Processing, Please wait...

  • Home
  • About Us
  • Search:
  • Advanced Search

Growing Science » Authors » Waleed K. Abdulraheem

Journals

  • IJIEC (747)
  • MSL (2643)
  • DSL (668)
  • CCL (508)
  • USCM (1092)
  • ESM (413)
  • AC (562)
  • JPM (271)
  • IJDS (912)
  • JFS (91)
  • HE (32)
  • SCI (26)

Keywords

Supply chain management(166)
Jordan(161)
Vietnam(149)
Customer satisfaction(120)
Performance(113)
Supply chain(110)
Service quality(98)
Competitive advantage(95)
Tehran Stock Exchange(94)
SMEs(87)
optimization(86)
Financial performance(83)
Trust(83)
TOPSIS(83)
Sustainability(81)
Job satisfaction(80)
Factor analysis(78)
Social media(78)
Knowledge Management(77)
Artificial intelligence(77)


» Show all keywords

Authors

Naser Azad(82)
Mohammad Reza Iravani(64)
Zeplin Jiwa Husada Tarigan(63)
Endri Endri(45)
Muhammad Alshurideh(42)
Hotlan Siagian(39)
Jumadil Saputra(36)
Dmaithan Almajali(36)
Muhammad Turki Alshurideh(35)
Barween Al Kurdi(32)
Ahmad Makui(32)
Basrowi Basrowi(31)
Hassan Ghodrati(31)
Mohammad Khodaei Valahzaghard(30)
Sautma Ronni Basana(29)
Shankar Chakraborty(29)
Ni Nyoman Kerti Yasa(29)
Sulieman Ibraheem Shelash Al-Hawary(28)
Prasadja Ricardianto(28)
Haitham M. Alzoubi(27)


» Show all authors

Countries

Iran(2183)
Indonesia(1290)
India(787)
Jordan(786)
Vietnam(504)
Saudi Arabia(453)
Malaysia(441)
United Arab Emirates(220)
China(206)
Thailand(153)
United States(111)
Turkey(106)
Ukraine(104)
Egypt(98)
Canada(92)
Peru(88)
Pakistan(85)
United Kingdom(80)
Morocco(79)
Nigeria(78)


» Show all countries
Sort articles by: Volume | Date | Most Rates | Most Views | Reviews | Alphabet
1.

Choosing the right MFA method for online systems: A comparative analysis Pages 201-212 Right click to download the paper Download PDF

Authors: Nader Abdel Karim, Hasan Kanaker, Waleed K. Abdulraheem, Majdi Ali Ghaith, Essam Alhroob, Abdulla Mousa Falah Alali

DOI: 10.5267/j.ijdns.2023.10.003

Keywords: Online systems, Online accounts, Authentication methods, MFA, User authentication, User verification

Abstract:
A robust authentication method is needed to protect online user accounts and data from cyber-attacks. Using only passwords is insufficient because they can be easily stolen or cracked. Multi-factor authentication (MFA) increases security by requiring two or more verification factors from the user before granting access to a resource such as an online account or an application. MFA is essential to a strong identity and access management (IAM) policy. This study evaluates and contrasts several MFA methods for online systems, including Microsoft Authenticator, FIDO2 security keys, SMS, voice calls, and biometrics. We assess these methods based on four criteria: security, usability, cost, and compatibility. We discover that only some MFA methods excel across the board. The best MFA method will depend on the organization's and users' specific needs and preferences. Each MFA method has benefits and drawbacks on its own. Based on our analysis, we do, however, make some general observations and recommendations, such as preferring FIDO2 security keys and certificate-based authentication for high-security scenarios, choosing Microsoft Authenticator and biometrics for high-usability scenarios, and avoiding SMS and voice calls for low-security and low-usability scenarios.
Details
  • 34
  • 1
  • 2
  • 3
  • 4
  • 5

Journal: IJDS | Year: 2024 | Volume: 8 | Issue: 1 | Views: 3626 | Reviews: 0

 
2.

Using interface preferences as evidence of user identity: A feasibility study Pages 537-548 Right click to download the paper Download PDF

Authors: Nader Abdel Karim, Waleed K. Abdulraheem, Hasan Kanaker, Firas Ibrahim Alzobi, Zarina Shukur, Osama Qtaish, Maher Abuhamdeh

DOI: 10.5267/j.ijdns.2023.9.003

Keywords: User interface design, User characteristics, User preferences, User authentication, Online systems

Abstract:
Research on human-computer interaction currently focuses on enhancing system usability by establishing an appropriate user interface (UI) that depends on users’ features. Online users typically have different perceptions of their favored interface design depending on their preferences. Thus, those interface preferences could be utilized to recognize online users’ identities. User authentication is another critical issue that should be considered to improve online security mechanisms without compromising usability. This study investigates the feasibility of using UI preferences as evidence of user identity. The proposed method applies to the design preferences of users dealing with online systems (e.g., e-exam and e-banking). These preferences are closely associated with individual characteristics, whether physical, cognitive, psychological, psychomotor, demographic, or experience based. Many design characteristics could be used in online systems; for example, the e-exam interface design may use features such as the font (size, color, and face), the number of questions per page, background color, questions group, timer type, and sound alert. The feasibility evaluation of this study indicated that 96.8% of research participants have variations in their preferences, and each participant kept 94.5% of their design preferences throughout different sessions.
Details
  • 51
  • 1
  • 2
  • 3
  • 4
  • 5

Journal: IJDS | Year: 2024 | Volume: 8 | Issue: 1 | Views: 1524 | Reviews: 0

 

® 2010-2026 GrowingScience.Com