International Journal of Computer Science & Network Security
International Journal of Computer Science & Network Security (IJCSNS)
- Monthly
- /
- 1738-7906(pISSN)
Volume 22 Issue 8
-
In this paper, we will present the realization of a facial recognition system using the ESP32-CAM board controlled by an Arduino board. The goal is to monitor a remote location in real time via a camera that is integrated into the ESP32 IOT board. The acquired images will be recorded on a memory card and at the same time transmitted to a pc (a web server). The development of this remote monitoring system is to create an alternative between security, reception, and transmission of information to act accordingly. The simulation results of our proposed application of the facial recognition domain are very efficient and satisfying in real time.
-
Almaleki, Deyab A.;Alzahrani, Abdulrahman J.;Alkhairi, Mohammed A.;Albalawi, Farhan A.;Albogami, Hosin A.;Alhajory, Easa S.;Readi, Wadea A.;Idrees, Mohammed A.;Alshamrani, Saleh M.;Alwusaidi, Osama A. 7
This study aimed to test the factor structure of the measure of student participation in distance education. The study population consisted of all teachers in public education and faculty members in higher education in the Kingdom of Saudi Arabia by applying it to a sample of bachelor's and graduate students at the college of Education at umm al-Qura University. The (ESE) was applied to a random sample representing the study population consisting of (216) respondents. The results of the study showed that the scale consists of three main factors, with showed a high degree of construct validity through fit indices of the confirmatory factor analysis. The results have shown a gradual consistency of the measure's invariance that reaches the high level of the Measurement Invariance across the gender and study groups variables. -
Kravchenko, Oksana;Koliada, Natalia;Berezivska, Larysa;Dikhtyarenko, Svitlana;Baida, Svitlana;Danylevych, Larysa 15
The article clarifies the conditions for information, digital and educational accessibility for higher education seekers with disabilities in terms of distance learning caused by quarantine restrictions. It is established that such conditions are regulated by international and Ukrainian legal documents (The Standard Rules on the Equalization of Opportunities for Persons with Disabilities, Convention on the Rights of Persons with Disabilities, Sustainable Development Goals, Law of Ukraine "On Education", Law of Ukraine "On Higher Education", Strategy for the Development of Higher Education in Ukraine 2021-2031, Development Strategy areas of innovation for the period up to 2030, Development strategy of the sphere of innovation activity for the period up to 2030). As a part of information barrierlessness, Higher Education Institutions (HEI) should provide access to information in various formats and using technologies, in particular Braille script, large-type printing, audio description (audio descriptive commenting), sign language interpretation, subtitling, a format suitable for reading by screen access programs, formats of simple speech, easy-to-read formats, means of alternative communication. The experience of Pavlo Tychyna Uman State Pedagogical University is described. In particular, special attention is paid to the study of sign language: in view of this, the initiative group implemented the project "Learning to hear and overcome social isolation together" with the financial support of the British Council in Ukraine. Within the framework of digital accessibility, the official website of the Faculty of Social and Psychological Education has been adapted for the visually impaired in accordance with WCAG 2.0 World Standards. In 2021, Pavlo Tychyna Uman State Pedagogical University implemented the project "Cultural, Recreational and Tourist Cherkasy Region: Inclusive Social 3D Map" funded by the Ukrainian Cultural Foundation; a site with available content for online travel in the region to provide barrier-free access to the historical and cultural heritage of Cherkasy region was created. Educational accessibility is achieved by increasing the number of people with special educational needs, receiving education in inclusive groups; activities of the Center for Social and Educational Integration and Inclusive Rehabilitation Social Tourism "Bez barieriv" ("Without barriers"); implementation of a research topic for financing the Ministry of Education and Science of Ukraine: "Social and psychological rehabilitation of children and youth with special educational needs by means of inclusive tourism"; implementation of the project "Social inclusion of distance educational process"; development of information campaigns to popularize the ideas of accessibility, the need for its implementation, ongoing training programs and competitions, etc. -
Tverezovska, Nina;Bilyk, Ruslana;Rozman, Iryna;Semerenko, Zhanna;Orlova, Nataliya;Vytrykhovska, Oksana;Oros, Ildiko 25
Today, further education of adults in the UK is one of the developing areas of continuing education. The Open University with distance learning, in the process of which innovative forms and methods based on computer and telecommunication technologies are used, is particularly successful in the organization of additional education of the adult population. The advantages of distance learning, multimedia - the latest information technologies, which provide the combination of graphic images, video, sound with the help of modern computer tools, are noted. The basic principles and forms underlying the technologies and forms of work with the elderly are defined. The international experience of implementing "Universities of the Third Age" is summarized. The most widespread approach in adult education in Great Britain is informational. The use of computer technologies motivates a new paradigm in educational methods and strategies, which requires new approaches, forms of learning, and innovative ways of delivering educational