس المهارات اللغوية وأنماطها في كتب "أُحِبُّ لُغَتِي" لصفوف الحلقة الأولى (4-1) من التعليم الأساسي بسلطنة عُمان. استخدم الباحثان بطاقة تحليل محتوى مكونة من (22) مهارة، وقد تكون مجتمع الدراسة من أنشطة دروس مهارات اللغة العربية في كتب" أُحِبُّ لُغَتِي" لصفوف الحلقة الأولى (4-1) من التعليم الأساسي بسلطنة عُمان والبالغ عددها (527) نشاطا. وتوصلت الدراسة إلى النتائج الآتية: مهارة التعرّف على الشكل ووصفه أكثر مهارات التفكير البصري توافرا في أنشطة دروس المهارات اللغوية وأنماطها في كتب "أُحِبُّ لُغَتِي" لصفوف الحلقة الأولى (4-1) من التعليم الأساسي بسلطنة عُمان؛ حيث بلغت …
Trying Out The Electronic Case Management System In The Uae And Its Compliance With Fundamental Judicial Guarantees, Abdulla A. Alkhatib
Trying Out The Electronic Case Management System In The Uae And Its Compliance With Fundamental Judicial Guarantees, Abdulla A. Alkhatib
An-Najah University Journal for Research - B (Humanities)
This study considers the Electronic Case Management System (ECMS) and the challenges it faces in achieving basic litigation guarantees, according to the legislation of the UAE, and comparing them with the practices followed by the judicial authorities. The importance of the study lies in the fact that electronic justice has replaced the traditional justice system, where all procedures from registering the case, submitting memoranda, conducting trials, issuing judgments, appealing, and implementing them are carried out through it remotely. This raised the question about the extent to which ECMS provides basic litigation guarantees, specifically the principles of equality, confrontation, defense, and …
Effect Of User Satisfaction Between Cloud Learning Applications & University Education Agility, Nader Mohammad Aljawarneh
Effect Of User Satisfaction Between Cloud Learning Applications & University Education Agility, Nader Mohammad Aljawarneh
Journal of Statistics Applications & Probability
University agility has been a critical issue for higher education institutions, little research has focused on university agility and user satisfaction. Drawing on technology acceptance, process, and expectation theories, this paper investigates the mediating role of user satisfaction between cloud learning applications and university education agility. Variance-based structure in the northern region, results show that user satisfaction mediates the link between cloud learning applications and university agility. Implications for practice are discussed.
The Evolution Of Palestinian Narrative: ‘Mo' As An Illustration, Ihsan Abualrob, Ayman Talal Yousef
The Evolution Of Palestinian Narrative: ‘Mo' As An Illustration, Ihsan Abualrob, Ayman Talal Yousef
An-Najah University Journal for Research - B (Humanities)
The article aims to explore the present-day challenges facing the Palestinian narrative. It delves into the ways in which the narrative has been shaped by historical events namely the Nakba, the Naksa, and the Oslo Accords, and how these events have left a lasting impact on the Palestinian identity. The article then examines the potential for the development of a new form of cultural resistance utilizing personal stories; as demonstrated by the Netflix show ‘Mo’. The show proffers a novel approach incorporating Palestinain political messages onto comedy and drama, and therefore has the potential to reach a wider audience. In …
Allocation Of Phasor Measurement Units In The Wide-Area Measurement System, Samir Dawoud, Mohamed Elnemr, Alyaa Yehia
Allocation Of Phasor Measurement Units In The Wide-Area Measurement System, Samir Dawoud, Mohamed Elnemr, Alyaa Yehia
Journal of Engineering Research
