About
29
Publications
63,206
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
937
Citations
Publications
Publications (29)
The smart city has emerged as a revolutionary concept that connects all the different aspects of our life, and the world is witnessing a change of the cities to become smart. As most of the literature related to smart cities refers to the experience of such projects in the context of developed countries, the primary aim of this study was to examine...
Predicting student performance is a critical aspect of educational systems. Although forecasting a student’s future performance is essential in many applications, it is a challenging process due to various factors. Previous research in this area has mainly focused on comparing machine learning methods to automate student evaluation and predict thei...
Education is a fundamental sector in all countries, where in some countries students com-pete to get an educational grant due to its high cost. The incorporation of artificial intelli-gence in education holds great promise for the advancement of educational systems and pro-cesses. Educational data mining involves the analysis of data generated with...
With the increasing popularity of mobile learning in educational settings, the use of social networking sites (SNSs) as a tool for remote learning has become increasingly prevalent. However, the negative aspects of mobile learning through SNSs have not been extensively explored by scholars. Therefore, in this paper, we aim to investigate the impact...
This work proposes a blind fragile GOP-based watermarking technique that ensures the H.264-AVC video's content authenticity. In the H.264 video, the self-authentication code is created by securely hashing a number of intra prediction modes of I-frames in addition to motion vectors of P-frames and B-frames. The resulting authentication code is subse...
The development of emotion detection technology has emerged as an efficient possibility in the corporate sector due to the nearly limitless uses of this new discipline, particularly with the unceasing propagation of social data. In recent years, the electronic marketplace has witnessed the establishment of various start-up businesses with an almost...
Smart cities have become an influential concept in urban development. Smart cities and their applications aim to maintain a high quality of life by using smart technologies and enhancing economic productivity. Previous systematic literature reviews have considered the development of smart cities and highlighted their applications and services. Howe...
The spread of e-learning as an alternative to traditional or face-to-face education has faced many problems and challenges in general and ethical and legal challenges in particular. This study aims to measure students’ awareness of the safe use of technology and its tools in e-learning that is consistent with ethical and legal standards. The study...
The development of emotion detection technology has emerged as a highly valuable possibility in the corporate sector due to the nearly limitless uses of this new discipline, particularly with the unceasing propagation of social data. In recent years, the electronic marketplace has witnessed the establishment of a large number of start-up businesses...
Software defect prediction is a promising approach aiming to improve software quality and testing efficiency by providing timely identification of defect-prone software modules before the actual testing process begins. These prediction results help software developers to effectively allocate their limited resources to the modules that are more pron...
Enterprise resource planning (ERP) systems are usually adopted through two major options: cloud computing or on-premise infrastructure. The issues related to hardware, servers, implementation costs, and facilities, which are necessary to run on-premise ERP systems, are rather great for small and mid-sized enterprises (SMEs). The purpose of this res...
this study examines the adoption of a powerful management system known as Enterprise Resource Planning (ERP) with focus on Jordanian organizations. The study examined the impact of technological, internal, and external factors that influence ERP systems adoption. For this purpose, we have adopted a well known technological-organizational-environmen...
Productive firms try to deliver high-quality products to be globally competitive. Therefore, software development firms need to adhere to a set of best practices that improve their processes. Capability maturity model integration (CMMI) comprehensively assesses the maturity of a firm's processes. Representing a major departure from the traditional...
Along with the exponential increase in internet and smart device usage, social networking sites (SNSs) have gained popularity due to their attractive features. The youth of most societies are adopting SNSs at high rates and spending increased amounts of time using them compared to other websites. The time spent on SNSs could reach more than 1 hour...
Current RFID ultralightweight authentication protocols have security pitfalls; thus, SURV, a potentially high-security protocol, based on the use of on-tag lightweight cryptography and on-reader standard cryptography, is proposed. Furthermore, the updating of internal values is only executed on tags and conditioned to a successful mutual authentica...
With the use of Web 2.0 technology, e-commerce is undergoing a radical change that enriches consumer involvement and enables a better understanding of economic value. This emerging phenomenon is known as social commerce. Social commerce (s-commerce) presents a new alternative for consumers to search for and find information about products they are...
With the use of Web 2.0 technology, e-commerce is undergoing a radical change that enriches consumer involvement and enables a better understanding of economic value. This emerging phenomenon is known as social commerce. Social commerce (s-commerce) presents a new alternative for consumers to search for and find information about products they are...
Online interactions pave the way for new streams of collaborations and support among connected users of social networking sites, and this collaboration is leveraged for business purposes. The purpose of this paper is to contribute to a growing body of research on social commerce by studying individuals’ behavior from the consumer perspective of inf...
This paper contributes to a growing body of research on the process by which small- and medium-sized businesses (SMBs) adopt social network sites (SNSs) as part of their business strategies. If SMBs make use of SNSs, they could potentially compete with big corporations, flattening the marketplace. Open-ended online survey questions were used to col...
This research examines the adoption of a powerful management system known as enterprise resource planning (ERP). The study focuses on Jordanian organizations and the impact of technological, internal, and external factors that influence ERP systems adoption. For this purpose, we have adopted a famous organization-level theory, the technological-org...
Current RFID ultralightweight authentication protocols have security pitfalls; thus, SURV, a potentially high-security protocol, based on the use of on-tag lightweight cryptography and on-reader standard cryptography, is proposed. Furthermore, the updating of internal values is only executed on tags and conditioned to a successful mutual authentica...
Purpose – This paper’s research objective is to contribute to a growing body of research on cloud computing, by studying the SME adoption process. If SMEs have access to scalable technologies they could potentially deliver products and services that in the past only large enterprises could deliver, flattening the competitive arena.
Design/methodol...
Research was conducted to investigate the major factors affecting cloud computing adoption among SMEs. Our theoretical framework is based on the Technological, Organisational and Environmental (TOE) Model, with our early empirical evidence stemming from data collected while conducting semi structured interviews with nine companies. The analysis of...