• 제목/요약/키워드: Umm Al-Qura University

검색결과 239건 처리시간 0.022초

Gender, Education, and Financial Socialization as Determinants of Financial Knowledge: An Empirical Study

  • HODA, Najmul
    • The Journal of Asian Finance, Economics and Business
    • /
    • 제9권10호
    • /
    • pp.169-177
    • /
    • 2022
  • The main aim of the paper is to assess the level of financial literacy among business students. It further aims to investigate the role of external factors that may determine financial literacy. The external factors considered in this study are gender, grade point average, specialization, financial education, and financial socialization. Standard scales such as the Test of Financial Literacy, the Big Three, and other instruments were adapted to measure Financial Knowledge. Further, the study also explored relationships between several factors and the financial knowledge of students. These factors included a student's gender, specialization, number of finance or related courses studied, current Grade Point Average, and financial socialization. A total number of 303 valid responses were received through an online questionnaire administered to business students studying in a public university in the country. Statistical tests namely independent samples t-Test, one-way ANOVA, and correlation analysis were performed in SPSS 28.0. Results show that the overall financial knowledge of students is above average. Gender, number of finance or related courses, and financial socialization do not exhibit any significant relationship with financial knowledge. Current GPA and specialization show significant relationships. The findings of this study have important sectoral and research implications.

Faculty Members' Knowledge and willingness to Implement the Universal Design for Learning for Students with Disabilities in Saudi Universities

  • Alzahrani, Hassan M
    • International Journal of Computer Science & Network Security
    • /
    • 제22권10호
    • /
    • pp.315-321
    • /
    • 2022
  • Many students with disabilities and special needs are enrolled in higher education, which substantiated the need for research regarding faculty members' knowledge and willingness to implement supportive strategies in higher education in Saudi Arabia. This study explored Saudi university faculty members' knowledge and willingness to apply UDL (Universal Design for Learning) principles in their teaching practice. Surveys were used for data collection for this descriptive research. The findings indicated faculty members felt that they were knowledgeable regarding UDL and were willing to use UDL principles in teaching their students. Furthermore, there were no statistically significant differences between faculty members' knowledge levels regarding UDL based on their current position and years of experience. The findings indicated there was a significant relationship between gender and knowledge, with males having a significantly higher mean knowledge, although further analyses revealed it was a small effect. Finally, the results suggest more years of experience are related to greater willingness to use UDL principles, and this is particularly true for those in a lecturing position. These findings could be helpful, particularly for the Ministry of Education in Saudi Arabia to shed light on faculty members' UDL knowledge. Further research is needed to substantiate the findings.

A Cost-Effective Land Surveying System for Engineering Applications

  • El-Ashmawy, Khalid L.A.
    • International Journal of Computer Science & Network Security
    • /
    • 제22권11호
    • /
    • pp.373-380
    • /
    • 2022
  • The field of land surveying is changing dramatically due to the way data is processed, analyzed and presented. Also, there is a growing demand for digital spatial information, coming primarily from the GIS (Geographical Information System) user community. Such a demand has created a strong development potential for a new land surveying software. An overview of the development and capabilities of a land surveying software platform based on the Windows system, SurveyingMap, is presented. Among its many features, SurveyingMap provides a lot of adaptability for networks adjustment, geodetic and plane coordinates transformation, contouring, sectioning, DTM (Digital Terrain Model) generation, and large scale mapping applications. The system output is compatible with well known computer aided drafting (CAD) /GIS packages to expand its scope of applications. SurveyingMap is also suitable for non-technical users due to the user-friendly graphic user interface. The system could be used in engineering, architecture, GIS, and academic teaching and research, among other fields. Two applications of SurveyingMap, extension of field control and large scale mapping, for the case study area are established. The results demonstrate that the system is adaptable and reasonably priced for use by college and university students.

