I have a goal to develop my skills and self-development in the field of Electronic Management, Information Security and Networks. As well as, developing my technical capabilities in Applications Programming, Web Sites Design, Web Applications Development, Analysis and Design Systems and Databases Design. Beside to the active participation in Scientific Research and Academic Dissemination in the field of Information Technology management.
International Journal of Academic Research in Business and Social Sciences, 2022
Nowadays, some of the intersting roles of human life are data, information, and knowledge. Analyz... more Nowadays, some of the intersting roles of human life are data, information, and knowledge. Analyzing and modelling of big data have been required by data massive storehouses together with the rapid technologies growth to predict and analyze the future trends of information. Methodologies and techniques, which are employed into diverse information systems scope, are needed for detection of knowing in the databases. The technology which extracts advantageous information to discover knowledge is called Data Mining. Data mining, it has been defined as discovery of knowledge in data (KDD), it is the disclosure of modalities procedures and other valuable information from considerable sets of data. It has been a tremendous progress in machine learning, artificial agent systems, and decision-making in the expert systems. In the last decades, most of the techniques and applications has been
surveyed via the researchers. Those techniques and applications are utilized in distinct areas in daily life like industrialization, education, engineering, commerce and business. Searching last years researches about the review of the most techniques and trends of data mining in multiple areas was the method which is followed in this paper. It has discovered in the learning field as diffusing data mining for educating activities, improvement quality of tasks into manufacturing field, text mining as a technique into research databases and so on. This study collectes a summary of information about the basci concept of Data Mining and its technques which other researchers may need to start their studies in Data Mining field.
International Journal of Academic Research in Business and Social Sciences, 2022
The criminals of cyber, nowadays, are exploiting software that aims to damage or disable computer... more The criminals of cyber, nowadays, are exploiting software that aims to damage or disable computer systems, i.e., malware, viruses, bots and other forms of complicated attacks or threats, to breach considerable organizations. Those threats could be for various goals, such as financial revenue, disruption of business, or political trend. The situation used by the cybercriminals is to attack diverse organizations and multiple targets for raising the likelihood ratio of success. It could be spread the viruses and malware programs that designed on daily basis. The influence of cybercrimes in business is shown in this paper by surveying some studies which were conducted in some countries.
The history of database research backs to more than thirty years, in which created the concept of... more The history of database research backs to more than thirty years, in which created the concept of the relational database system that has become the most fundamental change for organizations strategy. Technology evolution has produced more powerful systems that relate to economic impacts in the recent decade. Organizations must ensure its information and data be secured and confidential. Therefore, they deploy systems or applications have functions, services, and tools for data maintenance and management packed into the so-called Relational Database Management System (RDBMS). Database protection means disallowing illegitimate users to access the database and its sensitive information whether intentional or accidental [4]. Therefore, most of the Such functions contain services plus privileges for authorization to keep firms are taking account of possibility of threats as measures to their database systems. This paper addresses the relational database threats and security techniques considerations in relation to situations: threats, countermeasures (computer-based controls) and database security methods [1,8, 9].
International Journal of Academic Research in Business and Social Sciences, 2022
The criminals of cyber, nowadays, are exploiting software that aims to damage or disable computer... more The criminals of cyber, nowadays, are exploiting software that aims to damage or disable computer systems, i.e., malware, viruses, bots and other forms of complicated attacks or threats, to breach considerable organizations. Those threats could be for various goals, such as financial revenue, disruption of business, or political trend. The situation used by the cybercriminals is to attack diverse organizations and multiple targets for raising the likelihood ratio of success. It could be spread the viruses and malware programs that designed on daily basis. The influence of cybercrimes in business is shown in this paper by surveying some studies which were conducted in some countries.