materials to adult learners. Information technologies have gained great popularity in such activities as distance learning, online learning, assistance in the education management system, development of programs and virtual textbooks in various subjects, online search for information for the educational process, computer testing of students' knowledge, creation of electronic libraries, formation of a single scientific electronic environment, publication of virtual magazines and newspapers on pedagogical topics, teleconferences, expansion of international cooperation in the field of Internet education. The information technology of synchronous distance learning "online" has gained considerable popularity in the educational process today. A promising direction is the use of multimedia technologies in educational activities to create a design of a virtual computer environment by decoding audiovisual information. -
Babunji, Lujen;Alzahrani, Shahad;Almarghalani, Shada;Babour, Amal;Bitar, Hind 35
The Internet is extremely important to accomplish numerous items, from education to businesses and entertainment. Therefore, the quality of its performance must be efficient. Nowadays, there is a lack of information available for users to choose a suitable Internet service. What information is available might be insufficient, inaccurate, or regularly updated. Accordingly, there is a need to develop an electronic system that enables users to evaluate their current Internet service subscription. Several factors are used as evaluation criteria in the system that affect users' decisions. In this paper, a prototype of a design science research project is proposed to address a few objectives. First, it can help Internet service users in Saudi Arabia to make the best decision for themselves regarding Internet services subscriptions. Second, it can assist the Saudi government to seek one of the 2030 vision goals: the digital transformation that depends on having a good Internet connection. The proposed solution is a promising one that would help Internet service users to make the best decision for themselves and choose the best Internet service that fits their needs. A qualitative method has been used to evaluate the efficiency and the utility of the proposed system prototype. The results showed the extent of participants' acceptance of the Internet Service Evaluation System. -
In this study, a multi-objective robust job-shop scheduling (JSS) model was developed. The model considered multi-jobs and multi-machines. The model also considered uncertain processing times for all tasks. Each job was assigned a specific due date and a tardiness penalty to be paid if the job was not delivered on time. If any job was completed early, holding expenses would be assigned. In addition, the model added idling penalties to accommodate the idling of machines while waiting for jobs. The problem assigned was to determine the optimal start times for each task that would minimize the expected penalties. A numerical problem was solved to minimize both the makespan and the total penalties, and a comparison was made between the results. Analysis of the results produced a prescription for optimizing penalties that is important to be accounted for in conjunction with uncertainties in the job-shop scheduling problem (JSSP).
-
Specific Language Impairment is one of the serious disorders that interferes with spontaneous communication skills in children. Children suffering from this disorder may have reading, speaking, or listening impairments, and such type of disorders are also termed Autism Speech Disorder (ASD) in medical terminology. The aim of the article is to define specific language impairment in children and the problems it can cause. The different methods adopted by speech pathologists to diagnose language impairment. Finally implementing machine learning models to automate the process and help speech pathologists and pediatricians/ in diagnosing the specific language impairment.
-
Sadova, Iryna;Klochek, Lilia;Grodz, Natalia;Baranovska, Valentyna;Voroshchuk, Oksana;Lemko, Halyna 61
Digital education has emerged all over the world with a new wave of learning innovations and opportunities. Higher education institutions need to develop the digital competence of future specialists and train teachers who are creative individuals, have the skills to use digital technologies, and are able to solve problems, make important decisions, effectively manage their own lives, and realize their potential. In this aspect, the strategy for evaluating the results of the educational achievements of future specialists is important. The purpose of the article is to analyze the use of distance technologies in higher education institutions in the context of the development of a system for assessing the quality of education. Methodology implies the application of theoretical methods of analysis. -
This study is a theoretical account of HRs requirements in educational institutions in light of the growing influence of digital technology on human rights. It intends to reveal prominent human and civilizational values encapsulated in modern human rights regulations. It dwells on educational and societal requirements for educational inclusion in the school and university curricula in light of changes that have taken place in HRs in the digital age. Relying on the descriptive documentary research design, the study concluded that HRs are inherently moral duties and fixed values. They include the importance of tolerance, freedom, peace, justice, science, work, and equality. Because education is arguably based on human and civilized values, educational foundations require intake of awareness, systematic integration and responsibility from all academic and community institutions, including family and media institutions. The article closes on a note of how technology has impacted human rights in the digital age. It provides implications and recommendations to pedagogies accordingly.
