About
27
Publications
33,198
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
240
Citations
Introduction
Current institution
American Intercontinental University
Publications
Publications (27)
Objectives: This study investigates the attitudes towards using smartphone apps. in Jordan, while there exists some threats to mobile phone users' privacy. We also investigated user's awareness of the privacy and security threats when using smartphone applications. Methods/Analysis: A questioner was developed and distributed among random sample of...
Computers are widely used by all universities to provide network access to students. Therefore, the securities of these computers play a major role in protecting the network. In light of that, a strong access control is required to ensure that sensitive information will only be accessed through firm authentication mechanism. Smartphones are widely...
The social media networks offer individuals and communities opportunities to communicate with broad global reach. This paper studies the social media users’ awareness of the security and the personal privacy issues, and investigates perceived risk and trust on information disclosure behavior in Social Network sites (SNSs). In addition, to further e...
The social media networks offer individuals and communities opportunities to communicate with broad global reach. This paper studies the social media users' awareness of the security and the personal privacy issues, and investigates perceived risk and trust on information disclosure behavior in Social Network sites (SNSs). In addition, to further e...
The emerging industry of mobile commerce (M-commerce), while being a complex and with uncertain environment is influencing businesses and consumers engagement at both national and international levels. The objectives of this research are to: (1) investigate the degree to which various trust and information security factors influence consumer to eng...
Research in the area of information systems performance indicates contradictory results with respect to the value and gains of enterprise resource planning systems ERP systems. Performance of information systems is measured in three main categories: efficiency, effectiveness and quality. This paper explores the value of ERP systems in the business...
Research in the area of information systems performance indicates contradictory results with respect to the value and gains of enterprise resource planning systems (ERP systems). Performance of information systems is measured in three main categories: efficiency, effectiveness and quality. This paper explores the value of ERP systems in the busines...
E-government is growing to a size that requires full attention from governments and demands collaboration and facilitation between private sectors and Non-Government Organizations (NGOs). In order to reach successful e-government applications, governments have to provide services to citizens, businesses and government agencies. In Jordan, e-governm...
The research into consumer choices and acceptance of new products and services is normally discussed within the framework of diffusion of innovations and has traditionally relied on identifying consumer characteristics while focusing on the characteristics of innovations. The purpose of this study is to examine the impact of Identity theft on the p...
The research into consumer choices and acceptance of new products and services is normally discussed within the framework of diffusion of innovations and has traditionally relied on identifying consumer characteristics while focusing on the characteristics of innovations. The purpose of this study is to examine the impact of Identity theft on the p...
Thepotentialof wirelesscommunications, hasresulted in a wide expand of wireless networks. However,the vulnerabilities and threats that wireless networks aresubjectedtoresulted in higher risk forunauthorized users to access the computernetworks.This researchevaluatesthedeployedWirelessNetwork in Jordan as well as the use ofthesecurity setting of the...
The Internet is the superior mean of communication and information dissemination in the new millennium. It is important to note out that searching for information on the Internet does not necessarily mean that some kind of learning process is going on. While the Internet dramatically changed the dissemination and sharing of information, there is no...
Advances in the banking sector have ushered in an era of multi-product and multiservices being delivered using multiple yet integrated channels. The use of information and communication technology (ICT) is on the increase and encompasses nearly the entire gamut of banking operations. Rising competition and customer expectations have compelled top m...
1. An access control system for a work vehicle, the work vehicle having an engine and a location, the system comprising: a location sensor on the vehicle configured to provide a location signal indicative of the vehicle's location; and an electronic control unit coupled to the location sensor to receive the location signal, the control unit further...
Security risk assessment framework provides comprehensive structure for security risk analysis that would help uncover systems' threats and vulnerabilities. While security risk assessment is an important step in the security risk management process, this paper will focus only on the security risk assessment framework. Viewing issues that exist in a...
With the generalised use of information technologies (IT), students gather and use information from the World Wide Web and use it to complete their schoolwork and other related tasks. However, there are no indications that any of the obtained information is actually being critically thought about, or if the material is understood by the student. Wh...
Mobile banking is introducing a new generation of location-independent financial services using mobile terminals. This facilitates allowing users to make payments, check balances, transfer money between accounts and generate statements of recent transactions on their cellular phones. While providing, anywhere, anytime banking to the user, the servi...
Several variables can influence the adoption of innovation. Human Computer Interaction research has focused on ease of use as the prime determinate of user satisfaction and adoption. This study explores the issues that influence the adoption, and further examines the knowledge of perceived risk as an influence. The study examines existing theory as...
Studying documents similarity can have several fields of applications. In this paper, we focused on evaluating documents' similarity to predict possible plagiarism in research papers. We evaluated the usage of several document similarity algorithms such as: Cosine, Dice, Manhattan, Euclidian, etc. We also tried several approaches of selections for...