International Journal of Academic Research in Business and Social Sciences, 2022
Nowadays, some of the intersting roles of human life are data, information, and knowledge. Analyz... more Nowadays, some of the intersting roles of human life are data, information, and knowledge. Analyzing and modelling of big data have been required by data massive storehouses together with the rapid technologies growth to predict and analyze the future trends of information. Methodologies and techniques, which are employed into diverse information systems scope, are needed for detection of knowing in the databases. The technology which extracts advantageous information to discover knowledge is called Data Mining. Data mining, it has been defined as discovery of knowledge in data (KDD), it is the disclosure of modalities procedures and other valuable information from considerable sets of data. It has been a tremendous progress in machine learning, artificial agent systems, and decision-making in the expert systems. In the last decades, most of the techniques and applications has been surveyed via the researchers. Those techniques and applications are utilized in distinct areas in daily life like industrialization, education, engineering, commerce and business. Searching last years researches about the review of the most techniques and trends of data mining in multiple areas was the method which is followed in this paper. It has discovered in the learning field as diffusing data mining for educating activities, improvement quality of tasks into manufacturing field, text mining as a technique into research databases and so on. This study collectes a summary of information about the basci concept of Data Mining and its technques which other researchers may need to start their studies in Data Mining field.
International journal of applied research, Mar 1, 2022
These days, e-commerce has acquired a fundamental concern from SMEs (Small and Medium Enterprises... more These days, e-commerce has acquired a fundamental concern from SMEs (Small and Medium Enterprises) as it awards competitive advantages and strategic benefits to the business. Even although the many benefits which e-commerce provides, the adoption avarage is as yet comparatively slow and limited. This essay assists to classify and discuss the impacts affecting the Small and Medium Enterprises willingness to adopt and practice this technique. A broad spectrum of articles and papers were interrogated in this article to classify the reasons which impact the practice of Electronic commerce in SMEs. By this, the output of this article can help SMEs to understand better the reasons behind the slow adoption of this competitive tool which will result in motivating SMEs to enable and leverage e-commerce potential and usage.
These days, e-commerce has acquired a fundamental concern from SMEs (Small and Medium Enterprises... more These days, e-commerce has acquired a fundamental concern from SMEs (Small and Medium Enterprises) as it awards competitive advantages and strategic benefits to the business. Even although the many benefits which e-commerce provides, the adoption average is as yet comparatively slow and limited. This essay assists to classify and discuss the impacts affecting the Small and Medium Enterprises willingness to adopt and practice this technique. A broad spectrum of articles and papers were interrogated in this article to classify the reasons which impact the practice of Electronic commerce in SMEs. By this, the output of this article can help SMEs to understand better the reasons behind the slow adoption of this competitive tool which will result in motivating SMEs to enable and leverage e-commerce potential and usage.
The purpose of the study is to analyzing those factors that are impacting upon the adoption of E-... more The purpose of the study is to analyzing those factors that are impacting upon the adoption of E-HRM (Electronic Human Resource Management). The respondents of the study were 288 employees from the universities. Researcher has adopted the questionnaire through the literature and taken the responses adequately from the employees of University. This research model has been designed in the context of acceptance and determines the change in behavior towards adopting the EHRM in Universities along with the impact of increased technical assistance and trust on EHRM in Universities. This model is helpful in determining the impact of different features such as; ease of use, usefulness, trust and technical support on behavior towards the EHRM in Universities. The outside factors of the model are Technical support or assistance and trust. This study extends the Technology Acceptance Model. The study results suggest that two factors are major that are technical support and trust impacting upon the ease of use and usefulness; along with this impact of ease of use and usefulness is upon the attitude and the impact of attitude is upon the adoption of E-HRM in universities. The study also discusses the certain limtations and provides recommendation for the stakeholders. Introduction Universities are become advanced in order to utilize the technology for the purpose of communication and providing the services therefore, it enable them to get the competitive edge over others in the industry(Amuna et al, 2017) [1, 3, 17]. IT has enabled the human resource in the organization different features that helps them to analyze and support the organizational operations and meeting the strategic objectives as well. It is evident that technology has embedded in the organization therefore, electronic human source management is become effective for the organization and they are developing their strategies, policies, procedures accordingly (Al Shobaki et al, 2017) [1, 3, 17]. It is obvious that organization are using the electronic human resource management system but it is also a fact that there is small amount of research is being conducted by the researchers about the Electronic HRM implementation and its results for employees and for the organizational operations as well (Stone and Dulebohn, 2013) [21, 22]. EHRM is not being taken as the research topic but there is high potential and scope for the researchers and organizations as well in order to consider it appropriately (Ruel et al, 2007; Bondarouk et al, 2017) [18, 6]. Therefore; it is necessary for the researcher to conduct researches on this area of subject to contribute for the improvement and growth of EHRM. It is also suggested that EHRM area of research is new and having its initial phase (Ruel et al, 2007) [18]. The research suggest that E-HRM is not being analyzed and utilized adequately by the academia therefore, it is not result oriented yet in the research and in practice as well (Strohmeier, 2007) [23, 24]. Further addition is being made regarding the use of EHRM approach but it is not filthy to accept easily because of incomplete results and information (Stone and Dulebohn, 2013) [21, 22]. Therefore, researcher of this paper is having an attempt to provide advance information regarding the electronic human resource management. As far as the human resource employees are concern the Electronic Human Resource system and processes are new and essential area for the research.
