Abdulrahman A. Mirza

Abdulrahman A. Mirza
King Saud University | KKUH · Department of Information Systems

About

62
Publications
40,441
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
760
Citations

Publications

Publications (62)
Article
Full-text available
Coronavirus disease 2019 (COVID-19), originating in China, has rapidly spread worldwide. Physicians must examine infected patients and make timely decisions to isolate them. However, completing these processes is difficult due to limited time and availability of expert radiologists, as well as limitations of the reverse-transcription polymerase cha...
Article
Full-text available
Bitcoin, a well-known cryptocurrency, has attracted much attention worldwide and is becoming more widely used. This study develops a hypothesis to investigate and test the impact of Bitcoin on E-Commerce use in Saudi Arabia using a survey research approach. Analyzing factors such as Bitcoin awareness and usage among Saudi Arabian consumers can incr...
Article
Full-text available
Background: While vaccines were one of the most effective tools to combat the COVID-19 pandemic, breakthrough infections have been reported. Aim of the work: We aim to evaluate the effectiveness of Pfizer and AstraZeneca vaccines in preventing breakthrough infection, as well as to determine the possible risk factors and outcomes of post-vaccination...
Article
Full-text available
Background: Little is known about the impact of hypothyroidism and its contribution to learning difficulties and academic performance in college-age students. Objective: The objective is toassess the frequency of hypothyroidism and its associations with academic performance in college-age students. Methods: A cross-sectional study included 395...
Article
Full-text available
Coronavirus disease (COVID-19) is a viral pneumonia that originated in China and has rapidly spread around the world. Early diagnosis is important to provide effective and timely treatment. Thus, many studies have attempted to solve the COVID-19 classification problems of workload classification, disease detection, and differentiation from other ty...
Article
Full-text available
Research in recent years has shown a merge between the areas of requirements engineering and semantic technologies. With the release of the semantic concept and the progress of semantic technologies, the opportunities for applying ontologies as a means to define information and knowledge semantics have become increasingly accepted in different doma...
Article
Full-text available
The Requirements elicitation involves knowledge intensive and collaborative activities. Requirements engineering research has proposed a range of knowledge elicitation and requirements gathering techniques, few of which apply specific strategies for eliciting tacit knowledge from stakeholders. The difficulty of taking the deliberate advantage of im...
Article
Full-text available
Requirements engineering is one of the most important pillars of software engineering. Its success contributes greatly to that of the software as a whole. In fact, the software development process is not devoid from changing requirements, which affects the cost, time and quality of the final software. The change problem is unavoidable and also swel...
Article
Ontology and its role in both software engineering and knowledge management fields have been widely reported in literature. Different studies had proven the effectiveness of using ontologies to support the process of requirement engineering. One of the main problems facing requirement engineering is that the requirements are exposed to change. In f...
Article
Full-text available
Ontology and its role in both software engineering and knowledge management fields have been widely reported in the literature. Numerous studies have proven the effectiveness of using ontologies to support the process of requirements engineering. One of the main problems facing requirements engineering is that the requirements are exposed to change...
Conference Paper
In today's interconnected high-tech world, healthcare organizations are especially concerned with managing and securing health-related information. Threats exist from different sources, and breaches have undesirable impact on the healthcare organization. In order to enhance the organization's security, a precise and clear information security polic...
Conference Paper
The research in the field of e-commerce security and cyber frauds is continually arising. Many measures were taken to facilitate dealing with security attacks to protect the e-commerce system as a whole. However, most of these measures work only after the attack took place. In this research, we take a new approach in identifying some symptoms relat...
Article
Full-text available
E-extension as a modern mode of communication can be used to improve the effectiveness and efficiency of extension services for agricultural sustainability. E-extension is the delivery of extension services using the Internet and the latest information communication technologies (ICTs), which allow networking, online sharing, and collaboration. Ext...
Chapter
Advertising is a major commercial activity in the Internet. Nowadays, online social networks present a new way of disseminating advertisements. This new way is considered the fastest way to reach large groups of customers. Even so, there has been little research focus on advertising through users in social networks. In this research paper, a focus...
Research
Full-text available
This paper identifies the common characteristics of Saudi travelers and their behavior during planning their trips online. Moreover, it evaluates the level of adoption of e-travel services among Saudi travelers by assessing satisfaction toward these services and the intention to use them in the future.
Article
Full-text available
Human factor represent an essential issue in the security of information in organizations, as human factor determine the behavior of the employees toward information security. This paper attempts to integrate related human factors, recognized by previous work, into a structured comprehensive framework. The framework has four main domains that take...
Article
Full-text available
The efficiency of various technical information security controls is based on the 'people' who interact with the information every day. Information security culture aims at protecting information assets by guiding how things are done in organization in regard to information security through influencing employees' security behavior. This paper revie...
