RISS 학술연구정보서비스

검색
다국어 입력

http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.

변환된 중국어를 복사하여 사용하시면 됩니다.

예시)
  • 中文 을 입력하시려면 zhongwen을 입력하시고 space를누르시면됩니다.
  • 北京 을 입력하시려면 beijing을 입력하시고 space를 누르시면 됩니다.
닫기
    인기검색어 순위 펼치기

    RISS 인기검색어

      검색결과 좁혀 보기

      선택해제
      • 좁혀본 항목 보기순서

        • 원문유무
        • 원문제공처
          펼치기
        • 등재정보
          펼치기
        • 학술지명
          펼치기
        • 주제분류
        • 발행연도
          펼치기
        • 작성언어
        • 저자
          펼치기

      오늘 본 자료

      • 오늘 본 자료가 없습니다.
      더보기
      • 무료
      • 기관 내 무료
      • 유료
      • "How can you live without using Snapchat?" Practical Study for the Usage of Facebook and Snapchat in the Kingdom of Saudi Arabia

        Alghamdi, Deena International Journal of Computer ScienceNetwork S 2021 International journal of computer science and netw Vol.21 No.12

        This study aims to provide an in-depth description of the practices of social media users in the Kingdom of Saudi Arabia (KSA)-specifically the users of Facebook and Snapchat-and the reasons for these practices, the decisions made, and the people involved. Qualitative methods were used to collect data in two rounds from 53 participants. The data analysis shows a clear preference for Snapchat over Facebook among the participants, as shown in their using the application many times daily and in the creation and use of new words derived from the application's name. On the other hand, one of the main reasons mentioned by the participants for not preferring Facebook was the unclear policy of security and privacy used in the application. This reason is important for all social media users, but, in particular, it is crucial for female users, as shown in the data. This is important for the designers and policymakers of the social media applications to understand and consider, as it would help them improve the current applications and create new ones.

      • SCOPUSKCI등재

        DGA Interpretation of Oil Filled Transformer Condition Diagnosis

        Alghamdi, Ali Saeed,Muhamad, Nor Asiah,Suleiman, Abubakar A. The Korean Institute of Electrical and Electronic 2012 Transactions on Electrical and Electronic Material Vol.13 No.5

        DGA is one of the most recent techniques developed to diagnose the fault condition on oil filled insulation transformers. There are more than 6 known different methods of DGA fault interpretation technique and so there is the likelihood that they may vary in their interpretations. A series of combined interpretation methods that can determine the power transformer condition faults in one assessment is therefore needed. This paper presents a computer program- based system developed to combine four DGA assessment techniques; Rogers Ratio Method, IEC Basic Ratio Method, Duval Triangle method and Key Gas Method. An easy to use Graphic User Interface was designed to give a visual display of the four techniques. The result shows that this assessment method can increase the accuracy of DGA methods by up to 20% and the no prediction result had been reduced down to 0%.

      • On the Scale in the Kingdom of Saudi Arabia: Facebook vs. Snapchat

        Alghamdi, Deena International Journal of Computer ScienceNetwork S 2021 International journal of computer science and netw Vol.21 No.12

        This research aims to analyse the practices adopted by social media users in the Kingdom of Saudi Arabia (KSA), specifically users of Facebook and Snapchat. To collect data from participants, a questionnaire was used, generating 915 responses. The analysis of the data shows a clear preference for Snapchat over Facebook in the KSA, where 89% of the participants have accounts on Snapchat compared to 66% of them with accounts on Facebook. Moreover, the preference for Snapchat over Facebook has been clearly shown in the daily usage of participants, where 83% of those with Snapchat accounts can be described as very active users. They have accessed their Snapchat accounts at least once a day compared to only 15% of Facebook users. Different reasons were provided by the participants explaining the practices they adopted. We believe that such research could help social media applications' designers and policy makers to understand the behaviour of users in the KSA when using social media applications and the rationale behind their behaviour and preferences. This understanding could help improve the performance of current applications and new ones.

