Evaluation of the research measurement model

Evaluation of the research measurement model

Source publication
Article
Full-text available
In this digital age, fraudulent practices are among the most challenging that organizations must be aware of due to the increasing use of online transactions. This also applies to the banking sector whose business has become more complex with the recent developments in information and communication technology, which has changed the nature of bank f...

Contexts in source publication

Context 1
... CFA plays a pivotal role in ascertaining whether the empirical data collected aligns with the theoretical assumptions underlying the constructs ( Aityassine et al., 2021). Table 1 offers a comprehensive overview of the outcomes pertaining to the validity and reliability assessments associated with the measurement model encompassing cybersecurity and fraud prevention. The outcomes presented in Table 1 underscore a robust and reliable relationship between the observed variables and their corresponding latent constructs within the context of cybersecurity and fraud prevention. ...
Context 2
... 1 offers a comprehensive overview of the outcomes pertaining to the validity and reliability assessments associated with the measurement model encompassing cybersecurity and fraud prevention. The outcomes presented in Table 1 underscore a robust and reliable relationship between the observed variables and their corresponding latent constructs within the context of cybersecurity and fraud prevention. The factor loadings for the observed variables fell within a range of 0.662 to 0.851. ...

Citations

... The documentation process, as stated in the International Auditing Standard (230), is the process of creating documents (working papers) that document the audit process in terms of procedures, evidence, and results, whether in the form of stored such as information, films, electronic media, or any other form in which it is kept it the auditor must document any significant evidence and evidence that supports his opinion (Kayikci & Khoshgoftaar,2024). Tariq et al. (2024). argues that electronic auditing of Jordanian commercial banks is of high importance, and identifying electronic audit samples is considered one of the most important procedures, and then documenting the electronic audit procedures. ...
Article
Full-text available
This research aimed to identify the impact of electronic audit procedures in all their dimensions, which are (planning the audit process, examining and evaluating the internal control system over electronic operation, evidentiary evidence in terms of adequacy and timing of obtaining it, documenting electronic audit procedures, identifying electronic audit samples) on the quality of financial reports in Jordanian commercial banks in light of corporate gov-ernance The descriptive analytical approach was followed for the study, and to achieve the primary objective of the study, a questionnaire was developed and distributed to (13) Jordanian commercial banks, and (170) questionnaires were distributed to those working in the field of accounting and auditing. (143) questionnaires were retrieved, with a percentage of (84%) of the fully distributed banks, and (9) questionnaires were excluded due to incomplete filling out (6%). The data was processed using the Statistical Package for the Social Sciences (SPSS) program, such as the Pearson correlation coefficient, Cronbach alpha test, multiple regression test, and hierarchical regression test The research reached several results, most notably: commercial banks interested in electronic auditing procedures, by paying attention to all dimensions of electronic auditing, and the presence of a positive impact of institutional governance on the quality of financial reports in commercial banks. Based on the results, it recommends increasing the interest of Jordanian commercial banks in electronic auditing procedures to increase the quality of its financial reports, and the necessity of using modern technological means and methods and electronic auditing techniques in the audit process. JEL classification: M42, G32, G34, K40
... A sampling strategy was adopted for primary data collection to address the broader research population and study restrictions. In order to ensure the generalizability of findings, a convenience sampling method was utilized, with a requirement of at least 150participants, aligning with the recommendations of [91]. Consequently, the research instrument was distributed to 180managers. ...
Chapter
Full-text available
This research aims to provide a comprehensive analysis of the impact of applying the Six Sigma methodology on organizational flexibility in the context of the Jordanian Customs Department (JCD). The research seeks to understand the relationship between Six Sigma practices and organizational agility, which is vital for a department to respond effectively to market challenges and organizational changes. The research used a quantitative survey approach to collect data, and data analysis was done using structural equation modeling (SEM) to determine the relationships between variables. The results showed a positive relationship between Six Sigma implementation and JCD flexibility, as adopting Six Sigma practices improved process efficiency and increased organizational flexibility. Based on the findings, recommendations were made including strengthening Six Sigma capabilities, promoting a culture of continuous improvement, and leveraging data analytics to enhance operational effectiveness and responsiveness within JCD. This research contributes to providing empirical evidence on the impact of Six Sigma on organizational resilience in the public sector and provides practical recommendations for organizations seeking to improve their operational performance and adapt in a dynamic and competitive environment.
... The growing use of innovative technologies is accelerating progress and accessibility across various fields [1][2][3][4][5][6][7][8], leading organizations in all sectors to constantly adapt to challenges and opportunities from technological advancements and changing market dynamics [9][10][11]. Therefore, the substantial role of AI cannot be ignored, as it possesses the capability to revolutionize the economic framework of SMEs [12]. ...
Chapter
Full-text available