WIDE Area in the power system which has been introduced to power system literature in the late 1980s. They are now commercially in power systems for purposes of monitoring, operation, and control. The wide area is a combination between the phasor measurement unit (PMU) and communication infrastructure (CI). In this paper, the location of the PMU and the CI can be optimized to involve system observability. There are a lot of methods to solve the optimal placement of PMU. The communication infrastructure is designed and implemented to collect the data from PMU and transfer data to the control center. In …
Cyberterrorism: Methods, Objectives And Coping Mechanisms, A. M. Aldada, O. Ali
Cyberterrorism: Methods, Objectives And Coping Mechanisms, A. M. Aldada, O. Ali
The World Research of Political Science Journal
Cyberterrorism is distinguished from other types of terrorism by the modern way of using information resources and electronic means brought by the technology civilization in the information age. Therefore, electronic systems and information infrastructure are the target of terrorists. The criminal danger of terrorist groups and organizations has increased, so they have employed their energy to benefit from this technology and exploit it to complete their criminal operations and illegal purposes. The danger of electronic terrorism is increasing in developed countries, whose infrastructure is managed by computers and information networks, which makes it an easy target. In which explosives are …
The Impact Of New Transformations In The Concept Of Terrorism On International Relations, Ali Mousa Aldada, Mahmoud Khalifa
The Impact Of New Transformations In The Concept Of Terrorism On International Relations, Ali Mousa Aldada, Mahmoud Khalifa
The World Research of Political Science Journal
The new transformations in the concept of terrorism have resulted in many developments on the international scene, contributing to the formation of the global system and control of the nature of the relationship between its units. The research aims to analyze these transformations, which led to the establishment of new rules for international politics; this is because the issue of terrorism has become global and does not concern a state or group of conditions but rather concerns all actors in the field of international relations. Through research, it became clear that the most critical transformations in terrorism revolve around confronting …
Geopolitics Of Cyberspace And Expansion Of Terrorism In The Central Asia, Mohammad Amin Zabihi, Saeed Shokohi, Sajad Abed
Geopolitics Of Cyberspace And Expansion Of Terrorism In The Central Asia, Mohammad Amin Zabihi, Saeed Shokohi, Sajad Abed
The World Research of Political Science Journal
Abstract: Terrorism, like any other phenomenon has enjoyed evolution during the course of history and it has become a paramount, influential factor in almost every aspect of national and international equations. Nowadays, terrorists, like any other activist group, use modern technologies in almost evert aspect of their strategies; thus, one should consider the role of these modern technologies that contribute to the furtherance of their malicious deeds. Therefore, it is necessary to investigate the ways terrorists act through, and importantly, the tools and instruments they exploit in order to achieve their goals. Arguably, cyberspace and other related tools and materials …
الآثار النفسية والسلوكية للعنف المدرسي وانعكاساتها على طلبة المدارس الأساسية في مديرية التربية والتعليم للواء قصبة مادبا, May Yacoub Micheal Al-Qussous
الآثار النفسية والسلوكية للعنف المدرسي وانعكاساتها على طلبة المدارس الأساسية في مديرية التربية والتعليم للواء قصبة مادبا, May Yacoub Micheal Al-Qussous
Journal of the Association of Arab Universities for Research in Higher Education (مجلة اتحاد الجامعات العربية (للبحوث في التعليم العالي