Perceived Motivators and Barriers for Entrepreneurship: An Empirical Study of SMEs in Oman

  • GUPTA, S.L.;HODA, Najmul
    • The Journal of Asian Finance, Economics and Business
    • /
    • 제8권5호
    • /
    • pp.863-872
    • /
    • 2021
  • The main goal of this research is to understand how small and medium enterprises (SMEs) owners in Oman perceive the factors that drive or impede their growth and sustainability. Based on survey data of 395 SMEs in Oman, factor analysis was conducted to check if all the items load as one factor in each of the constructs. The results show that all the items measuring motivators and barriers loaded significantly for the respective scales, with high reliability (Cronbach alpha for Motivators = 0.991 and Barriers = 0.995). Relationships between the demographic factors of entrepreneurs and firm characteristics were tested and it was found that all the four variables: age of the entrepreneur (p = 0.00), qualification of the entrepreneur (p = 0.00), SME sector (p = 0.00), and age of the firm (p = 0.00) have a significant relationship with both the Motivators and the Barriers. The findings of this study could have significant implications for policymakers in Oman and other Middle Eastern countries. Since SMEs face similar problems and are given priority around the world, the findings could be applicable to other countries, as well. The findings also add important results to the empirical literature on SMEs.

Accuracy of Data-Model Fit Using Growing Levels of Invariance Models

  • Almaleki, Deyab A.
    • International Journal of Computer Science & Network Security
    • /
    • 제21권12호
    • /
    • pp.157-164
    • /
    • 2021
  • The aim of this study is to provide empirical evaluation of the accuracy of data-model fit using growing levels of invariance models. Overall model accuracy of factor solutions was evaluated by the examination of the order for testing three levels of measurement invariance (MIV) starting with configural invariance (model 0). Model testing was evaluated by the Chi-square difference test (∆𝛘2) between two groups, and root mean square error of approximation (RMSEA), comparative fit index (CFI), and Tucker-Lewis index (TLI) were used to evaluate the all-model fits. Factorial invariance result revealed that stability of the models was varying over increasing levels of measurement as a function of variable-to-factor ratio (VTF), subject-to-variable ratio (STV), and their interactions. There were invariant factor loadings and invariant intercepts among the groups indicating that measurement invariance was achieved. For VTF ratio (3:1, 6:1, and 9:1), the models started to show accuracy over levels of measurement when STV ratio was 6:1. Yet, the frequency of stability models over 1000 replications increased (from 69% to 89%) as STV ratio increased. The models showed more accuracy at or above 39:1 STV.

Laying Off Versus Training Workers: How Can Saudi Entrepreneurs Manage the COVID-19 Crisis?

  • RAIES, Asma;BEN MIMOUN, Mohamed
    • The Journal of Asian Finance, Economics and Business
    • /
    • 제8권4호
    • /
    • pp.673-685
    • /
    • 2021
  • This study aims to determine theoretically the best workers layoff/training strategy that entrepreneurs should apply to manage the COVID-19 crisis successfully. It also examines the impacts of the Saudi government's emergency measures on firm performance. The paper develops a theoretical framework in which the optimal control technics is applied to model the entrepreneur's hiring, layoff, and training behaviors. The results show that, during the current COVID-19 pandemic, the entrepreneur should first lay off the less productive workers to reduce labor costs. As more and more inefficient workers quit and profit increases, the entrepreneur starts expanding his activity and training workers. In the long run, only the training activity allows the firm efficiency to grow at a constant rate. This finding suggests that the key to long-run economic recovery in Saudi Arabia will rely on training, innovation, and adaptability to the new digital environment. The paper also shows that the Saudi government initiative of covering 60% of salaries for the small- and medium-sized entrepreneurs during the COVID-19 pandemic will enhance training activities in small- and medium-sized enterprises and improve their efficiency in both the short and long run. This policy will also prevent Saudi entrepreneurs from laying off half of their staff.

Security Threats and Attacks in Internet of Things (IOTs)

  • Almtrafi, Sara Mutlaq;Alkhudadi, Bdour Abduallatif;Sami, Gofran;Alhakami, Wajdi
    • International Journal of Computer Science & Network Security
    • /
    • 제21권1호
    • /
    • pp.107-118
    • /
    • 2021
  • The term Internet of Things (IoTs) refers to the future where things are known daily through the Internet, whether in one way or another, as it is done by the method of collecting various information from various sensors to form a huge network through which people, things and machines are helped to make a link between them at all time and anywhere. The IoTs is everywhere around us such as connected appliances, smart homes security systems and wearable health monitors. However, the question is what if there is a malfunction or outside interference that affects the work of these IoTs based devises? This is the reason of the spread of security causes great concern with the widespread availability of the Internet and Internet devices that are subject to many attacks. Since there aren't many studies that combines requirements, mechanisms, and the attacks of the IoTs, this paper which explores recent published studies between 2017 and 2020 considering different security approaches of protection related to the authentication, integrity, availability and confidentiality Additionally, the paper addresses the different types of attacks in IoTs. We have also addressed the different approaches aim to prevention mechanisms according to several researchers' conclusions and recommendations.