      • Differences in Users' Insights and Increase in The Acceptance Level for Using The BYOD Approach in Government, Non-Profit Organizations, and Private Sectors in Saudi Arabia

        Alghamdi, Ahmed M.,Bahaddad, Adel A.,Almarhabi, Khalid A. International Journal of Computer ScienceNetwork S 2022 International journal of computer science and netw Vol.22 No.7

        Digital transformation represents one of the main obstacles facing several government, private, and non-profit sectors that help stabilize digital transformation in the Arabic region. One of the helpful ways to improve the level of freedom, productivity, and flexibility among employees to accept the BYOD approach is using their own devices to perform their work both in and outside the workplace. This study focuses to present the differences between the main three economic sectors, which represent the most important pillars of the economy in Saudi Arabia within the Kingdom's Vision 2030. BYOD also has great importance to the stakeholders for raising their awareness by expressing the implications, if the concept of BYOD is widely and correctly adopted. The study uses the diffusion of innovation (DOI) framework and quantitative analysis data to determine the main dimensions and important factors that help increase the awareness of the target audience. The number of participants in this study was 830, and the participants are mixing between the government, private, and non-profit sectors. The main findings showed a significant impact of several factors such as the importance of knowledge, ease of use, employee satisfaction, risk awareness, and attention to increase the level of acceptance in three main sectors study for using the BYOD approach widespread and professional use.

      • Evaluating the Usage of Social Medias in the Kingdom of Saudi Arabia: Methodological Limitations and Adjustments

        Alghamdi, Deena International Journal of Computer ScienceNetwork S 2022 International journal of computer science and netw Vol.22 No.1

        This research aimed to provide a profound description of the practices of social media users in the Kingdom of Saudi Arabia (KSA), specifically the users of Facebook<sup>®</sup> (FB) and Snapchat<sup>®</sup> (SC), the reasons for these practices, decisions made, and the people involved. Such research would be of significant help to designers and policymakers of social media applications in understanding user practices when using social media applications and the reasons for such practices in the KSA. This better comprehension would be of significant help in improving current applications and creating new ones. According to the data analysis, there was a clear preference for SC over FB in the KSA. Most participants with SC accounts were described as very active users, accessing their accounts at least once a day compared to FB users. The users were led by this high preference for SC to create new words derived from the name of the application and use them in daily life. We showed our experience of carrying out a study in which the main objective was to collect factual empirical data from participants about their daily usage of social media applications while considering the unique cultural settings in the KSA. Mixed quantitative and qualitative methods were used to triangulate the data, increasing its trustworthiness and validity. Multiple perspectives were obtained using various data collection methods. Therefore, conclusions would not be confounded with limitations of any particular methodology or with conditions of any collection rounds. This research would constitute a valuable guide for researchers intending to use methods with male and female informants from different cultures, preparing them for potential challenges and suggesting possible solutions.

      • EXECUTION TIME AND POWER CONSUMPTION OPTIMIZATION in FOG COMPUTING ENVIRONMENT

        Alghamdi, Anwar,Alzahrani, Ahmed,Thayananthan, Vijey International Journal of Computer ScienceNetwork S 2021 International journal of computer science and netw Vol.21 No.1

        The Internet of Things (IoT) paradigm is at the forefront of present and future research activities. The huge amount of sensing data from IoT devices needing to be processed is increasing dramatically in volume, variety, and velocity. In response, cloud computing was involved in handling the challenges of collecting, storing, and processing jobs. The fog computing technology is a model that is used to support cloud computing by implementing pre-processing jobs close to the end-user for realizing low latency, less power consumption in the cloud side, and high scalability. However, it may be that some resources in fog computing networks are not suitable for some kind of jobs, or the number of requests increases outside capacity. So, it is more efficient to decrease sending jobs to the cloud. Hence some other fog resources are idle, and it is better to be federated rather than forwarding them to the cloud server. Obviously, this issue affects the performance of the fog environment when dealing with big data applications or applications that are sensitive to time processing. This research aims to build a fog topology job scheduling (FTJS) to schedule the incoming jobs which are generated from the IoT devices and discover all available fog nodes with their capabilities. Also, the fog topology job placement algorithm is introduced to deploy jobs into appropriate resources in the network effectively. Finally, by comparing our result with the state-of-art first come first serve (FCFS) scheduling technique, the overall execution time is reduced significantly by approximately 20%, the energy consumption in the cloud side is reduced by 18%.