هدف المقال التعرف إلى الآثار النفسية والسلوكية للعنف المدرسي وانعكاساتها على طلبة المدارس الأساسية في مديرية التربية والتعليم للواء قصبة مادبا ، حيث استخدمت الباحثة المنهج الوصفي التحليلي، من خلال عينة تكونت من (102) طالبًا وطالبة من طلبة المدارس الأساسية الحكومية في مديرية لواء قصبة مادبا، ممن تتراوح أعمارهم بين (6 - 11) سنة، وقد اشتملت أدوات الدراسة على مقياس العنف المدرسي، وتم التحقق من خصائصه السيكومترية قبل تطبيقه، وأظهرت نتائج البحث أن مستوى الآثار النفسية والسلوكية للعنف المدرسي مستوى متوسط، وأكثر مظاهر العنف المدرسي انتشارًا هي البعد الجسدي، يليها البعد اللفظي، وفي المرتبة الأخيرة البعد المادي، كما بينت نتائج …
استخدامات فضاءات الميديا الاجتماعية وتمثلاتها "المجموعات المغلقة على فايسبوك أنموذجا, Hela Ben Ali Barnat, Faten Abdel Hamid Ben Lagha
استخدامات فضاءات الميديا الاجتماعية وتمثلاتها "المجموعات المغلقة على فايسبوك أنموذجا, Hela Ben Ali Barnat, Faten Abdel Hamid Ben Lagha
Journal of the Association of Arab Universities for Research in Higher Education (مجلة اتحاد الجامعات العربية (للبحوث في التعليم العالي
هدف المقال تفسير التجارب الاتصالية والتفاعلية الافتراضية عبر المجموعات المغلقة للفيسبوك، وما يمكن أن تعكسه من تعميق مفهوم الجماعة في بيئة رقميّة غير منفتحة على عموم المستخدمين. جاءت الدِّراسة في نطاق الدِّراسات الكيفية، واعتمدت أداة المقابلة لجمع البيانات من أفراد العيِّنة (30 مفردة) للإجابة عن محاور الدراسة الآتية: عادات الاستخدام وأنماطه ودوافع الاستخدام وتمثلات المستخدمين للمجموعات المغلقة. أظهرت أبرز نتائج الدراسة: أنّ أهميّة هذه المجموعات تتشكل من خلال مواضيعها، وقيمة المحتوى ومساحة الخصوصيّة التي توفرها للمستخدم، كما إنها تشكل فضاءً إخباريا بديلاً يساعد المستخدمين خاصة على متابعة المستجدات وفهمها، وتبيّن أنّ بعض هذه المجموعات تمثل مساحة للتشجيع على مشاركة المعلومات …
The Impact Of E-Learning On Faculty Members’ Performance: The Mediating Role Of Sustainable Development At Police Science Academy In Sharjah, Ghassan Alomari, Fakhri Bani Doumi, Mohammed Al-Kasasbeh, Imad Rabee, Haitham Alzoubi
The Impact Of E-Learning On Faculty Members’ Performance: The Mediating Role Of Sustainable Development At Police Science Academy In Sharjah, Ghassan Alomari, Fakhri Bani Doumi, Mohammed Al-Kasasbeh, Imad Rabee, Haitham Alzoubi
Jerash for Research and Studies Journal مجلة جرش للبحوث والدراسات
The objective of the research was to assess the influence of electronic education (e-learning) on faculty members’ performance through sustainable development at the Police Science Academy (PSA) in Sharjah.
The analysis unit of the study consisted of all full and part-time faculty members at PSA in Sharjah. Thirty-three questionnaires were distributed by Google Forms, and 30 questionnaires were retrieved. The study is explanatory, and it is quantitative in nature.
The study revealed that e-learning and its dimensions (human resources, technological infrastructure, electronic curriculum, electronic exam, electronic legislation, privacy and security, and organizational culture) are significantly associated with faculty member performance. …
Coexistence Skills Among Mothers Of Children With Multiple Disabilities In The Northern Region Of Jordan (Irbid), Najwa Abdel Hamid Darawsheh, Majid Mohammad Al-Khataybeh, Hanadi Alrashdan, Sonia Abed Alhamed Drawsheh, Afaf Saleem Abu Grarh, Meriam Sulaiman Abu Dogush
Coexistence Skills Among Mothers Of Children With Multiple Disabilities In The Northern Region Of Jordan (Irbid), Najwa Abdel Hamid Darawsheh, Majid Mohammad Al-Khataybeh, Hanadi Alrashdan, Sonia Abed Alhamed Drawsheh, Afaf Saleem Abu Grarh, Meriam Sulaiman Abu Dogush
Journal of Statistics Applications & Probability
The study aimed to verify the effectiveness of a cognitive-behavioral counseling program to develop the coping skills of mothers of children with multiple disabilities in the northern region of Jordan(IRBID), to achieve the objectives of the study, a quasi-experimental approach was used. The study sample consisted of (24) mothers, the results showed that the coping skills of mothers of children with disabilities, the multiple disabilities were all moderate, and no statistically significant differences appeared between the average scores of the experimental group in the post and follow-up measurements.
