This research examines the mobile-government services adoption, by combining both UTAUT and GAM models with adding new constructs for explaining the key factors that affect on adoption of mobile-government services. As a result, the study identified…
Even though many security schemes proposed for wireless sensor networks protect transmitted data content from being revealed to different types of attacks and fulfill most of the desired security requirements, they are not addressing concealing the…
This paper presents a new algorithm in an important research field which is the semantic word similarity estimation. A new feature-based algorithm is proposed for measuring the word semantic similarity for the Arabic language. It is a highly…
Energy wastage through irresponsible smartphone use comprises a significant sum. Using a secondary desk-based literature review, this paper evaluates con-temporary literature to calculate an approximate estimate of the amount of energy wasted through…
This paper investigates the problems facing masters’ students with their thesis writing phases and completion. This research seeks to provide a smart solution that is beneficial, both to the advisor and student(s). Survey and interviews were…
Social networks (SNs) have become a significant part of daily life. It has become one of the most effective ways in which people communicate with each other. Huge amounts of data are generated and shared through SNS worldwide, where users share their…
Abstract— Social media are widely used as communication platforms in the world of business. Twitter, in particular, offers valuable opportunities for collaboration due to its open nature. For that, many entrepreneurs employ Twitter for different…
With increasing technology developments, the Internet has become everywhere and accessible by everyone. There are a considerable number of web-pages with different benefits. Despite this enormous number, not all of these sites are legitimate. There…
This paper presents study investigating the extent to which Saudi students understand and are familiar with mobile learning. It investigates students’ use of handheld devices and considers the daily activities for which they could be used while also…
Credit card is getting increasingly more famous in budgetary exchanges, simultaneously frauds are likewise expanding. Customary techniques use rule-based master frameworks to identify fraud practices, ignoring assorted circumstances, the outrageous…