Processing, Please wait...

  • Home
  • About Us
  • Search:
  • Advanced Search

Growing Science » Authors » Mohammad Al Rawajbeh

Journals

  • IJIEC (726)
  • MSL (2637)
  • DSL (649)
  • CCL (495)
  • USCM (1092)
  • ESM (404)
  • AC (557)
  • JPM (247)
  • IJDS (912)
  • JFS (91)
  • HE (21)

Keywords

Jordan(161)
Supply chain management(160)
Vietnam(148)
Customer satisfaction(120)
Performance(113)
Supply chain(108)
Service quality(98)
Tehran Stock Exchange(94)
Competitive advantage(93)
SMEs(86)
optimization(84)
Financial performance(83)
Trust(81)
Job satisfaction(79)
Social media(78)
Factor analysis(78)
TOPSIS(78)
Knowledge Management(77)
Genetic Algorithm(76)
Sustainability(76)


» Show all keywords

Authors

Naser Azad(82)
Mohammad Reza Iravani(64)
Zeplin Jiwa Husada Tarigan(59)
Endri Endri(45)
Muhammad Alshurideh(42)
Hotlan Siagian(39)
Jumadil Saputra(36)
Muhammad Turki Alshurideh(35)
Dmaithan Almajali(35)
Barween Al Kurdi(32)
Basrowi Basrowi(31)
Hassan Ghodrati(31)
Ahmad Makui(31)
Mohammad Khodaei Valahzaghard(30)
Shankar Chakraborty(29)
Ni Nyoman Kerti Yasa(29)
Sulieman Ibraheem Shelash Al-Hawary(28)
Prasadja Ricardianto(28)
Sautma Ronni Basana(27)
Haitham M. Alzoubi(27)


» Show all authors

Countries

Iran(2162)
Indonesia(1276)
Jordan(783)
India(779)
Vietnam(500)
Saudi Arabia(438)
Malaysia(438)
United Arab Emirates(220)
China(181)
Thailand(151)
United States(109)
Turkey(102)
Ukraine(99)
Egypt(95)
Canada(89)
Pakistan(84)
Peru(83)
United Kingdom(77)
Nigeria(77)
Morocco(73)


» Show all countries
Sort articles by: Volume | Date | Most Rates | Most Views | Reviews | Alphabet
1.

Evaluating the influence of security considerations on information dissemination via social networks Pages 1471-1484 Right click to download the paper Download PDF

Authors: Issam AlHadid, Evon M. Abu-Taieh, Mohammad Al Rawajbeh, Rami S. Alkhawaldeh, Sufian Khwaldeh, Suha Afaneh, AlaAldin Alrowwad, Dima Farhan Alrwashdeh

DOI: 10.5267/j.ijdns.2023.8.015

Keywords: Trust, Privacy, Security, Awareness, Information Sharing, Social Networks

Abstract:
This study investigates the factors that influence the sharing of information on social media platforms and examines the effects of perceived security, perceived privacy, and user awareness on users' trust in social media platforms, as well as the moderating effects of age, gender, educational attainment, and internet proficiency on information sharing. The study collected data from 837 social media users in Jordan and analyzed them using structural equation modeling (SEM), confirmatory factor analysis (CFA), and machine learning (ML) methods. The findings of the study indicate that perceived security, perceived privacy, and user awareness all have a significant impact on users' trust in social media platforms. Trust, in turn, has a significant impact on the amount of information shared on these platforms. Also, the findings of this study provide valuable insights into the dynamics of information sharing on social networks. This knowledge will be of interest to managers, policymakers, and developers of social media platforms. In addition, the findings of the study also have implications for the privacy and security of social media users. For example, social media users can be more careful about the information they share on social media platforms, and they can take steps to protect their privacy.
Details
  • 0
  • 1
  • 2
  • 3
  • 4
  • 5

Journal: IJDS | Year: 2023 | Volume: 7 | Issue: 4 | Views: 1125 | Reviews: 0

 
2.

A new model for security analysis of network anomalies for IoT devices Pages 1241-1248 Right click to download the paper Download PDF

Authors: Mohammad Al Rawajbeh, Wael Alzyadat, Khalid Kaabneh, Suha Afaneh, Dima Farhan Alrwashdeh, Hamdah Samih Albayaydah, Issam Hamad AlHadid

DOI: 10.5267/j.ijdns.2023.5.001

Keywords: Internet of Things, Technology, Security Analysis, Anomaly detection system, Cybersecurity

Abstract:
In the era of IoT gaining traction, attacks on IoT-enabled devices are the order of the day that emanates the need for more protected IoT networks. IoT's key feature deals with massive amounts of data sensed by numerous heterogeneous IoT devices. Numerous machine learning techniques are used to collect data from different types of sensors on the objects and transform them into information relevant to the application. Furthermore, business and data analytics algorithms help in event prediction based on observed behavior and information. Routing information securely over the internet with limited resources in IoT applications is a key problem. The study proposes a model for detecting network anomalies in IoT devices to enhance the security of the devices. The study employed the IoT Botnet dataset, and K-fold cross-validation tests were used for validating the values of evaluation metrics. The average values of Accuracy, Precision, Recall, and F Score was 97.4.
Details
  • 0
  • 1
  • 2
  • 3
  • 4
  • 5

Journal: IJDS | Year: 2023 | Volume: 7 | Issue: 3 | Views: 1064 | Reviews: 0

 

® 2010-2025 GrowingScience.Com