Blockchain Technology Trends In Different Sectors: A Review, Afaf M. Bugawa
Blockchain Technology Trends In Different Sectors: A Review, Afaf M. Bugawa
Journal of Statistics Applications & Probability
Purpose: Currency transactions between companies or people are often controlled and characterized by third- party organizations. To make any such transaction or set up any digital payment transaction, a credit card company or bank acts as a middleman who helps to complete the transaction. The service provider charges a fee for this. Such transaction systems tend to be centralized, as the information involved in the process is managed and controlled by a third party, not the transacting parties. Blockchain technology innovates upon the transaction mechanism because it helps decentralize the environment by eliminating the third party in the transaction process. …
Detection Of Ddos Attacks Using Enhanced Fs With Brsa- Based Deep Learning Model In Iot Environment, Adwan A. Alanazi, Arwa D. Alzughaibi, Ghada Amoudi, Manahill I. A. Anja, Abdelgalal O. I. Abaker, Salem Alkhalaf
Detection Of Ddos Attacks Using Enhanced Fs With Brsa- Based Deep Learning Model In Iot Environment, Adwan A. Alanazi, Arwa D. Alzughaibi, Ghada Amoudi, Manahill I. A. Anja, Abdelgalal O. I. Abaker, Salem Alkhalaf
Information Sciences Letters
Network assaults and floods, are rising due to the increasing number of IoT devices, posing security and dependability concerns. These attacks cause a denial of service (DoS) and network interruption for IoT devices. Researchers have established multiple methods to track down assaults on weak IoT gadgets. This study provides a deep learning and swarm metaheuristic technique for detecting DDoS assaults in an Internet of Things (IoT) setting. The group search firefly method, a revolutionary improvement on the classic firefly algorithm, is used as a feature selection tool to zero in on the best candidates. In addition, the hyperparameters of the …
Cloud Services Selection On The Base Of Decision Support System, Berik Akhmetov, Lyazzat Atymtayeva, Yevheniy Nikitenko, Valery Lakhno, Bakhytzhan Akhmetov, Bagdat Yagaliyeva
Cloud Services Selection On The Base Of Decision Support System, Berik Akhmetov, Lyazzat Atymtayeva, Yevheniy Nikitenko, Valery Lakhno, Bakhytzhan Akhmetov, Bagdat Yagaliyeva
Information Sciences Letters
Recently, enterprises are increasingly using cloud services for efficient work, including decision making. This paper proposes a non-classical version of the Decision Support System (DSS), which provides the choice of the best IT service when migrating an enterprise to a cloud environment. This should increase the efficiency of management decisions in the development of an enterprise’s IT strategy. We have studied the problems of effective implementation of a cloud IT environment in an enterprise (organization), considering information security (IS) risks. At the same time, we have proposed modern approaches to the development of models for the migration of enterprises (organizations) …
Pedagogical Education In The New Kazakhstan: Technological And Methodological Aspects Of Distance Learning For Future Teachers, B. Klara, Y. Mirsat, K. Perizat, A. Amina, A. Turalbayeva, K. Seisekul
Pedagogical Education In The New Kazakhstan: Technological And Methodological Aspects Of Distance Learning For Future Teachers, B. Klara, Y. Mirsat, K. Perizat, A. Amina, A. Turalbayeva, K. Seisekul
Information Sciences Letters
The article defines the technological and methodological aspects of the formation of digital creative competencies of future teachers in the conditions of distance education in the Republic of Kazakhstan and reveals the essence of the concepts of competence, digital competence, digital-technological competence, digital-methodical competence, creativity, smart model and didactic characteristics of digital technologies. In the article, the essence of the components of competence is characterized in a new context: organizational ability; empathic ability; reflexive ability. An online questionnaire was compiled, and an online test was conducted. A mobile application for the online test was developed. Participants included future teachers of …
Cryptovirology Ransomware: A Review Of Dissemination And Mitigation Techniques, Muhammad Imran Sarwar, Louai A. Maghrabi, Kashif Nisar, Imran Khan
Cryptovirology Ransomware: A Review Of Dissemination And Mitigation Techniques, Muhammad Imran Sarwar, Louai A. Maghrabi, Kashif Nisar, Imran Khan
Information Sciences Letters
Digital assets are generally regarded as one of the most valuable assets for an organization. When they are captured for ransom purposes, a serious problem arises, and ransomware is responsible for this. When ransomware gets onto a computer or other electronic device, the data on it is encrypted, made inaccessible, or taken away until a ransom is paid. The culprits behind these activities release and disseminate new and sophisticated variants of illicit wealth and notorious practices. Hardware and antivirus software that detect intrusions are not a permanent solution, as hackers can bypass them easily. After ransomware has been executed on …
Dynamics Of Interactive Audience In The Digital Environment: An Analytical Study With An Application To The Bbc Trending Program, Faisal K. Nagmeldin, Ghada M. Osman
Dynamics Of Interactive Audience In The Digital Environment: An Analytical Study With An Application To The Bbc Trending Program, Faisal K. Nagmeldin, Ghada M. Osman
Information Sciences Letters
