Yazan Alshamaileh

Yazan Alshamaileh
University of Jordan | UJ · Department of Business Information Systems

About

29
Publications
63,206
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
937
Citations

Publications

Publications (29)
Article
The smart city has emerged as a revolutionary concept that connects all the different aspects of our life, and the world is witnessing a change of the cities to become smart. As most of the literature related to smart cities refers to the experience of such projects in the context of developed countries, the primary aim of this study was to examine...
Article
Full-text available
Predicting student performance is a critical aspect of educational systems. Although forecasting a student’s future performance is essential in many applications, it is a challenging process due to various factors. Previous research in this area has mainly focused on comparing machine learning methods to automate student evaluation and predict thei...
Article
Full-text available
Education is a fundamental sector in all countries, where in some countries students com-pete to get an educational grant due to its high cost. The incorporation of artificial intelli-gence in education holds great promise for the advancement of educational systems and pro-cesses. Educational data mining involves the analysis of data generated with...
Article
Full-text available
With the increasing popularity of mobile learning in educational settings, the use of social networking sites (SNSs) as a tool for remote learning has become increasingly prevalent. However, the negative aspects of mobile learning through SNSs have not been extensively explored by scholars. Therefore, in this paper, we aim to investigate the impact...
Article
Full-text available
This work proposes a blind fragile GOP-based watermarking technique that ensures the H.264-AVC video's content authenticity. In the H.264 video, the self-authentication code is created by securely hashing a number of intra prediction modes of I-frames in addition to motion vectors of P-frames and B-frames. The resulting authentication code is subse...
Article
Full-text available
The development of emotion detection technology has emerged as an efficient possibility in the corporate sector due to the nearly limitless uses of this new discipline, particularly with the unceasing propagation of social data. In recent years, the electronic marketplace has witnessed the establishment of various start-up businesses with an almost...
Article
Smart cities have become an influential concept in urban development. Smart cities and their applications aim to maintain a high quality of life by using smart technologies and enhancing economic productivity. Previous systematic literature reviews have considered the development of smart cities and highlighted their applications and services. Howe...
Article
Full-text available
The spread of e-learning as an alternative to traditional or face-to-face education has faced many problems and challenges in general and ethical and legal challenges in particular. This study aims to measure students’ awareness of the safe use of technology and its tools in e-learning that is consistent with ethical and legal standards. The study...
Preprint
Full-text available
The development of emotion detection technology has emerged as a highly valuable possibility in the corporate sector due to the nearly limitless uses of this new discipline, particularly with the unceasing propagation of social data. In recent years, the electronic marketplace has witnessed the establishment of a large number of start-up businesses...
Article
Full-text available
Software defect prediction is a promising approach aiming to improve software quality and testing efficiency by providing timely identification of defect-prone software modules before the actual testing process begins. These prediction results help software developers to effectively allocate their limited resources to the modules that are more pron...
Article
Full-text available
Enterprise resource planning (ERP) systems are usually adopted through two major options: cloud computing or on-premise infrastructure. The issues related to hardware, servers, implementation costs, and facilities, which are necessary to run on-premise ERP systems, are rather great for small and mid-sized enterprises (SMEs). The purpose of this res...
Article
Full-text available
this study examines the adoption of a powerful management system known as Enterprise Resource Planning (ERP) with focus on Jordanian organizations. The study examined the impact of technological, internal, and external factors that influence ERP systems adoption. For this purpose, we have adopted a well known technological-organizational-environmen...
Article
Full-text available
Productive firms try to deliver high-quality products to be globally competitive. Therefore, software development firms need to adhere to a set of best practices that improve their processes. Capability maturity model integration (CMMI) comprehensively assesses the maturity of a firm's processes. Representing a major departure from the traditional...
Article
Along with the exponential increase in internet and smart device usage, social networking sites (SNSs) have gained popularity due to their attractive features. The youth of most societies are adopting SNSs at high rates and spending increased amounts of time using them compared to other websites. The time spent on SNSs could reach more than 1 hour...
Article
Current RFID ultralightweight authentication protocols have security pitfalls; thus, SURV, a potentially high-security protocol, based on the use of on-tag lightweight cryptography and on-reader standard cryptography, is proposed. Furthermore, the updating of internal values is only executed on tags and conditioned to a successful mutual authentica...
Article
Full-text available
With the use of Web 2.0 technology, e-commerce is undergoing a radical change that enriches consumer involvement and enables a better understanding of economic value. This emerging phenomenon is known as social commerce. Social commerce (s-commerce) presents a new alternative for consumers to search for and find information about products they are...
Article
Full-text available
With the use of Web 2.0 technology, e-commerce is undergoing a radical change that enriches consumer involvement and enables a better understanding of economic value. This emerging phenomenon is known as social commerce. Social commerce (s-commerce) presents a new alternative for consumers to search for and find information about products they are...
Article
Full-text available
Online interactions pave the way for new streams of collaborations and support among connected users of social networking sites, and this collaboration is leveraged for business purposes. The purpose of this paper is to contribute to a growing body of research on social commerce by studying individuals’ behavior from the consumer perspective of inf...
Article
Full-text available
This paper contributes to a growing body of research on the process by which small- and medium-sized businesses (SMBs) adopt social network sites (SNSs) as part of their business strategies. If SMBs make use of SNSs, they could potentially compete with big corporations, flattening the marketplace. Open-ended online survey questions were used to col...
Conference Paper
Full-text available
This research examines the adoption of a powerful management system known as enterprise resource planning (ERP). The study focuses on Jordanian organizations and the impact of technological, internal, and external factors that influence ERP systems adoption. For this purpose, we have adopted a famous organization-level theory, the technological-org...
Article
Full-text available
Current RFID ultralightweight authentication protocols have security pitfalls; thus, SURV, a potentially high-security protocol, based on the use of on-tag lightweight cryptography and on-reader standard cryptography, is proposed. Furthermore, the updating of internal values is only executed on tags and conditioned to a successful mutual authentica...
Article
Purpose – This paper’s research objective is to contribute to a growing body of research on cloud computing, by studying the SME adoption process. If SMEs have access to scalable technologies they could potentially deliver products and services that in the past only large enterprises could deliver, flattening the competitive arena. Design/methodol...
Conference Paper
Research was conducted to investigate the major factors affecting cloud computing adoption among SMEs. Our theoretical framework is based on the Technological, Organisational and Environmental (TOE) Model, with our early empirical evidence stemming from data collected while conducting semi structured interviews with nine companies. The analysis of...

Network

Cited By