Processing, Please wait...

  • Home
  • About Us
  • Search:
  • Advanced Search

Growing Science » Authors » Najah Al-shanableh

Journals

  • IJIEC (747)
  • MSL (2643)
  • DSL (668)
  • CCL (508)
  • USCM (1092)
  • ESM (413)
  • AC (562)
  • JPM (271)
  • IJDS (912)
  • JFS (96)
  • HE (32)
  • SCI (26)

Keywords

Supply chain management(166)
Jordan(161)
Vietnam(149)
Customer satisfaction(120)
Performance(113)
Supply chain(111)
Service quality(98)
Competitive advantage(95)
Tehran Stock Exchange(94)
SMEs(87)
optimization(86)
Trust(83)
TOPSIS(83)
Financial performance(83)
Sustainability(82)
Job satisfaction(80)
Factor analysis(78)
Social media(78)
Artificial intelligence(77)
Knowledge Management(77)


» Show all keywords

Authors

Naser Azad(82)
Mohammad Reza Iravani(64)
Zeplin Jiwa Husada Tarigan(63)
Endri Endri(45)
Muhammad Alshurideh(42)
Hotlan Siagian(39)
Jumadil Saputra(36)
Dmaithan Almajali(36)
Muhammad Turki Alshurideh(35)
Barween Al Kurdi(32)
Ahmad Makui(32)
Basrowi Basrowi(31)
Hassan Ghodrati(31)
Mohammad Khodaei Valahzaghard(30)
Sautma Ronni Basana(29)
Shankar Chakraborty(29)
Ni Nyoman Kerti Yasa(29)
Sulieman Ibraheem Shelash Al-Hawary(28)
Prasadja Ricardianto(28)
Haitham M. Alzoubi(27)


» Show all authors

Countries

Iran(2184)
Indonesia(1290)
India(788)
Jordan(786)
Vietnam(504)
Saudi Arabia(453)
Malaysia(441)
United Arab Emirates(220)
China(206)
Thailand(153)
United States(111)
Turkey(106)
Ukraine(104)
Egypt(98)
Canada(92)
Peru(88)
Pakistan(85)
United Kingdom(80)
Morocco(79)
Nigeria(78)


» Show all countries
Sort articles by: Volume | Date | Most Rates | Most Views | Reviews | Alphabet
1.

Securing cryptocurrency transactions: Innovations in malware detection using machine learning Pages 2055-2066 Right click to download the paper Download PDF

Authors: Ghassan Samara, Abeer Al-Mohtaseb, Hayel Khafajeh, Raed Alazaidah, Omar Alidmat, Ahmad Nasayreh, Mazen Alzyoud, Najah Al-shanableh

DOI: 10.5267/j.ijdns.2024.7.003

Keywords: Cryptocurrency, Malware, Machine Learning-Based Malware Detection

Abstract:
Cryptocurrencies are crucial in modern commerce and finance, whether at the national, corporate, or individual level. They serve as fundamental currencies for buying and selling, enabling various business transactions. However, the rise of cybercrime has brought about concerns regarding their operations, potential breaches in encrypted currencies, and the security systems managing them. The frequency of attack tactics and the motivation of attackers seeking financial gain are well-known. Many cryptocurrencies lack the necessary algorithms, techniques, and knowledge to effectively detect and mitigate malware, making them vulnerable targets for hackers. In this study, machine learning techniques are employed to detect malicious code in digital currencies. Additionally, a comparison of these techniques is conducted to determine the most suitable algorithm and technology, Furthermore, this study highlights the importance of effective malware detection in securing cryptocurrencies. Three datasets of different sizes were used, each yielding distinct results based on dataset size. The AdaBoost model demonstrated superior performance when applied to the short dataset, while the decision tree model performed best with the medium-sized dataset. Conversely, the Naive Bayes model consistently produced the worst results, while the large-size KNN model achieved the highest performance.
Details
  • 34
  • 1
  • 2
  • 3
  • 4
  • 5

Journal: IJDS | Year: 2024 | Volume: 8 | Issue: 4 | Views: 690 | Reviews: 0

 
2.

The adoption of big data analytics in Jordanian SMEs: An extended technology organization environment framework with diffusion of innovation and perceived usefulness Pages 753-764 Right click to download the paper Download PDF

Authors: Najah Al-shanableh, Mazen Alzyoud, Saleh Alomar, Yousef Kilani, Eman Nashnush, Sulieman Al-Hawary, Alaa Al-Momani

DOI: 10.5267/j.ijdns.2024.1.003

Keywords: Big data analytics, Adoption, TOE, DOI, SMEs, Jordan

Abstract:
While many small and medium enterprises (SMEs)recognize the benefits of Big Data Analytics (BDA) for digital transformation, they face challenges in implementing this technology, highlighting the need for more research on its adoption by SMEs. The objective of this study is to amalgamate the Technology Organization Environment (TOE) framework with the Diffusion of Innovation (DOI) theory, aiming to dissect the factors that sway BDA adoption in Jordanian SMEs. Additionally, the study delves into how perceived usefulness impacts this adoption process. Utilizing structural equation modeling, the study examined data from 388 managers in Jordan. The study validates all its hypotheses, revealing that variables like relative advantage, compatibility, complexity, top management support, competitive pressure, and security influence perceived usefulness, which subsequently has a positive impact on BDA adoption. This research presents a range of theoretical and practical insights.
Details
  • 17
  • 1
  • 2
  • 3
  • 4
  • 5

Journal: IJDS | Year: 2024 | Volume: 8 | Issue: 2 | Views: 3274 | Reviews: 0

 
3.