-
Gavrysh, Iryna;Khltobina, Oleksandra;Chernenko, Oleksandr;Roienko, Svitlana;Balanutsa, Oleksandr;Ivashchenko, Bohdan;Romankova, Kateryna 75
In modern society, the organization of the educational process plays an important role in education. Traditionally, it is through communication and dialogue between the teacher and the student that professional competence is acquired. As society develops, the demand in the global labor market changes and the requirements and criteria for specialists increase. Therefore, a new approach to managing the pedagogical interaction between a teacher and a student in the process of education in a higher educational institution allows a positive impact on the system of training specialists and opens up new prospects for the formation of competitive specialists. The issue of the quality of education is a key one and is covered in the documents regulating the process of educational activities. Also an important problem today is the transition to qualitatively new and innovative systems of training specialists and the departure from outdated models of managing pedagogical interaction in higher education institutions. The process of managing the pedagogical interaction between a teacher and a student is one of the most important for studying in the context of higher education. Thus, the main task of the study is to analyze the role of communication and dialogue during studies in higher education. As a result of the study, current trends and prerequisites for communication and dialogue tools during studies in higher education -
Hennadii, Ferdman;Kryshtanovych, Myroslav;Kurnosenko, Larysa;Lisovskyi, Ihor;Koval, Oleg 81
Digital technologies in the regional sector of public administration are the basis for its reform and a potential example for the whole country on how to use the benefits of the "digital" world. The synergistic potential of social, mobile, "cloud" technologies, as well as data analysis technologies and the "Internet of Things" can collectively lead to transformational changes in public administration and in general, that is, make the use of digital technologies for the economic development of the region in the system of digitalization of public administration effective, reactive and valuable. Thus, the purpose of the study is to identify modern prospects and realities of the development of digital technologies for the economic development of the region in the system of digitalization of public administration. As a result of the study, the main mechanisms and systems of digital technologies for the economic development of the region in the system of digitalization of public administration were analyzed. -
This paper employs a computer-aided text analysis (CATA) and a Critical Discourse Analysis (CDA) to explore the strategies of recruitment and intellectual polarization in ISIS (Islamic State in Iraq and Syria) media. The paper's main objective is to shed light on the efficacy of employing computer software in the linguistic analysis of texts, and the extent to which CATA software contribute to deciphering hidden meanings of texts as well as to arrive at concise and authentic results from these texts. More specifically, this paper attempts to demonstrate the contribution of CATA software represented in the two variables of Frequency Distribution Analysis (FDA) and Content Analysis (CA) in decoding the strategies of recruitment and intellectual polarization in one of ISIS 's digital publication: Rumiyah (a digital magazine published by ISIS). The analytical focus is on three strategies of recruitment and intellectual polarization: (i) lexicalization, (ii) intertextual religionisation, and (iii) justification. Two main findings are revealed in this study. First, the application of CATA software into the linguistic investigation of texts contributes effectively to the understanding of the thematic and ideological messages pertaining to the analyzed text. Second, the computational analysis guarantees concise, credible, authentic and ample results than is the case if the analysis is conducted without the work of computer software. The paper, therefore, recommends the integration of CATA software into the linguistic analysis of the various types of texts.