Article
Full-text available
In this paper we describe a case where the top management of a small holding company is involved in a love-hate relationship with its own IT department. The top management firmly believes that IT staff is involved in leaking out company’s secrets. However, having no expertise in IT and even lesser grasp on the complexity of IT architecture resultin...
Conference Paper
Full-text available
Information security culture guides how things are done in organization in regard to information security, with the aim of protecting the information assets and influencing employees' security behavior. In this paper, we review key literature on information security culture that was published in the period during 2003-2013. The objective was to ide...
Conference Paper
Mobile commerce user interface has different issues affecting overall attitude towards the participation in mobile commerce shopping. There is a lack in the literature that has identified problems, elements, and characteristics of user interface preferences in mobile commerce from the Saudi Arabian customers’ point of view. Although some research h...
Article
Full-text available
Establishing information security culture within an organization may include transformation of how employees interact with the information assets which may be challenged with resistance, fear or confusion. Change management skills could assist organization members to smoothly adapt to the new culture. The use of change management in information sec...
Article
substantial growth in online social networks has vastly expanded the potential impact of electronic word of mouth (eWOM) on consumer purchasing decisions. A critical literature review exposed that there is limited research on the impact of online consumer reviews on online purchasing decisions of Saudi Arabian consumers. This research reports on re...
Article
A smart phone is a mobile phone that runs complete operating system and offers advance capabilities features like e-mail, Internet and e-book reader capabilities, calendar, compass, camera, maps and/or a built-in full keyboard or external USB keyboard and VGA connector. As the technology develops, users need more security for device and the applica...
Article
In this study a new method for Steganography is proposed. This method is base on Mackey-Glass series. This series is used to determine the position of every bit of secret image in the cover image. The main advantage of this method is the homogenous distribution of the secret image pixels in the cover image pixels that it causes the stability of the...
Article
Full-text available
In the extension of our paper [1], we further elaborate our results with iris template in wireless sensor network. This paper presents routing protocol architecture based on recursive group algorithm. This algorithm apply Group Verification Tree approach which makes the sensor network secure and make it safer from malicious intrusions and illegi...
Article
Full-text available
Nowadays, most of e-service portals focus on individual users rather than considering shared characteristics that could be useful when searching a portal. Service providers searching activities involve different types of common user behaviors and preferences that should be considered. Thus, group profiling can be used to group customers with simila...
Article
Full-text available
Character recognition has been fascinating and intense field of pattern recog-nition research since early days of computer. This task becomes more challenging when it involves Urdu script based languages especially written in handwritten Nasta'liq font due to the large variations and complexity of the script. Fuzzy logic is an important tool to dea...
Article
Full-text available
In the past decade, information and communication technologies (ICT) have led to an increasing impact on tourism industry. This industry is ranked now as the prime sector in e-commerce, where the Internet has changed the traditional way of providing travel services by developing e-travel services and enabling consumers to interact directly with tou...
Article
Online banking is a new aspect of traditional banking for managing finances more quickly and efficiently based on internet technology. Securing funds and customer information are a key factor in online banking. This paper outlines the security problems in online banking then investigates the current security mechanisms and their corresponding secur...
Article
Full-text available
E-assessment is a key element in any e-learning system, needed to evaluate the learning process. It can be successfully and easily carried out on Multiple Choice Questions. However, e-assessment of essay questions is much harder than that of Multiple Choice questions. Consequently, it is a growing area of research. This paper presents an approach t...
Conference Paper
The proposed techniques in the paper is based on grayscale level incremented/decremented method. In this paper we used CASIA dataset for experimentation. Efficient results were achieved with respect to image hiding validated by entropy. Graphical results are also shown at the end to visualize our results.
Article
Full-text available
Handwritten character recognition is one of the most fascinating, complex and challenging task of pattern recognition research and it has been an ongoing research since the early days of computer. The aim of character recognition is to imitate the human reading capabilities to machine so that it can act like human. Although it is a very difficult t...
Conference Paper
Full-text available
E-assessment is a key element in any e-learning system, needed to evaluate the learning process. It can be successfully and easily carried out on Multiple Choice Questions (MCQs). However, e-assessment of essay questions is much harder than that of MCQs. Consequently, it is a growing area of research. This paper presents an approach to assess short...
Article
Full-text available
Medical image segmentation is a very important issue in medical imaging. An automatic brain MR image segmentation method has been proposed for tumor detection in this paper. Discretize local window and wrapping based Curvelet transform has been used to remove rician noise. A modified fuzzy C-mean algorithm is used for segmentation of brain MR image...
Article
Full-text available