In a period where interest in Artificial Intelligence (AI) is rapidly increasing, there remains a notable research gap, especially in the context of AI adoption in Small and Medium Enterprises (SMEs). This study seeks to address this gap by investigating AI acceptance in Jordanian SMEs. Considering Jordan’s cultural environment of high uncertainty avoidance, the research focuses on the role of perceived trust on AI adoption. It utilizes the Stimulus-Organism-Response (S–O–R) framework in combination with the Technology Acceptance Model (TAM) to thoroughly examine these perceptions and their impact on acceptance factors. The study employs Structural Equation Modeling (SEM) to rigorously test its measurement and structural models. Its findings, which corroborate all proposed hypotheses, highlight the essential role of perceived trust in fostering a positive attitude towards AI among Jordanian SMEs.
... There is a growing consensus that the innovative use of cutting-edge information and communication technologies offers new opportunities to accelerate human progress in various sectors [1][2][3][4]. Information technology (IT) developments have facilitated easier access to healthcare, extended universal health coverage to more individuals, and protected health emergencies [3,[5][6][7]. ...
Chapter
Full-text available
Electronic Health Records (EHR) are essential in modern healthcare, underpinning e-health initiatives. This study conducts a bibliometric analysis using VOSviewer software toanalyze data from the Scopus database. The examination of a vast array of 10,701 EHR-related documents from 1991 to 2023 aims to highlight the growth, current trends, and prospects for the future. This study observed a significant increase in EHR-related publications over the years, predominantly led by the United States, with substantial input from the United Kingdom, China, and India. In the Arab region, Saudi Arabia, Egypt, Jordan, the United Arab Emirates, Qatar, and Morocco are notable contributors, with institutions like King Saud University at the forefront of Arab academic research. Key terms such as EHR, machine learning, and blockchain dominate, indicating a focus on advanced technology in healthcare. The study also stresses the importance of addressing privacy, security, and patient safety in EHR research. This comprehensive examination is anticipated to make a significant impact on the field, providing a solid understanding of the role of EHR in healthcare and influencing future research and policymaking in this area.
... The convergent validity, composite reliability, and discriminant validity were checked according to the procedure prescribed by (Muda et al., 2022) The findings that emerged from the estimates depicted in Table 1 reaffirmed substantive and positive convergent validity with regard to the relations between the measures of the underlying constructs and their respective factors of loading, which ranged from 0.611 to 0.813. These loadings exceeded the 0.50 cutoff suggested by Tariq et al. (2024). The measure of convergent validity, which is the Average Variance Extracted (AVE), was established to show values ranging from 0.522 to 0.604 for all constructs, surpassing the accepted threshold of 0.5, as per (Zuhri et al., 2023). ...
Article
With the rapid advancement of blockchain technology, SMEs face an opportunity to leverage decentralized ledger systems to address longstanding challenges related to financial transparency. This study aims to assess the implications of blockchain adoption for SMEs operating in the Jordanian context, focusing on its potential to improve accountability, trust, and efficiency in financial operations. Drawing on quantitative research methods, this paper examines the current state of financial transparency using a structural equation modeling approach of 215 surveys. The findings indicated that there is a positive impact of block-chain technology on enhancing financial transparency. The findings of this research contribute to both academic understanding and practical implications for policymakers, regulators, and SMEs in Jordan seeking to enhance financial transparency through blockchain technology. By shedding light on the positive impact of blockchain on financial transparency in the Jordanian SME sector, this paper aims to inform strategic decision-making and stimulate further research in this emerging field. Ultimately, it underscores the transformative potential of block-chain technology in promoting accountability, trust, and eco-nomic development among SMEs in Jordan and beyond.
... A sampling strategy was adopted for primary data collection to address the broader research population and study restrictions. In order to ensure the generalizability of findings, a convenience sampling method was utilized, with a requirement of at least 200 participants, aligning with the recommendations of [55,62]. Consequently, the research instrument was distributed to 300IT professionals. ...
Chapter
Full-text available
This study investigates how the quality of electronic archiving impacts organizational development in Jordanian private hospitals. It assesses various dimensions of organizational development, including effectiveness, efficiency, data management, and decision-making processes. Quantitative data was collected from 217 IT professionals across multiple private hospitals in Jordan. Statistical methods, notably Structural Equation Modeling (SEM), were utilized to examine the relationship between electronic archiving quality and organizational development indicators. Findings reveal a significant positive influence of high-quality electronic archiving systems on various organizational development components in private hospitals. These systems streamline administrative tasks, improve information accessibility and accuracy, facilitate collaboration among healthcare practitioners, and support evidence-based decision-making. The study underscores the importance of investing in advanced electronic archiving technology to align with the development objectives of Jordan's private hospitals. By offering empirical evidence, this research contributes to understanding how electronic archiving quality fosters organizational growth in Jordanian private healthcare facilities, providing insights for strategic decision-making and investments to promote continuous development and expansion in private healthcare organizations.
... Technology management involves strategically overseeing and directing technology systems, innovations, and capabilities within an organization [55][56][57][58][59][60][61]. This discipline encompasses activities such as identifying technological opportunities, effectively utilizing technological assets and aligning technology initiatives with the organization's strategic and operational goals [62][63][64][65][66][67][68][69][70][71][72][73][74][75][76][77][78][79][80]. At its core, technology management bridges the gap between technological advancements and business strategy to secure a sustained competitive advantage. ...