-
Stratan-Artyshkova, Tetiana;Kozak, Khrystyna;Syrotina, Olena;Lisnevska, Nataliya;Sichkar, Svitlana;Pertsov, Oleksandr;Kuchai, Oleksandr 97
European integration processes have acted as a catalyst for the emergence of a new type of educational environment, which is characterized by competent flexibility of specialists. Therefore, the article focuses on professional training of teachers in the context of European integration processes using information technology and the search for innovative methods of training specialists. One of the educational priorities in Europe is to create a new model of a teacher who has an academic education, knows innovative methods, is able to perform functions and tasks efficiently and professionally, adequately, quickly and correctly respond to changes and innovations. The tasks facing education in the European dimension are formulated. The main trends in the education of teachers in modern Europe are described: the need to deepen and expand subject training programs in pedagogical institutions of Higher Education, which will allow autonomy of activity, awareness of responsibility for independent creative decisions, create favorable conditions for the development of professionalism through the use of Information Technology and the search for innovative methods of training specialists. At the present stage, various models of teacher training are being developed based on the University and practical concept using information technology and searching for innovative methods of training specialists. On this basis, two different theories of perception of teacher education were formed: as preparation of teachers for work throughout their professional career; as preparation for the first years of professional work, which is periodically repeated in the process of continuous professional training and improvement. Among the advantages that the use of Information Technology and the search for innovative methods of training specialists to implement the learning process, it is worth mentioning the following: simultaneous use of several channels of perception of the student or student in the learning process, thanks to which the integration of information processed by different sensory organs is achieved; the ability to simulate complex real experiments; visualization of abstract information by dynamic representation of processes, etc. -
Minenok, Antonina;Donets, Ihor;Telychko, Tetiana;Hud, Hanna;Smoliak, Pavlo;Kurchatova, Angelika;Kuchai, Tetiana 105
Innovation is considered as an implemented innovation in education - in the content, methods, techniques and forms of educational activity and personality education (methods, technologies), in the content and forms of organizing the management of the educational system, as well as in the organizational structure of educational institutions, in the means of training and education and in approaches to social services in education, distance and multimedia learning, which significantly increases the quality, efficiency and effectiveness of the educational process. The classification of currently known pedagogical technologies that are most often used in practice is shown. The basis of the innovative activity of a modern teacher is the formation of an innovative program-methodical complex in the discipline. Along with programmatic and content provision of disciplines, the use of informational tools and their didactic properties comes first. It combines technical capabilities - computer and video technology with live communication between the lecturer and the audience. In pedagogical innovation, the principles reflecting specific laws and regularities of the implementation of innovative processes are singled out. All principles are elements of a complex system of organization and management of innovative activities in the field of education and training. They closely interact with each other, which enhances the effect of each of them due to the synergistic effect. To improve innovative activities in the training of students, today computer technologies are widely used in pedagogy as a science, as well as directly in the practice of the pedagogical process. They have gained the most popularity in such activities as distance learning, online learning, assistance in the education management system, development of programs and virtual textbooks in various subjects, searching for information on the network for the educational process, computer testing of students' knowledge, creation of electronic libraries, formation of a unified scientific electronic environment, publication of virtual magazines and newspapers on pedagogical topics, teleconferences, expansion of international cooperation in the field of Internet education. The article considers computer technologies as the main building material for the entire society. In the modern world, there is a need to prepare a person for life in a multimedia environment. This process should be started as early as possible, because the child's contact with the media is present almost from the moment of his birth. -
Chhabra, Arpit;Singhal, Niraj;Bansal, Manav;Rizvi, Syed Vilayat 113
At the point when it is check out ourselves, it might track down various information in each turn or part of our lives. Truth be told, information is the new main thrust of our advanced civilization and in this every day, "information-driven" world, security is the significant angle to consider to guarantee dependability and accessibility of our organization frameworks. This paper includes a new cryptographic algorithm for safe route traversal for data of smart cities which is a contemporary, non-hash, non-straight, 3D encryption execution intended for having information securely scrambled in the interim having a subsequent theoretical layer of safety over it. Encryption generally takes an information string and creates encryption keys, which is the way to unscramble as well. In the interim in another strategy, on the off chance that one can sort out the encryption key, there are opportunities to unravel the information scrambled inside the information string. Be that as it may, in this encryption framework, the work over an encryption key (which is created naturally, henceforth no pre-assurance or uncertainty) just as the calculation produces a "state" in a way where characters are directed into the Rubik block design to disregard the information organization. -
Borysenko, Olha;Kitsak, Taras;Pasichnyi, Roman;Akimova, Liudmyla;Karpa, Marta;Akimov, Oleksandr 123
The main purpose of the study is to determine the features of the implementation of public authority in the context of modern international security challenges. The fact that public authority is a necessary regulator of the life of society ensures its development, unity, and manageability, which is an important factor in the organization and orderliness of society adds to the actualization of the research topic. The research methodology includes a set of theoretical methods of analysis. Based on the results of the study, key aspects of the implementation of public authority in the context of modern international security challenges were identified. The study has limitations, and they relate to the practical aspect of the implementation of public authority in the context of modern international security challenges. -
An Application of The Islamic Methodology in The Enactment of Commercial Laws and Policy FormulationPublic policies are subject to the general strategies and agendas of the state and the enactment of law is subject to the superior laws. This paper will clarify in a practical way how the strategies and agenda of an Islamic state and the superior law (the primary sources of Sharia law) affect the mechanism of enacting laws and creating policies in an Islamic government. Especially, in the field of commercial law.
