• 제목/요약/키워드: Umm Al-Qura University

검색결과 239건 처리시간 0.021초

Proposing Micro-Learning in Saudi Universities

  • Almalki, Mohammad Eidah Messfer
    • International Journal of Computer Science & Network Security
    • /
    • 제22권4호
    • /
    • pp.13-16
    • /
    • 2022
  • This paper proposes using micro-learning at Saudi universities. It commences with an account of the concept of micro-learning and the difference between micro-learning and electronic learning. Then it touches on the significance, principles, and examples of micro-learning, followed by some micro-learning applications and pitfalls. The paper closes with a proposal for using this learning mode at Saudi universities.

Historical Review of Who Has Control Over Public Policy Formulation in Islamic Law

  • Almarashi, Majdi Saeed
    • International Journal of Computer Science & Network Security
    • /
    • 제22권8호
    • /
    • pp.357-361
    • /
    • 2022
  • The paper demonstrates how the Islamic governments in the Islamic history derived the authority for regulations and laws from the Qur'ān and the Sunna (sayings of the Prophet). These two laws are sovereign over public policy. Then, it shows the obstacles that prevented modern Muslim countries from formulating public policy based on Sharia law.

An Application of The Islamic Methodology in The Enactment of Criminal Laws and Policy Formulation

  • Almarashi, Majdi Saeed
    • International Journal of Computer Science & Network Security
    • /
    • 제22권8호
    • /
    • pp.169-174
    • /
    • 2022
  • Public policies are subject to the general strategies and agendas of the state and the enactment of law is subject to the superior laws. This paper will clarify in a practical way how the strategies and agenda of an Islamic state and the superior law (the primary sources of Sharia law) affect the mechanism of enacting laws and creating policies in an Islamic government. Especially, in the field of criminal law.

An Application of The Islamic Methodology in The Enactment of Commercial Laws and Policy Formulation

  • Almarashi, Majdi Saeed
    • International Journal of Computer Science & Network Security
    • /
    • 제22권8호
    • /
    • pp.129-134
    • /
    • 2022
  • Public policies are subject to the general strategies and agendas of the state and the enactment of law is subject to the superior laws. This paper will clarify in a practical way how the strategies and agenda of an Islamic state and the superior law (the primary sources of Sharia law) affect the mechanism of enacting laws and creating policies in an Islamic government. Especially, in the field of commercial law.

The Concept of Corporations In Saudi Law and Its Relationship With Islamic Law

  • Alzhrani, Abdulrahman AA
    • International Journal of Computer Science & Network Security
    • /
    • 제22권8호
    • /
    • pp.425-431
    • /
    • 2022
  • Saudi laws must be derived from Islamic law. However, Islamic law has a flexible methodology that allows it to deal with any form of business entity. Today there is no difference between the countries around the world about the general concept of the corporation because countries have copied the system of the corporation from each other since the sixteenth century.

History of The Legal Developments of Corporations in Saudi Arabia

  • Alzhrani, Abdulrahman AA
    • International Journal of Computer Science & Network Security
    • /
    • 제22권8호
    • /
    • pp.420-424
    • /
    • 2022
  • The Arab Automotive Company was the first corporation in Saudi Arabia and was founded in 1928. Since then, the number of Saudi corporations had increased. In 1985, Tadawul (The Saudi Stock Exchange ) was instituted under the supervision of the Saudi Arabian Monetary Authority (SAMA) and the base value of the index was 1000. This decision came as a response to accelerated growth in the number of Saudi corporations which had increased during the 1970s as the Saudi's economy developed.

A Multi-Perspective Benchmarking Framework for Estimating Usable-Security of Hospital Management System Software Based on Fuzzy Logic, ANP and TOPSIS Methods

  • Kumar, Rajeev;Ansari, Md Tarique Jamal;Baz, Abdullah;Alhakami, Hosam;Agrawal, Alka;Khan, Raees Ahmad
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제15권1호
    • /
    • pp.240-263
    • /
    • 2021
  • One of the biggest challenges that the software industry is facing today is to create highly efficient applications without affecting the quality of healthcare system software. The demand for the provision of software with high quality protection has seen a rapid increase in the software business market. Moreover, it is worthless to offer extremely user-friendly software applications with no ideal security. Therefore a need to find optimal solutions and bridge the difference between accessibility and protection by offering accessible software services for defense has become an imminent prerequisite. Several research endeavours on usable security assessments have been performed to fill the gap between functionality and security. In this context, several Multi-Criteria Decision Making (MCDM) approaches have been implemented on different usability and security attributes so as to assess the usable-security of software systems. However, only a few specific studies are based on using the integrated approach of fuzzy Analytic Network Process (FANP) and Technique for Order of Preference by Similarity to Ideal Solution (TOPSIS) technique for assessing the significant usable-security of hospital management software. Therefore, in this research study, the authors have employed an integrated methodology of fuzzy logic, ANP and TOPSIS to estimate the usable - security of Hospital Management System Software. For the intended objective, the study has taken into account 5 usable-security factors at first tier and 16 sub-factors at second tier with 6 hospital management system softwares as alternative solutions. To measure the weights of parameters and their relation with each other, Fuzzy ANP is implemented. Thereafter, Fuzzy TOPSIS methodology was employed and the rating of alternatives was calculated on the foundation of the proximity to the positive ideal solution.

