RISS 학술연구정보서비스

검색
다국어 입력

http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.

변환된 중국어를 복사하여 사용하시면 됩니다.

예시)
  • 中文 을 입력하시려면 zhongwen을 입력하시고 space를누르시면됩니다.
  • 北京 을 입력하시려면 beijing을 입력하시고 space를 누르시면 됩니다.
닫기
    인기검색어 순위 펼치기

    RISS 인기검색어

      검색결과 좁혀 보기

      선택해제
      • 좁혀본 항목 보기순서

        • 원문유무
        • 원문제공처
        • 학술지명
        • 주제분류
        • 발행연도
        • 작성언어
        • 저자
          펼치기

      오늘 본 자료

      • 오늘 본 자료가 없습니다.
      더보기
      • 무료
      • 기관 내 무료
      • 유료
      • The Smart Platform for Understanding the Extraordinary of the Our'an

        Almarhabi, Khalid Ali International Journal of Computer ScienceNetwork S 2021 International journal of computer science and netw Vol.21 No.12

        The Qur'an is regarded as the holy book by Islam followers; they assert that God wants humankind to understand its meanings and implement best practices. Numerous individuals have attempted to understand the meaning of its verses and explore its Extraordinary Vocabulary; however, few people successfully studied and researched the different meanings of that holy text. Only a limited segment of the society comprising scholars, students, and intellectuals have grasped the teachings of the Qur'an. A majority of the general population, specifically youngsters, spend ample time using mobile phones. In this context, many innovative educational platforms have recently been launched to attract the general public to learn and use knowledge. Research has provided the positive impact of such smart platforms. This concept is about an innovative smartphone platform to help users understand and reason the Qur'an by helping with the book vocabulary explained by expert scholars. This work proposes creating an engaging digital format using innovative technologies. This idea is inspired by youngsters who demonstrate an immense interest in online learning. Qur'an vocabulary is the prerequisite to building a better understanding that allows users to get precise meaning.

      • Adoption of the Bring Your Own Device (BYOD) Approach in the Health Sector in Saudi Arabia

        Almarhabi, Khalid A.,Alghamdi, Ahmed M.,Bahaddad, Adel A. International Journal of Computer ScienceNetwork S 2022 International journal of computer science and netw Vol.22 No.7

        The trend of Bring Your Own Device (BYOD) is gaining popularity all over the world with its innumerable benefits such as financial gain, greater employee satisfaction, better job efficiency, boosted morale, and improved flexibility. However, this unstoppable and inevitable trend also brings its own challenges and risks while managing and controlling corporate data and networks. BYOD is vulnerable to attacks by viruses, malware, or spyware that can reach sensitive data and disclose information, modify access policies, disrupt services, create financial issues, minimise productivity, and entail some legal implications. The key focus of this research is how Saudi Arabia has approached BYOD with the help of their 5-step solution model and quantitative research methodology. The result of this study is a statement about what users know about this trend, their opinions about it, and suggestion to increase the employee awareness.

      • The Status of the Bring Your Own Device (BYOD) in Saudi Arabia: Dataset

        Khalid A. Almarhabi,Adel A. Bahaddad,Ahmed M. Alghamdi International Journal of Computer ScienceNetwork S 2023 International journal of computer science and netw Vol.23 No.2

        The paper brings across data that is utilized in the Bring Your Own Device (BYOD) status collected between February and April of 2021 across Saudi Arabia. The data set was collected using questionnaires established through online mechanisms for the respondents. In the questionnaire, personal details included five questions while seven questions addressed the working model of personal mobile devices. Six questions addressed the awareness of employees bring your own device awareness for employees comprised seven questions and two questions addressed the benefits of business achievements. In the identification of suitable respondents for the research, two approaches were applied. The research demanded that the respondents be Saudi Arabian nationals and have attained 18 years. Snowball and purposive techniques were applied in the collection of information from a wide area of Saudi Arabia while employing social media approaches that include the use of WhatsApp and emails in the collection of data. The approach ensured the collection of data from 857 respondents used in the identification of the status as well as issues across the BYOD environment and accompanying solutions. The data was also used in the provision of awareness in the community through short-term courses, cyber security training and awareness programs. The results of the research are therefore applicable to the context of the Saudi Arabian country that is currently facing issues in dealing with the application of personal devices in the work environment.

