• Title/Summary/Keyword: Jeddah

Search Result 118, Processing Time 0.022 seconds

A Proposed Framework for the Automated Authorization Testing of Mobile Applications

  • Alghamdi, Ahmed Mohammed;Almarhabi, Khalid
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.5
    • /
    • pp.217-221
    • /
    • 2021
  • Recent studies have indicated that mobile markets harbor applications (apps) that are either malicious or vulnerable, compromising millions of devices. Some studies indicate that 96% of companies' employees have used at least one malicious app. Some app stores do not employ security quality attributes regarding authorization, which is the function of specifying access rights to access control resources. However, well-defined access control policies can prevent mobile apps from being malicious. The problem is that those who oversee app market sites lack the mechanisms necessary to assess mobile app security. Because thousands of apps are constantly being added to or updated on mobile app market sites, these security testing mechanisms must be automated. This paper, therefore, introduces a new mechanism for testing mobile app security, using white-box testing in a way that is compatible with Bring Your Own Device (BYOD) working environments. This framework will benefit end-users, organizations that oversee app markets, and employers who implement the BYOD trend.

MATHEMATICAL ANALYSIS OF AN "SIR" EPIDEMIC MODEL IN A CONTINUOUS REACTOR - DETERMINISTIC AND PROBABILISTIC APPROACHES

  • El Hajji, Miled;Sayari, Sayed;Zaghdani, Abdelhamid
    • Journal of the Korean Mathematical Society
    • /
    • v.58 no.1
    • /
    • pp.45-67
    • /
    • 2021
  • In this paper, a mathematical dynamical system involving both deterministic (with or without delay) and stochastic "SIR" epidemic model with nonlinear incidence rate in a continuous reactor is considered. A profound qualitative analysis is given. It is proved that, for both deterministic models, if ��d > 1, then the endemic equilibrium is globally asymptotically stable. However, if ��d ≤ 1, then the disease-free equilibrium is globally asymptotically stable. Concerning the stochastic model, the Feller's test combined with the canonical probability method were used in order to conclude on the long-time dynamics of the stochastic model. The results improve and extend the results obtained for the deterministic model in its both forms. It is proved that if ��s > 1, the disease is stochastically permanent with full probability. However, if ��s ≤ 1, then the disease dies out with full probability. Finally, some numerical tests are done in order to validate the obtained results.

Distance Eccentric Connectivity Index of Graphs

  • Alqesmah, Akram;Saleh, Anwar;Rangarajan, R.;Gunes, Aysun Yurttas;Cangul, Ismail Naci
    • Kyungpook Mathematical Journal
    • /
    • v.61 no.1
    • /
    • pp.61-74
    • /
    • 2021
  • Let G = (V, E) be a connected graph. The eccentric connectivity index of G is defined by ��C (G) = ∑u∈V (G) deg(u)e(u), where deg(u) and e(u) denote the degree and eccentricity of the vertex u in G, respectively. In this paper, we introduce a new formulation of ��C that will be called the distance eccentric connectivity index of G and defined by $${\xi}^{De}(G)\;=\;{\sum\limits_{u{\in}V(G)}}\;deg^{De}(u)e(u)$$ where degDe(u) denotes the distance eccentricity degree of the vertex u in G. The aim of this paper is to introduce and study this new topological index. The values of the eccentric connectivity index is calculated for some fundamental graph classes and also for some graph operations. Some inequalities giving upper and lower bounds for this index are obtained.

Adoption of the Bring Your Own Device (BYOD) Approach in the Health Sector in Saudi Arabia

  • Almarhabi, Khalid A.;Alghamdi, Ahmed M.;Bahaddad, Adel A.
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.7
    • /
    • pp.371-382
    • /
    • 2022
  • The trend of Bring Your Own Device (BYOD) is gaining popularity all over the world with its innumerable benefits such as financial gain, greater employee satisfaction, better job efficiency, boosted morale, and improved flexibility. However, this unstoppable and inevitable trend also brings its own challenges and risks while managing and controlling corporate data and networks. BYOD is vulnerable to attacks by viruses, malware, or spyware that can reach sensitive data and disclose information, modify access policies, disrupt services, create financial issues, minimise productivity, and entail some legal implications. The key focus of this research is how Saudi Arabia has approached BYOD with the help of their 5-step solution model and quantitative research methodology. The result of this study is a statement about what users know about this trend, their opinions about it, and suggestion to increase the employee awareness.

Culture Influence on Enterprise Planning Resource (ERP) Implementation In Saudi Arabia's Public Sector

  • Alzahrani, Ahmed Omar
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.7
    • /
    • pp.397-403
    • /
    • 2022
  • Enterprise resource planning (ERP) is widely adopted among enterprises and organizations. In recent years, researchers have become increasingly interested in factors related to ERP implementation success. In this paper, top management members, IT professionals, and end-users were interviewed in the study. The study used Hofstede's main cultural dimensions as a theoretical framework to identify cultural characteristics and their influence on ERP implementation within public organizations in Saudi Arabia. The study followed a qualitative methodology approach to carry on the study to investigate the national culture characteristics in Saudi Arabia that may influence ERP implementation success. The study found some culturally related factors that could influence success in ERP implantation projects in Saudi Arabia..