This study aimed to investigate factors influencing the acceptance of mobile banking in Libya. To... more This study aimed to investigate factors influencing the acceptance of mobile banking in Libya. To assist in identifying these factors, a detailed research was carried out to identify the current problems faced by the Libyan banks customers, the acceptance of mobile banking in different countries around the world, the importance of adopting this technology to both parties: banks and customers in Libya. The sample elements consisted of 319 existing customers within the banking in Tripoli. They were selected at random depending on their willingness to participate in the research study. A survey was developed to obtain responses from various segments of the society. The findings showed that factors facilitating conditions, perceived self-Efficacy, Perceived ease of use, and perceived usefulness, and have significant imapcts on consumer’s behavioral intentions for the acceptance and usage of mobile banking technology in Libya.
This study aimed to investigate factors influencing the acceptance of mobile banking in Libya. To... more This study aimed to investigate factors influencing the acceptance of mobile banking in Libya. To assist in identifying these factors, a detailed research was carried out to identify the current problems faced by the Libyan banks customers, the acceptance of mobile banking in different countries around the world, the importance of adopting this technology to both parties: banks and customers in Libya. The sample elements consisted of 319 existing customers within the banking in Tripoli. They were selected at random depending on their willingness to participate in the research study. A survey was developed to obtain responses from various segments of the society. The findings showed that factors facilitating conditions, perceived self-Efficacy, perceived ease of use, and perceived usefulness have significant imapcts on consumer’s behavioral intentions for the acceptance and usage of mobile banking technology in Libya.
International Journal of Academic Research in Business and Social Sciences, 2022
Nowadays, some of the intersting roles of human life are data, information, and knowledge. Analyz... more Nowadays, some of the intersting roles of human life are data, information, and knowledge. Analyzing and modelling of big data have been required by data massive storehouses together with the rapid technologies growth to predict and analyze the future trends of information. Methodologies and techniques, which are employed into diverse information systems scope, are needed for detection of knowing in the databases. The technology which extracts advantageous information to discover knowledge is called Data Mining. Data mining, it has been defined as discovery of knowledge in data (KDD), it is the disclosure of modalities procedures and other valuable information from considerable sets of data. It has been a tremendous progress in machine learning, artificial agent systems, and decision-making in the expert systems. In the last decades, most of the techniques and applications has been
surveyed via the researchers. Those techniques and applications are utilized in distinct areas in daily life like industrialization, education, engineering, commerce and business. Searching last years researches about the review of the most techniques and trends of data mining in multiple areas was the method which is followed in this paper. It has discovered in the learning field as diffusing data mining for educating activities, improvement quality of tasks into manufacturing field, text mining as a technique into research databases and so on. This study collectes a summary of information about the basci concept of Data Mining and its technques which other researchers may need to start their studies in Data Mining field.