This study aimed to investigate the dynamics of virtual audience interaction on social media platforms, specifically Facebook and YouTube. Additionally, it sought to identify the characteristics of the mobile audience in the digital environment and understand the reasons for audience engagement in the digital space. To achieve these objectives, a descriptive methodology was employed, analyzing both verbal and non-verbal language used in audience interactions. The survey method, using content analysis, was the primary approach utilized, leading to the following key findings. The study analyzed the topics covered in selected trending episodes and assessed audience sentiments towards these topics. The research …
Fintech Security Challenges In The Financial Services Industry: A Systematic Literature Review (2018-2022), Afaf Bugawa, Manar Baher, Mohamed Al Zayani
Fintech Security Challenges In The Financial Services Industry: A Systematic Literature Review (2018-2022), Afaf Bugawa, Manar Baher, Mohamed Al Zayani
Information Sciences Letters
Over the past year, financial technology (Fintech) has attracted more and more attention to practice and research. The emergence of financial technology is one of the major modifications to the financial environment caused by technical breakthroughs and the global financial crisis. Studies of financial technology have recently expanded into a number of areas, to the practical side. In addition to helping the Financial Services Industry enhance security, a clear understanding of uses of the fintech ecosystem will be instrumental in developing the most popular and secure fintech application. In order to identify topics for the financial technology research agenda, this …
Transformational Practices Of Academic Leaders In Universities: Suggestions For Improvement, Abdelsalam F. Alawamrah, Najwa A. Darawsheh, Hanadi Alrashdan, Nadia H. Ghalia, Mawaheb Mustafa, Alham Darawsheh
Transformational Practices Of Academic Leaders In Universities: Suggestions For Improvement, Abdelsalam F. Alawamrah, Najwa A. Darawsheh, Hanadi Alrashdan, Nadia H. Ghalia, Mawaheb Mustafa, Alham Darawsheh
Information Sciences Letters
The study aimed to identify the transformational practices of academic leaders in Jordanian universities: proposals for improvement. The qualitative approach was adopted, and interviews were conducted with (30) faculty members from Jordanian universities. The results of these interviews showed that the faculty members presented five proposals to improve the transformational practices of academic leaders. It included: Jordanian universities’ efforts to develop digital infrastructure and activate it within their centers and administrative and organizational structures, and universities’ efforts to provide modern electronic and technical platforms that suit the requirements of workers and suit their current technical skills, and Jordanian universities’ efforts …
Market Analysis And Bidding Strategy Of Hybrid Renewable Energy Systems Considering Emissions, Fatma Elzahraa, Mohamed Elnemr, Samir Dawoud
Market Analysis And Bidding Strategy Of Hybrid Renewable Energy Systems Considering Emissions, Fatma Elzahraa, Mohamed Elnemr, Samir Dawoud
Journal of Engineering Research
The competition in the electricity markets makes it difficult to choose a suitable strategy for maximizing profit while reducing harmful emissions. To have an adequate energy price for consumers while minimizing the harmful emissions to the atmosphere and maximizing profits of all participants in the electricity market needs an aggressive bidding strategy. Developing these bidding strategies with the integration of renewable energy (RE) in the electricity market became important. This research studies various bidding strategies for maximizing profits in the deregulated energy market since participants are keen on developing bidding strategies considering emissions. These bidding strategies will consider the integration …
Website Phishing Detection Using Machine Learning Techniques, R. Alazaidah, A. Al-Shaikh, M. R. Al-Mousa, H. Khafajah, G. Samara, M. Alzyoud
Website Phishing Detection Using Machine Learning Techniques, R. Alazaidah, A. Al-Shaikh, M. R. Al-Mousa, H. Khafajah, G. Samara, M. Alzyoud
Journal of Statistics Applications & Probability
Phishing is a cybercrime that is constantly increasing in the recent years due to the increased use of the Internet and its applications. It is one of the most common types of social engineering that aims to disclose or steel users sensitive or personal information. In this paper, two main objectives are considered. The first is to identify the best classifier that can detect phishing among twenty-four different classifiers that represent six learning strategies. The second objective aims to identify the best feature selection method for websites phishing datasets. Using two datasets that are related to Phishing with different characteristics …
Challenges Of Cloud Computing In Jordanian Govt.: Insights From Telcos, Issam Jebreen, Mouath Alqaisi, Ahmad Al-Qerem, Amer Abu Salem
Challenges Of Cloud Computing In Jordanian Govt.: Insights From Telcos, Issam Jebreen, Mouath Alqaisi, Ahmad Al-Qerem, Amer Abu Salem
Journal of Statistics Applications & Probability
Cloud computing offers many benefits to governments, including increased efficiency, flexibility, and cost savings. However, there are also significant challenges to adopting cloud computing services. In the case of the Jordanian government, some of these challenges include concerns about data security and privacy, lack of technical expertise, limited funding and resources, and cultural resistance to change. This paper examines the challenges faced by the Jordanian government in adopting cloud computing services and evaluates their impact on government institutions. The study collected data from three local telecommunications companies in Jordan to identify potential challenges and assess their significance through a questionnaire. …