• Title/Summary/Keyword: Umm Al-Qura University

Search Result 240, Processing Time 0.026 seconds

Social Networking Site Usage, Social Capital and Entrepreneurial Intention: An Empirical Study from Saudi Arabia

  • HODA, Najmul;FALLATAH, Mahmoud
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.9 no.5
    • /
    • pp.421-429
    • /
    • 2022
  • Entrepreneurship research has focused on several factors that might affect the intention of an individual to start an enterprise. Using principles from social network theory and the entrepreneurial intention model (EI), the current research intends to investigate how social capital is formed on Social Networking Sites (SNS) and how the resulting social capital influences entrepreneurial intention. Using an online survey, 151 valid responses were received from university students. Applying partial least square structural equation modeling, positive and significant relationship was found between the SNS usage and bonding and bridging social capital. Further, it was also found that online-bonding social capital does not impact any of the three antecedents of entrepreneurial intention. On the other hand, online-bridging social capital significantly influences personal attitudes and subjective norms. It was also found that both personal attitude and perceived behavioral control significantly relate to EI, while the subjective norms do not relate significantly to EI. The paper contributes to the literature on technology-based human behavior and entrepreneurship in emerging countries, opening some areas for future research, while also providing some managerial insights. It also should be beneficial to educational institutions in understanding how the use of SNS use by students may be optimized.

SOLVABILITY OF LUIKOV'S SYSTEM OF HEAT AND MASS DIFFUSION IN ONE-DIMENSIONAL CASE

  • Bougoffa, Lazhar;Al-Jeaid, Hind K.
    • Journal of applied mathematics & informatics
    • /
    • v.29 no.1_2
    • /
    • pp.369-380
    • /
    • 2011
  • This paper studies a boundary value problem for a linear coupled Luikov's system of heat and mass diffusion in one-dimensional case. Using an a priori estimate, we prove the uniqueness of the solution. Also, some traveling wave solutions and explicit solutions are obtained by using the transformation ${\xi}$ = x - ct and separation method respectively.

Supported and Unleashed - The Impact of Work Environment on the Creative Performance of Knowledge Workers: An Empirical Study in Saudi Arabia

  • FALLATAH, Mahmoud;SINDI, Hadeel
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.9 no.10
    • /
    • pp.61-71
    • /
    • 2022
  • Organizations pursue innovation to improve performance and gain competitive advantage, and knowledge workers represent an integral part of creating knowledge and helping organizations in their innovation efforts. The current paper seeks to examine the impact of the work environment on knowledge workers' creativity. Building on The Investment Theory of Creativity, The Componential Theory of Creativity, the Job Demand-Resource model, and the Resource Based View, we develop and test a model suggesting a relationship between work environment-social support, sufficient resources, organizational freedom, and organizational regulations-and the quantity and quality of the creative performance of knowledge workers. Using a sample of 167 engineers in Saudi Arabia, an emerging but wealthy country with huge innovation inspirations, the results of our Ordinary Least Squares (OLS) regression analysis indicate that all four elements of the work environment included in our study positively impact the quantity and quality of knowledge workers' creative performance. Our paper provides important contributions to the literature on the work environment, creativity, and knowledge management, with an emphasis on creativity in developing countries. Our study highlights the importance of creating a supportive and encouraging work environment for knowledge workers to foster their creativity. The study offers several theoretical and managerial implications, along with suggestions for future research.