International Journal of Academic Research in Business and Social Sciences, 2022
The criminals of cyber, nowadays, are exploiting software that aims to damage or disable computer... more The criminals of cyber, nowadays, are exploiting software that aims to damage or disable computer systems, i.e., malware, viruses, bots and other forms of complicated attacks or threats, to breach considerable organizations. Those threats could be for various goals, such as financial revenue, disruption of business, or political trend. The situation used by the cybercriminals is to attack diverse organizations and multiple targets for raising the likelihood ratio of success. It could be spread the viruses and malware programs that designed on daily basis. The influence of cybercrimes in business is shown in this paper by surveying some studies which were conducted in some countries.
The history of database research backs to more than thirty years, in which created the concept of... more The history of database research backs to more than thirty years, in which created the concept of the relational database system that has become the most fundamental change for organizations strategy. Technology evolution has produced more powerful systems that relate to economic impacts in the recent decade. Organizations must ensure its information and data be secured and confidential. Therefore, they deploy systems or applications have functions, services, and tools for data maintenance and management packed into the so-called Relational Database Management System (RDBMS). Database protection means disallowing illegitimate users to access the database and its sensitive information whether intentional or accidental [4]. Therefore, most of the Such functions contain services plus privileges for authorization to keep firms are taking account of possibility of threats as measures to their database systems. This paper addresses the relational database threats and security techniques considerations in relation to situations: threats, countermeasures (computer-based controls) and database security methods [1,8, 9].
International Journal of Academic Research in Business and Social Sciences, 2022
The criminals of cyber, nowadays, are exploiting software that aims to damage or disable computer... more The criminals of cyber, nowadays, are exploiting software that aims to damage or disable computer systems, i.e., malware, viruses, bots and other forms of complicated attacks or threats, to breach considerable organizations. Those threats could be for various goals, such as financial revenue, disruption of business, or political trend. The situation used by the cybercriminals is to attack diverse organizations and multiple targets for raising the likelihood ratio of success. It could be spread the viruses and malware programs that designed on daily basis. The influence of cybercrimes in business is shown in this paper by surveying some studies which were conducted in some countries.
International Journal of Academic Research in Business and Social Sciences, 2022
Nowadays, some of the intersting roles of human life are data, information, and knowledge. Analyz... more Nowadays, some of the intersting roles of human life are data, information, and knowledge. Analyzing and modelling of big data have been required by data massive storehouses together with the rapid technologies growth to predict and analyze the future trends of information. Methodologies and techniques, which are employed into diverse information systems scope, are needed for detection of knowing in the databases. The technology which extracts advantageous information to discover knowledge is called Data Mining. Data mining, it has been defined as discovery of knowledge in data (KDD), it is the disclosure of modalities procedures and other valuable information from considerable sets of data. It has been a tremendous progress in machine learning, artificial agent systems, and decision-making in the expert systems. In the last decades, most of the techniques and applications has been surveyed via the researchers. Those techniques and applications are utilized in distinct areas in daily life like industrialization, education, engineering, commerce and business. Searching last years researches about the review of the most techniques and trends of data mining in multiple areas was the method which is followed in this paper. It has discovered in the learning field as diffusing data mining for educating activities, improvement quality of tasks into manufacturing field, text mining as a technique into research databases and so on. This study collectes a summary of information about the basci concept of Data Mining and its technques which other researchers may need to start their studies in Data Mining field.
International journal of applied research, Mar 1, 2022
These days, e-commerce has acquired a fundamental concern from SMEs (Small and Medium Enterprises... more These days, e-commerce has acquired a fundamental concern from SMEs (Small and Medium Enterprises) as it awards competitive advantages and strategic benefits to the business. Even although the many benefits which e-commerce provides, the adoption avarage is as yet comparatively slow and limited. This essay assists to classify and discuss the impacts affecting the Small and Medium Enterprises willingness to adopt and practice this technique. A broad spectrum of articles and papers were interrogated in this article to classify the reasons which impact the practice of Electronic commerce in SMEs. By this, the output of this article can help SMEs to understand better the reasons behind the slow adoption of this competitive tool which will result in motivating SMEs to enable and leverage e-commerce potential and usage.