The Effect of Security Information Sharing and Disruptive Technology on Patient Dissatisfaction in Saudi Health Care Services During Covid-19 Pandemic

  • Beyari, Hasan;Hejazi, Mohammed;Alrusaini, Othman
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제16권10호
    • /
    • pp.3313-3332
    • /
    • 2022
  • This study is an investigation into the factors affecting patient dissatisfaction among Saudi hospitals. The selected factors considered for analysis are security of information sharing, operational practices, disruptive technologies, and the ease of use of EHR patient information management systems. From the literature review section, it was clear that hardly any other studies have embraced these concepts in one as was intended by this study. The theories that the study heavily draws from are the service dominant logic and the feature integration theory. The study surveyed 350 respondents from three large major hospitals in three different metropolitan cities in the Kingdom of Saudi Arabia. This sample came from members of the three hospitals that were willing to participate in the study. The number 350 represents those that successfully completed the online questionnaire or the limited physical questionnaires in time. The study employed the structural equation modelling technique to analyze the associations. Findings suggested that security of information sharing had a significant direct effect on patient satisfaction. Operational practice positively mediated the effect of security of information sharing on patient dissatisfaction. However, ease of use failed to significant impact this association. The study concluded that to improve patient satisfaction, Saudi hospitals must work on their systems to reinforce them against the active threats on the privacy of patients' data by leveraging disruptive technology. They should also improve their operational practices by embracing quality management techniques relevant to the healthcare sector.

Specialists' Views Concerning the Assessment, Evaluation, and Programming System (AEPS) in Associations for Children with Disabilities in Saudi Arabia

  • Munchi, Khiryah S.;Bagadood, Nizar H.
    • International Journal of Computer Science & Network Security
    • /
    • 제22권2호
    • /
    • pp.91-100
    • /
    • 2022
  • To support early intervention, it is necessary to develop programming system tools that enable accurate, valid, and reliable assessments and can help achieve reasonable, generalizable, and measurable goals. This study examined the Assessment, Evaluation, and Programming System (AEPS) used by associations of children with disabilities in Saudi Arabia to assess its suitability for children with intellectual disabilities. A group of 16 specialists with different professional backgrounds (including special education, physiotherapy, occupational therapy, speech therapy and psychology) from 11 associations of children with disabilities took part in semi-structured personal interviews. The study concluded that AEPS is generally suited for use with children with intellectual disabilities. However, its suitability depends on the type and severity of the child's disability. The more severe the disability, the less effective the AEPS is likely to be. On the basis of this finding the researchers formed interdisciplinary teams to organise and integrate the children's learning and assess the benefits of AEPS, including its accuracy and ability to achieve adaptive, cognitive, and social targets, enhance family engagement and learning and develop basic development skills. This study also identified obstacles associated with the use of AEPS. These include the lack of comprehensiveness and accuracy of the goal, lack of precision and non-applicability to large movements and the fact that it cannot be used with all children with intellectual disabilities. In addition, the research showed that non-cooperation within the family is a major obstacle to the implementation of the AEPS. The results of this study have several implications.

The Status of Teachers of Students with Intellectual Disabilities in Practicing Strategies for the Modification of Aggressive Behaviour in Saudi Arabia

  • Alqurashi, Yasser O.;Bagadood, Nizar H.
    • International Journal of Computer Science & Network Security
    • /
    • 제22권1호
    • /
    • pp.241-247
    • /
    • 2022
  • This study examines teachers' implementation of strategies to modify the aggressive behavior of students with intellectual disabilities in Saudi Arabia, to determine the obstacles to their real-world execution. In addition, it presents potential approaches to overcome the obstacles to implementing strategies with this group of students. The research employed a qualitative design using semi-structured interviews as a data collection tool and applied a thematic analysis. The study population comprised 35 teachers of students with intellectual disabilities and the study sample numbered six teachers. The interviews were conducted via different methods: three by phone, two face-to face, and one using the Zoom platform. The results revealed inadequate understanding among teachers of intellectual disability and behaviour modification strategies, and this affected their capacity to develop plans that were compatible with the needs of students with intellectual disability. The findings also identified multiple obstacles that impede teachers' implementation of strategies to modify aggressive behaviour among students with intellectual disabilities; the most important being the lack of input from a psychological specialist when developing programs to modify aggressive behaviour. In general, it is apparent that programs for modifying aggressive behaviour are neither structured nor complementary, due to the scarcity of administrators with sufficient knowledge and familiarity with the characteristics and personalities of students with intellectual disabilities. This study presents several recommendations, the most important of which is that teachers of students with intellectual disability should develop themselves through training courses to enable them to deal with these students and create treatment plans that include strategies and clear steps to modify the aggressive behaviour of students with intellectual disabilities. To support teachers, it is also necessary to remove the obstacles facing education centres by providing financial support to create an environment in which they can access the required devices and equipment in their classes.