Dynamical behavior of the orthotropic elastic material using an analytical solution

  • Balubaid, Mohammed;Abdo, H.;Ghandourah, E.;Mahmoud, S.R.
    • Geomechanics and Engineering
    • /
    • v.25 no.4
    • /
    • pp.331-339
    • /
    • 2021
  • In this work, an analytical solution is provided for the dynamical response of an orthotropic non-homogeneous elastic material. The present study has engineering applications in the fields of geophysical physics, structural elements, plasma physics, and the corresponding measurement techniques of magneto-elasticity. The analytical performances for the elastodynamic equations has been solved regarding displacements. The influences of the rotation, the magnetic field, the non-homogeneity based radial displacement and the corresponding stresses in an orthotropic material are investigated. The variations of the stresses, the displacement, and the perturbation magnetic field have been illustrated. The comparisons is performed using the previous solutions in the magnetic field absence, the non-homogeneity and the rotation.

Developing Student-Teacher Interaction Through Task-Based Instruction

  • Alsamadani, Hashem A.
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.4
    • /
    • pp.47-52
    • /
    • 2022
  • The current study investigates how student-teacher interaction can be developed through task-based teaching in undergraduate students' Saudi teaching and learning context. An experiment was conducted for five weeks on 85 male undergraduate students at a Saudi public university based in Jeddah, Saudi Arabia. The study investigated different types of student-teacher interaction through task-based teaching (speaking activities). The results revealed that the experimental group (43 students) evinced much more enthusiasm, willingness, engagement and readiness in their inclass participation than their peers in the control group (42 students). The student-teacher interaction also helped students to be more responsive to general and specific topics in speaking activities. The study recommends that decision-makers in education make student-teacher interaction part of the student's monthly assessment. It also recommends that more efforts be made to foster the awareness of students, teachers, and parents awareness of the academic and non-academic importance of interaction. One final recommendation of the research is that student-teacher interaction should be more emphasized and integrated into the school curriculum and adopted as a critical teaching strategy.

A Systematic Review on Human Factors in Cybersecurity

  • Alghamdi, Ahmed
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.10
    • /
    • pp.282-290
    • /
    • 2022
  • A huge budget is spent on technological solutions to protect Information Systems from cyberattacks by organizations. However, it is not enough to invest alone in technology-based protection and to keep humans out of the cyber loop. Humans are considered the weakest link in cybersecurity chain and most of the time unaware that their actions and behaviors have consequences in cyber space. Therefore, humans' aspects cannot be neglected in cyber security field. In this work we carry out a systematic literature review to identify human factors in cybersecurity. A total of 27 papers were selected to be included in the review, which focuses on the human factors in cyber security. The results show that in total of 14 identified human factors, risk perception, lack of awareness, IT skills and gender are considered critical for organization as for as cyber security is concern. Our results presented a further step in understanding human factors that may cause issues for organizations in cyber space and focusing on the need of a customized and inclusive training and awareness programs.

URL Filtering by Using Machine Learning

  • Saqib, Malik Najmus
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.8
    • /
    • pp.275-279
    • /
    • 2022
  • The growth of technology nowadays has made many things easy for humans. These things are from everyday small task to more complex tasks. Such growth also comes with the illegal activities that are perform by using technology. These illegal activities can simple as displaying annoying message to big frauds. The easiest way for the attacker to perform such activities is to convenience user to click on the malicious link. It has been a great concern since a decay to classify URLs as malicious or benign. The blacklist has been used initially for that purpose and is it being used nowadays. It is efficient but has a drawback to update blacklist automatically. So, this method is replace by classification of URLs based on machine learning algorithms. In this paper we have use four machine learning classification algorithms to classify URLs as malicious or benign. These algorithms are support vector machine, random forest, n-nearest neighbor, and decision tree. The dataset that is used in this research has 36694 instances. A comparison of precision accuracy and recall values are shown for dataset with and without preprocessing.

Effects of Gamification-Based Learning on Learners' Achievement Motivation at First-Grade Intermediate Level

  • Al-Sulami, Sami Ben Shamlan Bakhit
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.5
    • /
    • pp.266-276
    • /
    • 2022
  • The study aimed to pinpoint the effects of an educational environment based on gamification on developing achievement motivation among first-grade intermediate students. Using an achievement motivation scale, the study adopted a quasi-experimental design with experimental and control groups. The sample consisted of 52 students selected randomly from the first-grade intermediate students. They were studying in public intermediate schools in Jeddah at the time of this study. They were divided into two groups. The control group (n=24 respondent), and the experimental group (n=28 respondent). The results showed statistically significant differences at the level α ≥ 0.05 between the mean scores of the experimental group and the control group in the posttest of the achievement motivation measurement in favor of the experimental group. The study recommended using gamification in designing computer curricula and courses across educational stages in Saudi Arabia. It also recommends training the computer and information technology teachers on using gamification in their teaching.