      • Arabic Handwritten Manuscripts Text Recognition: A Systematic Review

        Alghamdi, Arwa,Alluhaybi, Dareen,Almehmadi, Doaa,Alameer, Khadijah,Siddeq, Sundos Bin,Alsubait, Tahani International Journal of Computer ScienceNetwork S 2022 International journal of computer science and netw Vol.22 No.11

        Handwritten text recognition is one of the active research areas nowadays. The progress in this field differs in every language. For example, the progress in Arabic handwritten text recognition is still insignificant and needs more attentions and efforts. One of the most important fields in this is Arabic handwritten manuscript text recognition which focuses in extracting text from historical manuscripts. For eons, ancients used manuscripts to write everything. Nowadays, there are millions of manuscripts all around the world. There are two main challenges in dealing with these manuscripts. The first one is that they are at the risk of damage since they are written in primitive materials, the second challenge is due to the difference in writing styles, hence most people are unable to read these manuscripts easily. Therefore, we discuss in this study different papers that are related to this important research field.

      • A Proposed Framework for the Automated Authorization Testing of Mobile Applications

        Alghamdi, Ahmed Mohammed,Almarhabi, Khalid International Journal of Computer ScienceNetwork S 2021 International journal of computer science and netw Vol.21 No.5

        Recent studies have indicated that mobile markets harbor applications (apps) that are either malicious or vulnerable, compromising millions of devices. Some studies indicate that 96% of companies' employees have used at least one malicious app. Some app stores do not employ security quality attributes regarding authorization, which is the function of specifying access rights to access control resources. However, well-defined access control policies can prevent mobile apps from being malicious. The problem is that those who oversee app market sites lack the mechanisms necessary to assess mobile app security. Because thousands of apps are constantly being added to or updated on mobile app market sites, these security testing mechanisms must be automated. This paper, therefore, introduces a new mechanism for testing mobile app security, using white-box testing in a way that is compatible with Bring Your Own Device (BYOD) working environments. This framework will benefit end-users, organizations that oversee app markets, and employers who implement the BYOD trend.

      • The Use of Blackboard by Students During the COVID-19 Pandemic

        Alghamdi, Deena International Journal of Computer ScienceNetwork S 2022 International journal of computer science and netw Vol.22 No.3

        By using the Blackboard (BB) system in the education sector, the educational process for both academics and students is facilitated. Two data resources were used to evaluate the use of the BB system by students of Umm Al-Qura University: statistical reports issued by the university and an online questionnaire. A total of 989 students from all colleges and different programmes provided by the university responded to the questionnaire survey. According to our findings, most students did not use the BB before the pandemic. Therefore, the sudden conversion to the BB system required intensive training courses. After the data analysis, the relationship between the use of the BB system before the pandemic and the problems students faced during the lockdown was revealed. The most critical issues raised by the respondents were: (1) "The voice of the lecturer went on and off during BB collaborate class", (2) "internet connection of the lecturer went on and off during BB collaborate class" and (3) "High possibility of IT problems during exams".

      • A Systematic Review on Human Factors in Cybersecurity

        Alghamdi, Ahmed International Journal of Computer ScienceNetwork S 2022 International journal of computer science and netw Vol.22 No.10

        A huge budget is spent on technological solutions to protect Information Systems from cyberattacks by organizations. However, it is not enough to invest alone in technology-based protection and to keep humans out of the cyber loop. Humans are considered the weakest link in cybersecurity chain and most of the time unaware that their actions and behaviors have consequences in cyber space. Therefore, humans' aspects cannot be neglected in cyber security field. In this work we carry out a systematic literature review to identify human factors in cybersecurity. A total of 27 papers were selected to be included in the review, which focuses on the human factors in cyber security. The results show that in total of 14 identified human factors, risk perception, lack of awareness, IT skills and gender are considered critical for organization as for as cyber security is concern. Our results presented a further step in understanding human factors that may cause issues for organizations in cyber space and focusing on the need of a customized and inclusive training and awareness programs.

      연관 검색어 추천

      이 검색어로 많이 본 자료

      활용도 높은 자료

      해외이동버튼