Artificial intelligence in Jordanian education: Assessing acceptance via perceived cybersecurity, novelty value, and perceived trust Pages 823-834 Right click to download the paper Download PDF

Authors: Mazen Alzyoud, Najah Al-Shanableh, Saleh Alomar, Asad Mahmoud AsadAlnaser, Akram Mustafad, Alaa Al-Momani, Sulieman Ibraheem Shelash Al-Hawary

DOI: 10.5267/j.ijdns.2023.12.022

Keywords: Artificial intelligence, Acceptance, Perceived cybersecurity, Novelty value, Perceived trust, AI device use acceptance, Students, Jordan

Abstract:
The growing significance of Artificial Intelligence (AI) across different fields highlights the essential role of user acceptance, as the success of this technology largely depends on its adoption and practical use by individuals. This research aims to examine how perceived cybersecurity, novelty value, and perceived trust affect students' willingness to accept AI in educational settings. The study's theoretical basis is the AI Device Use Acceptance (AIDUA) model. Using structural equation modeling, the study tested hypothesized relationships using data from 526 students at Jordanian universities. The results showed that social influence is positively associated with performance expectancy, while perceived cybersecurity is positively related to both performance and effort expectancy. Novelty value is positively associated with performance expectancy but a negative one with effort expectancy. Additionally, effort and performance expectancy significantly influence perceived trust and the willingness to accept AI. Moreover, perceived trust has a notable positive effect on the willingness to accept AI in education. These findings provide valuable guidance for the creation and improvement of AI-driven educational systems in universities, contributing to the broader understanding of AI technology acceptance in the educational field.
Details
  • 51
  • 1
  • 2
  • 3
  • 4
  • 5

Journal: IJDS | Year: 2024 | Volume: 8 | Issue: 2 | Views: 3551 | Reviews: 0

 
4.

How cybersecurity influences fraud prevention: An empirical study on Jordanian commercial banks Pages 69-76 Right click to download the paper Download PDF

Authors: Emad Tariq, Iman Akour, Najah Al-Shanableh, Enass Khalil Alquqa, Nidal Alzboun, Sulieman Ibraheem Shelash Al-Hawary, Muhammad Turki Alshurideh

DOI: 10.5267/j.ijdns.2023.10.016

Keywords: Cybersecurity, NIST Framework, Fraud Prevention, Commercial Banks, Jordanian banks

Abstract:
In this digital age, fraudulent practices are among the most challenging that organizations must be aware of due to the increasing use of online transactions. This also applies to the banking sector whose business has become more complex with the recent developments in information and communication technology, which has changed the nature of bank fraud requiring advanced prevention measures. From this perspective, this paper aims to determine how cybersecurity affects fraud prevention for Jordanian commercial banks. A five-dimensional NIST cybersecurity framework was used. The research data was collected from 173 information technology managers in commercial banks listed on the Amman Stock Exchange. Structural equation modeling (SEM) was applied to investigate research hypotheses. The results of the research demonstrated the significant impact of cybersecurity in fraud prevention, especially detect function which had the largest impact among the dimensions of cybersecurity. Therefore, a set of recommendations were formulated for policymakers in Jordanian commercial banks, the most important of which is the adoption of multi-factor authentication (MFA) approaches for customer accounts, employee access, and biometric systems that add an additional layer of protection and make access to sensitive information to unauthorized individuals more difficult.
Details
  • 34
  • 1
  • 2
  • 3
  • 4
  • 5

Journal: IJDS | Year: 2024 | Volume: 8 | Issue: 1 | Views: 2233 | Reviews: 0

 
5.

Diagnosing diabetes mellitus using machine learning techniques Pages 179-188 Right click to download the paper Download PDF

Authors: Mazen Alzyoud, Raed Alazaidah, Mohammad Aljaidi, Ghassan Samara, Mais Haj Qasem, Muhammad Khalid, Najah Al-Shanableh

DOI: 10.5267/j.ijdns.2023.10.006

Keywords: Classification, Diabetes, Feature selection, Medical diagnosis, Prediction

Abstract:
Diabetes Mellitus (DM) is a frequent condition in which the body's sugar levels are abnormally high for an extended length of time. It is a major cause of death with high mortality rates and the second leading cause of total years lived with disability worldwide. Its seriousness comes from its long-term complications, including nephropathy, retinopathy, and neuropathy leading to kidney failure, poor vision and blindness, and peripheral sensory loss, respectively. Such conditions are life-threatening and affect patients’ quality of life. Therefore, this paper aims to identify the most relevant features in the diagnosis of DM and identify the best classifier that can efficiently diagnose DM based on a set of relevant features. To achieve this, four different feature selection methods have been utilized. Moreover, twelve different classifiers that belong to six learning strategies have been evaluated using two datasets and several evaluation metrics such as Accuracy, Precision, Recall, F1-measure, and ROC area. The obtained results revealed that the correlation attribute evaluation method would be the best choice to handle the task of feature selection and ranking for the considered datasets, especially when considering the Accuracy metric. Furthermore, MultiClassClassifier would be the best classifier to handle Diabetes datasets, especially when considering True Positive, precision, and Recall metrics.
Details
  • 51
  • 1
  • 2
  • 3
  • 4
  • 5

Journal: IJDS | Year: 2024 | Volume: 8 | Issue: 1 | Views: 3697 | Reviews: 0

 

® 2010-2026 GrowingScience.Com