      • A Proposed Framework for the Automated Authorization Testing of Mobile Applications

        Alghamdi, Ahmed Mohammed,Almarhabi, Khalid International Journal of Computer ScienceNetwork S 2021 International journal of computer science and netw Vol.21 No.5

        Recent studies have indicated that mobile markets harbor applications (apps) that are either malicious or vulnerable, compromising millions of devices. Some studies indicate that 96% of companies' employees have used at least one malicious app. Some app stores do not employ security quality attributes regarding authorization, which is the function of specifying access rights to access control resources. However, well-defined access control policies can prevent mobile apps from being malicious. The problem is that those who oversee app market sites lack the mechanisms necessary to assess mobile app security. Because thousands of apps are constantly being added to or updated on mobile app market sites, these security testing mechanisms must be automated. This paper, therefore, introduces a new mechanism for testing mobile app security, using white-box testing in a way that is compatible with Bring Your Own Device (BYOD) working environments. This framework will benefit end-users, organizations that oversee app markets, and employers who implement the BYOD trend.

      • The Security and Privacy Issues of Fog Computing

        Sultan Algarni,Khalid Almarhabi,Ahmed M. Alghamdi,Asem Alradadi International Journal of Computer ScienceNetwork S 2023 International journal of computer science and netw Vol.23 No.4

        Fog computing diversifies cloud computing by using edge devices to provide computing, data storage, communication, management, and control services. As it has a decentralised infrastructure that is capable of amalgamating with cloud computing as well as providing real-time data analysis, it is an emerging method of using multidisciplinary domains for a variety of applications; such as the IoT, Big Data, and smart cities. This present study provides an overview of the security and privacy concerns of fog computing. It also examines its fundamentals and architecture as well as the current trends, challenges, and potential methods of overcoming issues in fog computing.

      • Differences in Users' Insights and Increase in The Acceptance Level for Using The BYOD Approach in Government, Non-Profit Organizations, and Private Sectors in Saudi Arabia

        Alghamdi, Ahmed M.,Bahaddad, Adel A.,Almarhabi, Khalid A. International Journal of Computer ScienceNetwork S 2022 International journal of computer science and netw Vol.22 No.7

        Digital transformation represents one of the main obstacles facing several government, private, and non-profit sectors that help stabilize digital transformation in the Arabic region. One of the helpful ways to improve the level of freedom, productivity, and flexibility among employees to accept the BYOD approach is using their own devices to perform their work both in and outside the workplace. This study focuses to present the differences between the main three economic sectors, which represent the most important pillars of the economy in Saudi Arabia within the Kingdom's Vision 2030. BYOD also has great importance to the stakeholders for raising their awareness by expressing the implications, if the concept of BYOD is widely and correctly adopted. The study uses the diffusion of innovation (DOI) framework and quantitative analysis data to determine the main dimensions and important factors that help increase the awareness of the target audience. The number of participants in this study was 830, and the participants are mixing between the government, private, and non-profit sectors. The main findings showed a significant impact of several factors such as the importance of knowledge, ease of use, employee satisfaction, risk awareness, and attention to increase the level of acceptance in three main sectors study for using the BYOD approach widespread and professional use.

      • Big Data Security and Privacy: A Taxonomy with Some HPC and Blockchain Perspectives

        Alsulbi, Khalil,Khemakhem, Maher,Basuhail, Abdullah,Eassa, Fathy,Jambi, Kamal Mansur,Almarhabi, Khalid International Journal of Computer ScienceNetwork S 2021 International journal of computer science and netw Vol.21 No.7

        The amount of Big Data generated from multiple sources is continuously increasing. Traditional storage methods lack the capacity for such massive amounts of data. Consequently, most organizations have shifted to the use of cloud storage as an alternative option to store Big Data. Despite the significant developments in cloud storage, it still faces many challenges, such as privacy and security concerns. This paper discusses Big Data, its challenges, and different classifications of security and privacy challenges. Furthermore, it proposes a new classification of Big Data security and privacy challenges and offers some perspectives to provide solutions to these challenges.

      연관 검색어 추천

      이 검색어로 많이 본 자료

      활용도 높은 자료

      해외이동버튼