Chapter
Full-text available
The study aims to understand evolving trends and patterns in technology management research. Given the critical role of technology management in shaping organizational strategy and operations, a systematic analysis is necessary to explore how this field has evolved, identify the most researched areas, and determine which countries and institutions are leading in this domain. The primary objective of the study is to conduct a comprehensive bibliometric review of technology management research. Using bibliometric techniques, the study investigates contemporary trends in technology management. Utilizing VOSviewer version 1.6.20, the research focused on the Web of Science (WoS) database, targeting publication titles that include the keyword “technology management.” This method yielded a dataset of 413 relevant publications, which were analyzed to determine trends in publication frequency, geographical distribution, institutional contributions, disciplinary diversity, and keyword prominence. By identifying leading countries, institutions, and interdisciplinary contributions, the study highlights how technology management practices have adapted to changing technological and market demands.
... Transitioning to the economic sphere, recent studies show that worker mobility influences business decisions on adopting new technologies like machine learning, revealing complex dynamics [8,[51][52][53][54][55][56][57][58][59]. Businesses tend to adopt new technologies when they perceive a return on investment, either through enhanced productivity or competitive advantage [60][61][62][63][64][65][66][67][68][69]. ...
Chapter
Full-text available
This study addresses the complexities of adopting machine learning (ML) technologies across various industry sectors, despite their recognized benefits. It aims to conduct a bibliometric review of ML adoption, providing an in-depth analysis of how ML technologies have been developed and integrated across different fields. Employing bibliometric analysis with VOSviewer v.1.6.20 software and the Web of Science (WoS) database, this study explores trends in ML adoption. The implications of this research are significant, impacting both academic research and industry practices. Academically, it enriches the literature on ML by highlighting key works, trends, and gaps that could steer future research directions. For industry professionals, the study provides insights into effective ML adoption strategies and underscores the challenges that need addressing to fully leverage ML technologies.
... Last page of DNC cyber security documents including Cyber threat intelligence alignment DNC: The fire mute of key incidents 2016: Timeline of events. As early as 2016, constructive affairs of the DNC observed unexplainable events on the networks [6]. By these times since beginning 2016 or thereabouts DNC secured CrowdStrike to investigate the hack. ...
Article
Full-text available
The CrowdStrike incident is also helpful in evaluating the understanding of who is defending from cyber-attacks and what methods are being used. This pen works on the deep understanding of how this attack was performed, how the adversary detailed it step by step, what TTPs were used, and what an APT is at all. Deconstructing the CrowdStrike incident, this research shows how intruders implant themselves in the enterprise network and how this intrusion can be repelled or at least made less impactful towards preemptive security measures, real time threat intelligence, and effective response actions. This study also looks into how machine learning and AI based tools respond to and prevent cyber-attacks. Conclusions indicate progress and attacks in cyberspace, and the need for new approaches in protection of systems from such incidents. Keywords: CrowdStrike Incident; Cybersecurity breaches; Advanced persistent threats (APT); Threat intelligence; Vulnerability exploitation; Data breaches
... Threat and vulnerability analysis faces a number of problems and challenges. The first of them is the volume and complexity of data -because a huge amount of information is generated in the Internet space, including messages of various styles, topics and levels of technical complexity [8]. Processing and analysis of this textual data requires natural language processing tools and algorithms that can distinguish important signals from the noise [9]. ...
Article
Full-text available
The object of this study is the process of detecting threats and vulnerabilities in hacker forums, which are a well-known source of potential dangers for Internet users. However, the problem of analyzing and classifying data from these forums is its complexity due to such features of the participants' language as specific slang, jargon, etc., which requires the use of modern tools of their processing. This paper explores the application of machine learning to devise an effective method for analyzing sentiment and trends in hacker forums to identify potential threats and vulnerabilities in cyberspace. All necessary stages of the process of detecting threats and vulnerabilities have been developed, ranging from data collection and preprocessing to the training of a model that is capable of processing “raw” unstructured data from hacker forums. The implementation of six popular machine learning algorithms, namely k Nearest Neighbors (kNN), Random Forest, Naive Bayes, Logistic Regression, Support Vector Machines (SVM), and Decision Tree algorithms have been studied with a view to determining their efficiency of threat and vulnerability detection and classification. The experiments have been conducted on real data (150,000 messengers). It has been determined that the Random Forest algorithm coped with the task the best (accuracy=0.89, recall=0.84, precision=0.91, F1-score=0.87 and ROC-AUC=0.89). The proposed tool based on machine learning not only collects data that poses a potential threat but also processes and classifies it according to the specified keywords. This allows detecting threats and vulnerabilities at a high speed. The results of the study make it possible to identify potential trends in threats and vulnerabilities. This will contribute to the improvement of cybersecurity systems and ensure more reliable protection of information resources