Many universities around the world are investing in implementing different Virtual Learning Environments (VLEs) to support the teaching and learning process. However, without an effective implementation, many objectives and advantages are unachieved. Therefore, a well designed strategy to follow is vital to the success of an effective implementatio...
Article
Full-text available
Traditional academic institutions as well as newly established online or hybrid educational organizations in the Middle East (ME) are still in the early phases of trying to get students and their parents to accept and adapt to the concept of e-learning. Different countries and different universities within individual countries within the ME have ac...
Conference Paper
Full-text available
Nowadays Service activities are social and involve different types of individuals that should be considered. Thus, group profiling can be used to connect similar customers together and recommend providers based on group evaluation. Accordingly, this paper proposes a new approach that recommends providers, based on group profiling and ranking, to be...
Conference Paper
Full-text available
This paper presents a routing protocol architecture based on recursive group algorithm. This algorithm apply Group Verification Tree approach which makes the sensor network secure and make it safer from malicious intrusions and illegitimate users. The proposed approach will give a new dimension to the fast and secure routing in the sensor networks...
Conference Paper
In the current knowledge society, adoption of information technology (IT) innovation initiatives has become a necessity for the success of most organizations. The decision to adopt information technology solutions however must be made on welldefined user requirements, and not on mere high-expectations. In this paper we present a case study of an am...
Conference Paper
This paper presents selective results of a survey conducted to find out the much needed insight into the status of information security in Saudi Arabian organizations. The purpose of this research is to give the state of information assurance in the Kingdom and to better understand the prevalent ground realities. The survey covered technical aspect...
Conference Paper
Smart cards are a relatively modern application that greatly relies on RFID technology. The main purpose behind this paper is to present the main applications of smart cards within university settings. Many uses of smart cards were identified, with the top three being personal identification, book borrowing, and library access. Other applications,...
Article
This paper presents a Web-based tool for solving inventory model problems based on stationary demand. This tool can help users in answering inventory model questions such as what is the optimum order quantity and what is the optimal production run size? Novice users, or students learning such inventory models will be guided towards accumulating the...
Chapter
Organizations are under increasing pressure to adopt Internet-based e-business solutions for improving internal efficiency and collaboration with partners, suppliers, and customer firms within the environment of e-business webs. To realize these benefits, companies must transition towards an e-business organization. Such transformation demands IT k...
Chapter
When a firm moves from an e-commerce to an e-business enterprise, the technology-driven transformation generates new demand on their IT services and capability. Successful deployment of e-business solutions requires business process change and Internet-based enterprise systems to support inter-enterprise collaboration. These directions challenge fi...
Conference Paper
This work presents a Web-based tool for solving inventory model problems based on stationary demand. The idea behind the tool is to develop a set of dynamic tools that can be easily accessed and utilized by users, both novices and experts, in dealing with inventory model problems. Regardless of the user type, the tool can guide the user into achiev...
Conference Paper
While Saudi residents anxiously await the introduction of the Internet into Saudi Arabia, many have already started taking advantage of the services of the Internet through neighboring countries of the Arabian Gulf peninsula. This paper will take a brief look at the main reason for delay, current status, and current applications of the Internet tec...
Article
This paper presents an ongoing research to determine the most popular skills of the e-commerce workforce based on e-commerce skills requirements present in online job locator websites. A large number of online job ads for e-commerce related positions have been already identified representing different geographical areas of the United States. Data i...
Article
This paper presents a case study of an ambitious charitable organization that decided to start developing its information systems at a very early stage in the life of the foundation. Even after the completion of the information system, almost two years after the initiation of the project, operational functions of the foundation were still transform...
Article
In a society where the intermixing of genders is not allowed within most educational settings, the Master of Health Informatics program at the King Saud bin Abdulaziz University for Health Sciences utilizes modern telecommunications tools towards the simultaneous delivery of courses by its mainly male faculty to both male and female students. This...
Article
When companies move from an e-commerce to an e-business enterprise, the technology–driven transformation generates new demand of IT workers. This paper examines several factors pertinent to e-business transformation, in terms of changes in architecture, enterprise applications, application development environment, organization change process, and t...
Article
This paper introduces an intelligent, rule-based tool set for the re-engineering of programs, called the Program transformation and Normalization (PROTRAN) system. One of the main objectives of the development of the PROTRAN system has been to facilitate the process of program recognition, a necessary step in automated fault localization. The idios...
Article
This paper presents a comparative analysis of the perspectives of IT workers and end-users on the situation of information security measures based on selective results of a survey of IT workers and end-users conducted to produce a much needed insight into the status of information security in the Kingdom of Saudi Arabian (KSA) organizations. The ma...
Article
Thesis (Ph. D.)--Illinois Institute of Technology, 1995. Includes bibliographical references (leaves 141-147).

Network

Cited By