These days, e-commerce has acquired a fundamental concern from SMEs (Small and Medium Enterprises... more These days, e-commerce has acquired a fundamental concern from SMEs (Small and Medium Enterprises) as it awards competitive advantages and strategic benefits to the business. Even although the many benefits which e-commerce provides, the adoption average is as yet comparatively slow and limited. This essay assists to classify and discuss the impacts affecting the Small and Medium Enterprises willingness to adopt and practice this technique. A broad spectrum of articles and papers were interrogated in this article to classify the reasons which impact the practice of Electronic commerce in SMEs. By this, the output of this article can help SMEs to understand better the reasons behind the slow adoption of this competitive tool which will result in motivating SMEs to enable and leverage e-commerce potential and usage.
The purpose of the study is to analyzing those factors that are impacting upon the adoption of E-... more The purpose of the study is to analyzing those factors that are impacting upon the adoption of E-HRM (Electronic Human Resource Management). The respondents of the study were 288 employees from the universities. Researcher has adopted the questionnaire through the literature and taken the responses adequately from the employees of University. This research model has been designed in the context of acceptance and determines the change in behavior towards adopting the EHRM in Universities along with the impact of increased technical assistance and trust on EHRM in Universities. This model is helpful in determining the impact of different features such as; ease of use, usefulness, trust and technical support on behavior towards the EHRM in Universities. The outside factors of the model are Technical support or assistance and trust. This study extends the Technology Acceptance Model. The study results suggest that two factors are major that are technical support and trust impacting upon the ease of use and usefulness; along with this impact of ease of use and usefulness is upon the attitude and the impact of attitude is upon the adoption of E-HRM in universities. The study also discusses the certain limtations and provides recommendation for the stakeholders. Introduction Universities are become advanced in order to utilize the technology for the purpose of communication and providing the services therefore, it enable them to get the competitive edge over others in the industry(Amuna et al, 2017) [1, 3, 17]. IT has enabled the human resource in the organization different features that helps them to analyze and support the organizational operations and meeting the strategic objectives as well. It is evident that technology has embedded in the organization therefore, electronic human source management is become effective for the organization and they are developing their strategies, policies, procedures accordingly (Al Shobaki et al, 2017) [1, 3, 17]. It is obvious that organization are using the electronic human resource management system but it is also a fact that there is small amount of research is being conducted by the researchers about the Electronic HRM implementation and its results for employees and for the organizational operations as well (Stone and Dulebohn, 2013) [21, 22]. EHRM is not being taken as the research topic but there is high potential and scope for the researchers and organizations as well in order to consider it appropriately (Ruel et al, 2007; Bondarouk et al, 2017) [18, 6]. Therefore; it is necessary for the researcher to conduct researches on this area of subject to contribute for the improvement and growth of EHRM. It is also suggested that EHRM area of research is new and having its initial phase (Ruel et al, 2007) [18]. The research suggest that E-HRM is not being analyzed and utilized adequately by the academia therefore, it is not result oriented yet in the research and in practice as well (Strohmeier, 2007) [23, 24]. Further addition is being made regarding the use of EHRM approach but it is not filthy to accept easily because of incomplete results and information (Stone and Dulebohn, 2013) [21, 22]. Therefore, researcher of this paper is having an attempt to provide advance information regarding the electronic human resource management. As far as the human resource employees are concern the Electronic Human Resource system and processes are new and essential area for the research.
This study aimed to investigate factors influencing the acceptance of mobile banking in Libya. To... more This study aimed to investigate factors influencing the acceptance of mobile banking in Libya. To assist in identifying these factors, a detailed research was carried out to identify the current problems faced by the Libyan banks customers, the acceptance of mobile banking in different countries around the world, the importance of adopting this technology to both parties: banks and customers in Libya. The sample elements consisted of 319 existing customers within the banking in Tripoli. They were selected at random depending on their willingness to participate in the research study. A survey was developed to obtain responses from various segments of the society. The findings showed that factors facilitating conditions, perceived self-Efficacy, Perceived ease of use, and perceived usefulness, and have significant imapcts on consumer’s behavioral intentions for the acceptance and usage of mobile banking technology in Libya.