Text Mining in Online Social Networks: A Systematic Review

  • Alhazmi, Huda N
    • International Journal of Computer Science & Network Security
    • /
    • 제22권3호
    • /
    • pp.396-404
    • /
    • 2022
  • Online social networks contain a large amount of data that can be converted into valuable and insightful information. Text mining approaches allow exploring large-scale data efficiently. Therefore, this study reviews the recent literature on text mining in online social networks in a way that produces valid and valuable knowledge for further research. The review identifies text mining techniques used in social networking, the data used, tools, and the challenges. Research questions were formulated, then search strategy and selection criteria were defined, followed by the analysis of each paper to extract the data relevant to the research questions. The result shows that the most social media platforms used as a source of the data are Twitter and Facebook. The most common text mining technique were sentiment analysis and topic modeling. Classification and clustering were the most common approaches applied by the studies. The challenges include the need for processing with huge volumes of data, the noise, and the dynamic of the data. The study explores the recent development in text mining approaches in social networking by providing state and general view of work done in this research area.

Autonomous Transmission Power Adjustment Strategy for Femtocell Base Station

  • Alotaibi, Sultan
    • International Journal of Computer Science & Network Security
    • /
    • 제22권4호
    • /
    • pp.367-373
    • /
    • 2022
  • Femtocells have recently been recognized for their potential to boost network capacity, improve end-user QoS and throughput, and do so at a cheap cost and with ease of implementation. The use of femtocells in indoor environments, such as residential buildings with neighboring homes, is becoming more popular. Femtocells are subject to interference from other femtocells, and the unwanted effects of interference are amplified when femtocells are deployed in close proximity to one another. As a consequence, the network's overall performance is degraded to a significant degree. One of the strategies that is thought to be effective in reducing the impact of interference is altering the transmission power of the femtocells. In this paper, a dynamic downlink transmission power of femtocells is suggested. In accordance with the observed cost function unit, each femtocell automatically changes its transmission power. If a femtocell causes too much interference for its neighbors, its transmission power level will be limited by that interference's rate. A simulation experiment is conducted to validate the effectiveness of the suggested system when compared with other schemes. When compared to previous schemes, which are addressed in this study, the numerical results show that the proposed strategy could provide more capacity while also ideally mitigating the influence of interference among co-channel deployed femtocells.

Experiences of Special Education Teachers in Dealing with Behavioral Problems Presented by Students with Disabilities

  • Alhwaiti, Mohammed M.
    • International Journal of Computer Science & Network Security
    • /
    • 제22권3호
    • /
    • pp.129-134
    • /
    • 2022
  • The primary goal of any classroom is effective teaching and student learning, with an emphasis on changing negative students' behaviors into positive ones. This change can occur when students' behavior is always at the forefront of teachers' educational goals. The current study aimed to reveal the experiences of special education teachers in dealing with the behavioral problems that students with disabilities show by identifying behavioral problems among students with disabilities and investigating the efficacy of the application of behavior modification plans and strategies designed to address the behavioral problems presented by students with disabilities. The researcher used a qualitative phenomenological approach, and the study tool consisted of semi-structured interviews that consisted of (13) questions directed to (10) special education male and female teachers who work in special education centres and institutes. The data were analyzed using the thematic analysis method. The findings of the study showed that the most undesirable behaviors prevalent among students with disabilities in the classroom were aggression, bullying and ADHD. The actions taken by teachers in confronting these behaviors were not systematic and were carried out randomly, as no behavior modification plans were applied. The most important strategies used by teachers in facing behavioral problems were applied behavioral analysis (ABA) strategies such as reinforcement, punishment and ignoring. The results have many important implications for future practice, including the need to conduct practical training courses for special education teachers to implement behavior modification plans and develop methods of measuring inappropriate behavior.