A Discussion on Home-Institutions' Relations with Reference to Children with Intellectual Disabilities in Saudi Arabia

  • Bagadood, Nizar H.;Saigh, Budor H.
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.3
    • /
    • pp.266-272
    • /
    • 2022
  • Private specialized institutions differ from public ones in that they mostly act independently. This paper reports a study designed to assess the provision of specialized institutions for children with intellectual disabilities in Saudi Arabia. The approach taken in this study was qualitative, involving a case study strategy that enabled the researcher to gain rich and in-depth information based on the shared experiences of participants comprising institution leaders, educators and families from two specific specialized settings, one public and one private. The study aimed to examine the existing disparities in service delivery so as to develop a clear picture of the service quality provided by public specialized institutions for children with intellectual disabilities in Saudi Arabia. The results suggest that the weak relationship with inpatient and specialized institutions is a consequence of the parents' poor responsiveness, which may result in these institutes developing a negative impression of the parents. Conversely, the lack of active initiative on the part of the public specialized institutions led to a negative parental attitude towards these institutions. A sensible approach to resolving this problem might be to recognize that these institutions have a significant responsibility to encourage parents of children with intellectual disabilities to become involved in their children's learning, to promote positive attitudes.

Teachers' Perspectives on Obstacles Facing Gifted Students with Learning Disabilities in Saudi Arabia

  • Alsharif, Nawal;Alasiri, Hawazen
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.4
    • /
    • pp.254-260
    • /
    • 2022
  • The purpose of this study was to identify the obstacles facing gifted students with learning disabilities (GSLDs) from the point of view of their teachers in the Makkah region and to find suggested solutions to overcome these obstacles. The study covered Makkah, Jeddah and Taif and used semi-structured interviews which included open-ended questions. The study findings indicated that there were several educational obstacles including the absence of adapted courses or specialized teachers for GSLDs category and the insufficient time for the students to express their talents. According to the findings, there were also societal obstacles including the society's failure to expect the presence of talents along with disabilities, or its denial or rejection of their talents in addition to ridiculing them. The findings also confirmed the existence of administrative obstacles including the lack of community partnership. There were also family obstacles such as the family's lack of encouragement for the students, and ignorance of the nature of GSLDs. The study came up with a number of solutions and proposals related to awareness, educational institutions, education and competitions for talented people with learning disabilities.

Knowledge Assessment of Teachers of Students with Autism Spectrum Disorder from Applied Behaviour Analysis Perspective

  • Saigh, Budor H.;Bagadood, Nizar H.
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.1
    • /
    • pp.288-294
    • /
    • 2022
  • This study aims to assess the knowledge of teachers working with students with autism spectrum disorder (ASD) regarding applied behaviour analysis (ABA). The study was concerned with teachers' knowledge of ABA, its application in the classroom, barriers to its use and desired training opportunities and/or resources to enhance teacher application of ABA strategies in the classroom. Data were collected via an online survey completed by 190 teachers with students diagnosed with ASD in British schools. The results revealed overall knowledge of ABA strategies for classrooms, with only some teachers uninformed about the broad use and some key elements, and general familiarity with skills crucial for applying ABA. Actual knowledge of ABA was found to be high. In terms of application of ABA, the majority of the teachers employed a wide range of known strategies. A number of barrier to the application of ABA were noted including a lack of knowledge and training, a lack of administrative support and a lack of time and physical resources. Theoretical knowledge is crucial for practical applications; however, practical training was found to be important to ensure intervention efficacy.

Concealed Policy and Ciphertext Cryptography of Attributes with Keyword Searching for Searching and Filtering Encrypted Cloud Email

  • Alhumaidi, Hind;Alsuwat, Hatim
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.6
    • /
    • pp.212-222
    • /
    • 2022
  • There has been a rapid increase in the use of cloud email services. As a result, email encryption has become more commonplace as concerns about cloud privacy and security grow. Nevertheless, this increase in usage is creating the challenge of how to effectively be searching and filtering the encrypted emails. They are popular technologies of solving the issue of the encrypted emails searching through searchable public key encryption. However, the problem of encrypted email filtering remains to be solved. As a new approach to finding and filtering encrypted emails in the cloud, we propose a ciphertext-based encrypted policy attribute-based encryption scheme and keyword search procedure based on hidden policy ciphertext. This feature allows the user of searching using some encrypted emails keywords in the cloud as well as allowing the emails filter-based server toward filter the content of the encrypted emails, similar to the traditional email keyword filtering service. By utilizing composite order bilinear groups, a hidden policy system has been successfully demonstrated to be secure by our dual system encryption process. Proposed system can be used with other scenarios such as searching and filtering files as an applicable method.