This study aimed to investigate factors influencing the acceptance of mobile banking in Libya. To... more This study aimed to investigate factors influencing the acceptance of mobile banking in Libya. To assist in identifying these factors, a detailed research was carried out to identify the current problems faced by the Libyan banks customers, the acceptance of mobile banking in different countries around the world, the importance of adopting this technology to both parties: banks and customers in Libya. The sample elements consisted of 319 existing customers within the banking in Tripoli. They were selected at random depending on their willingness to participate in the research study. A survey was developed to obtain responses from various segments of the society. The findings showed that factors facilitating conditions, perceived self-Efficacy, perceived ease of use, and perceived usefulness have significant imapcts on consumer’s behavioral intentions for the acceptance and usage of mobile banking technology in Libya.
Uploads
Papers by Ashour A . N . Mostafa
surveyed via the researchers. Those techniques and applications are utilized in distinct areas in daily life like industrialization, education, engineering, commerce and business. Searching last years researches about the review of the most techniques and trends of data mining in multiple areas was the method which is followed in this paper. It has discovered in the learning field as diffusing data mining for educating activities, improvement quality of tasks into manufacturing field, text mining as a technique into research databases and so on. This study collectes a summary of information about the basci concept of Data Mining and its technques which other researchers may need to start their studies in Data Mining field.
Organizations must ensure its information and data be secured and confidential. Therefore, they deploy systems or applications have functions, services, and tools for data maintenance and management packed into the so-called Relational Database Management System (RDBMS).
Database protection means disallowing illegitimate users to access the database and its sensitive information whether intentional or accidental [4]. Therefore, most of the Such functions contain services plus privileges for authorization to keep firms are taking account of possibility of threats as measures to their database systems. This paper addresses the relational database threats and security techniques considerations in relation to situations: threats, countermeasures (computer-based controls) and database security methods [1,8, 9].
assist in identifying these factors, a detailed research was carried out to identify the current
problems faced by the Libyan banks customers, the acceptance of mobile banking in different
countries around the world, the importance of adopting this technology to both parties: banks
and customers in Libya. The sample elements consisted of 319 existing customers within the
banking in Tripoli. They were selected at random depending on their willingness to participate in
the research study. A survey was developed to obtain responses from various segments of the
society. The findings showed that factors facilitating conditions, perceived self-Efficacy,
Perceived ease of use, and perceived usefulness, and have significant imapcts on consumer’s
behavioral intentions for the acceptance and usage of mobile banking technology in Libya.
surveyed via the researchers. Those techniques and applications are utilized in distinct areas in daily life like industrialization, education, engineering, commerce and business. Searching last years researches about the review of the most techniques and trends of data mining in multiple areas was the method which is followed in this paper. It has discovered in the learning field as diffusing data mining for educating activities, improvement quality of tasks into manufacturing field, text mining as a technique into research databases and so on. This study collectes a summary of information about the basci concept of Data Mining and its technques which other researchers may need to start their studies in Data Mining field.
Organizations must ensure its information and data be secured and confidential. Therefore, they deploy systems or applications have functions, services, and tools for data maintenance and management packed into the so-called Relational Database Management System (RDBMS).
Database protection means disallowing illegitimate users to access the database and its sensitive information whether intentional or accidental [4]. Therefore, most of the Such functions contain services plus privileges for authorization to keep firms are taking account of possibility of threats as measures to their database systems. This paper addresses the relational database threats and security techniques considerations in relation to situations: threats, countermeasures (computer-based controls) and database security methods [1,8, 9].
assist in identifying these factors, a detailed research was carried out to identify the current
problems faced by the Libyan banks customers, the acceptance of mobile banking in different
countries around the world, the importance of adopting this technology to both parties: banks
and customers in Libya. The sample elements consisted of 319 existing customers within the
banking in Tripoli. They were selected at random depending on their willingness to participate in
the research study. A survey was developed to obtain responses from various segments of the
society. The findings showed that factors facilitating conditions, perceived self-Efficacy,
Perceived ease of use, and perceived usefulness, and have significant imapcts on consumer’s
behavioral intentions for the acceptance and usage of mobile banking technology in Libya.