Processing, Please wait...

  • Home
  • About Us
  • Search:
  • Advanced Search

Growing Science » Authors » Mohammad Rasmi Al-Mousa

Journals

  • IJIEC (747)
  • MSL (2643)
  • DSL (668)
  • CCL (508)
  • USCM (1092)
  • ESM (413)
  • AC (562)
  • JPM (271)
  • IJDS (912)
  • JFS (91)
  • HE (26)
  • SCI (26)

Keywords

Supply chain management(166)
Jordan(161)
Vietnam(149)
Customer satisfaction(120)
Performance(113)
Supply chain(110)
Service quality(98)
Competitive advantage(95)
Tehran Stock Exchange(94)
SMEs(87)
optimization(86)
Trust(83)
Financial performance(83)
Sustainability(81)
TOPSIS(81)
Job satisfaction(80)
Factor analysis(78)
Social media(78)
Genetic Algorithm(77)
Knowledge Management(77)


» Show all keywords

Authors

Naser Azad(82)
Mohammad Reza Iravani(64)
Zeplin Jiwa Husada Tarigan(62)
Endri Endri(45)
Muhammad Alshurideh(42)
Hotlan Siagian(39)
Jumadil Saputra(36)
Dmaithan Almajali(36)
Muhammad Turki Alshurideh(35)
Barween Al Kurdi(32)
Ahmad Makui(32)
Basrowi Basrowi(31)
Hassan Ghodrati(31)
Mohammad Khodaei Valahzaghard(30)
Sautma Ronni Basana(29)
Shankar Chakraborty(29)
Ni Nyoman Kerti Yasa(29)
Sulieman Ibraheem Shelash Al-Hawary(28)
Prasadja Ricardianto(28)
Haitham M. Alzoubi(27)


» Show all authors

Countries

Iran(2181)
Indonesia(1289)
Jordan(786)
India(786)
Vietnam(504)
Saudi Arabia(452)
Malaysia(441)
United Arab Emirates(220)
China(206)
Thailand(153)
United States(110)
Turkey(106)
Ukraine(104)
Egypt(98)
Canada(92)
Peru(88)
Pakistan(85)
United Kingdom(80)
Morocco(79)
Nigeria(78)


» Show all countries
Sort articles by: Volume | Date | Most Rates | Most Views | Reviews | Alphabet
1.

Antecedents of cloud-based financial information systems usage: An integrated model Pages 125-138 Right click to download the paper Download PDF

Authors: Raed Masadeh, Dmaithan Abdelkarim Almajali, Manaf Al-Okaily, Nida AL-Sous, Mohammad Rasmi Al-Mousa

DOI: 10.5267/j.ijdns.2023.10.010

Keywords: Information and Communication Technologies, Cloud Computing, Information Technology, Financial Information Systems, COVID-19 Risk, Trust, SMEs

Abstract:
The recent progress of Financial Information System (FIS) has significantly affected businesses’ sustainable production process. Businesses generally employ FIS to automate their operational procedures and increase their corporate efficiencies through improvement in output quality and sustainability. The performance of FIS has been attributed to its key success criteria. Accordingly, this study examined antecedents of FIS intention to use among Small and Medium-Size Enterprises (SMEs) in Jordan at individual level, with specific focus on the acceptance and use of FIS among accounting department employees. Based on 436 respondents from Jordanian SMEs, results showed an impact of COVID-19 risk, trust, performance expectancy, and perceived severity on the intention to use FIS, whereas effort expectancy and perceived vulnerability showed no impact on the intention to use FIS among Jordanian SMEs.
Details
  • 0
  • 1
  • 2
  • 3
  • 4
  • 5

Journal: IJDS | Year: 2024 | Volume: 8 | Issue: 1 | Views: 1312 | Reviews: 0

 
2.

Awareness model for minimizing the effects of social engineering attacks in web applications Pages 791-800 Right click to download the paper Download PDF

Authors: Maher Al-Khateeb, Mohammad Rasmi Al-Mousa, Ala’a Saeb Al-Sherideh, Dmaithan Almajali, Mahmoud Asassfeha, Hayel Khafajeh

DOI: 10.5267/j.ijdns.2023.1.010

Keywords: Social Engineering, Cybercrime, Malicious code, Attacks, SE attacks

Abstract:
Social Engineering (SE) Attacks against information systems continue to pose a potentially devastating impact. Security information systems are becoming increasingly significant as the number of SE incidents rapidly increased and became more aggressive than before. The World Wide Web (WWW) has evolved for information exchange and knowledge-sharing. It enables the sharing of information in a timely, effective, and transparent manner. Identity theft and identity misuse are two sides of cybercrime in which hackers and fraudulent users collect sensitive information from current legal users in order to perform fraud or deceit for financial gain. Malicious links are used as phishing methods, in which malicious links are planted beneath legitimate-looking links. As the number of web pages grows, the number of malicious web pages and the attacks of such become more complex. In this paper, we provide a method for identifying malicious web pages using a crawling and classification approach that helps to support the automatic discovery of the malicious links. The proposed approach can successfully complete the crawling session even if the page requires partial page refreshment and authentication credentials. The evaluation of the proposed approach shows a higher accuracy compared to an existing approach with an overall accuracy of 72% in three custom applications. Moreover, the proposed approach will calculate the significance and the impact severances of each link on the website and it better differentiates malicious web pages and normal links. The results of the proposed approach will also help in providing a set of recommendations which can increase the awareness level of the end-users, website administrators on how to better deal with these types of SE attacks.
Details
  • 0
  • 1
  • 2
  • 3
  • 4
  • 5

Journal: IJDS | Year: 2023 | Volume: 7 | Issue: 2 | Views: 1642 | Reviews: 0

 

® 2010-2026 GrowingScience.Com