Survey of Algorithms and Techniques Used to Improve the Security of A Public Wi-Fi Network

  • Aloufi, Hanouf;Alsuwat, Hatim
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.6
    • /
    • pp.194-202
    • /
    • 2022
  • The use of public Wi-Fi has increased in recent years with many people like to spend their time outside in malls or café shops which provide public Wi-Fi for their customers. However, since the public Wi-Fi can be accessed from any device the security of public Wi-Fi plays a big role to prevent the stealing of information by an attacker with methods and techniques such as WPA, WPA2 and WPA3. However, it is well known to the attackers that these methods are not difficult to get hacked by the attacker device to take the client precious information. Some researches were done in increasing the security of public Wi-Fi each with their own different technique or algorithm to provide more secure connection to the public Wi-Fi and prevent any unauthorized user to connect to avoid stealing the data of another legal user. Theses research paper are evaluated to learn which method excel in protecting the public Wi-Fi security by giving an analysis to the methods provided by the research paper with comparing the pros and cons of each algorithm. Moreover, the research displays that there are methods to actually provide security to the public Wi-Fi with each being very different in implementation.

Measuring and Evaluating the Work-Related Stress of Nurses in Saudi Arabia during the Covid-19 Pandemic

  • Bagadood, May H.;Almaleki, Deyab A.
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.3
    • /
    • pp.201-212
    • /
    • 2022
  • Prior to the emergence of Covid-19, Saudi Arabia (SA) had never faced the challenge of dealing with a global pandemic. Significantly, the current crisis has impacted all industries and sectors in the country, including the healthcare system, and has led to an emphasis on human life being more precious and valuable than economic profit. This study focuses on the impact of Covid-19 on the health of nurses, including their quality of life, during 2020. Understanding the position of the nursing profession during the pandemic, including the most effective methods of preventing work-related stress is important. Information was acquired through an online survey method (i.e. self-completion), known as the Expanded Nursing Stress Scale (ENSS), which was distributed to nurses in all regions of SA. It was found that the main aspects impacting nurses' work-related stress include gender, employment type, training, and dealing with infected patients. In addition, they highlight that such stress plays a substantial role in patient safety and nurses' satisfaction at work, as well as the future survival of organizations. The emergence of Covid-19 as a novel infectious disease has increased nurses' uncertainty and work-related stress. The results of this research will provide insights into the views of both nurses and their managers, in order to identify the main indicators of stress.

Using Ant Colony Optimization to Find the Best Precautionary Measures Framework for Controlling COVID-19 Pandemic in Saudi Arabia

  • Alshamrani, Raghad;Alharbi, Manal H.
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.10
    • /
    • pp.352-358
    • /
    • 2022
  • In this paper, we study the relationship between infection rates of covid 19 and the precautionary measures and strict protocols taken by Saudi Arabia to combat the spread of the coronavirus disease and minimize the number of infected people. Based on the infection rates and the timetable of precautionary measures, the best framework of precautionary measures was identified by applying the traveling salesman problem (TSP) that relies on ant colony optimization (ACO) algorithms. The proposed algorithm was applied to daily infected cases data in Saudi Arabia during three periods of precautionary measures: partial curfew, whole curfew, and gatherings penalties. The results showed the partial curfew and the whole curfew for some cities have the minimum total cases over other precautionary measures. The gatherings penalties had no real effect in reducing infected cases as the other two precautionary measures. Therefore, in future similar circumstances, we recommend first applying the partial curfew and the whole curfew for some cities, and not considering the gatherings penalties as an effective precautionary measure. We also recommend re-study the application of the grouping penalty, to identify the reasons behind the lack of its effectiveness in reducing the number of infected cases.