-
Chornomordenko, Ivan;Dobrodum, Olga;Khrypko, Svitlana;Gold, Olga;Osadcha, Olena;Chornomordenko, Dmytro 135
The improvement of high-tech is closely linked with the improvement of the man himself, technogenesis affects anthropogenesis, and human development signifies transhumanism. Informatization and virtualization, digitalization and computerization cover more and more areas of human activity one can record and state the actualization and accentuation of what is happening online and it kind of sacralization, alibization and deification. The anthropological potential of IT also increases and expands accordingly. With the help of technology, scientists hope to establish communication with animals, study their language and intelligence, use elements of AI, to promote the protection of the rights of robots and cybernetic organisms. -
The current study investigates the effects of an interactive learning environment on EFL students' vocabulary acquisition and reading comprehension skills. The study utilized a quasi-experimental design. The sample consisted of 41 students enrolled in the English program at Umm Al-Qura University studying Reading in EFL course in Summer 2018/2019. The sample was randomly divided into two groups: A control group consisting of 21 students and an experimental group of 20 students. The results revealed statistically significant differences at (α≤ 0.01) between the mean scores of the experimental group and the control group in the posttest of the vocabulary test and the reading comprehension test favoring the experimental group. Finally, the study concluded with a call for more studies on modern technologies in teaching EFL skills in the Saudi context.
-
Iryna, Rodionova;Serhii, Petrenko;Nataliia, Hoha;Kushevska, Natalia;Tetiana, Siroshtan 153
Relevance. Innovative activities in education should be aimed at ensuring the comprehensive development of the individual and professional development of students. The main idea of modular technology is that the student should learn by himself, and the teacher manages his learning activities. The advantage of modular technology is the ability of the teacher to design the study of the material in the most interesting and accessible forms for this part of the study group and at the same time achieve the best learning results. Innovative Moodle technology. it is gaining popularity every day, significantly expanding the space of teaching and learning, allowing students to study inter-faculty university programs in depth. The purpose of this study is to assess the quality of implementation of the e-learning system Moodle. The study was conducted at the South Ukrainian National Pedagogical University named after K. D. Ushinsky in order to identify barriers to the effective implementation of innovative distance learning technologies Moodle and introduce a new model that will have a positive impact on the development of e-learning. Methodology. The paper used a combination of theoretical and empirical research methods. These include: scientific analysis of sources on this issue, which allowed us to formulate the initial provisions of the study; analysis of the results of students 'educational activities; pedagogical experiment; questionnaires; monitoring of students' activities in practical classes. Results. This article evaluates the implementation of the principles of distance learning in the process of teaching and learning at the University in terms of quality. The experiment involved 1,250 students studying at the South Ukrainian National Pedagogical University named after K. D. Ushinsky. The survey helped to identify the main barriers to the effective implementation of modern distance learning technologies in the educational process of the University: the lack of readiness of teachers and parents, the lack of necessary skills in applying computer systems of online learning, the inability to interact with the teaching staff and teachers, the lack of a sufficient number of academic consultants online. In addition, internal problems are investigated: limited resources, unevenly distributed marketing advantages, inappropriate administrative structure, and lack of innovative physical capabilities. The article allows us to solve these problems by gradually implementing a distance learning model that is suitable for any university, regardless of its specialization. The Moodle-based e-learning system proposed in this paper was designed to eliminate the identified barriers. Models for implementing distance learning in the learning process were built according to the CAPDM methodology, which helps universities and other educational service providers develop and manage world-class online distance learning programs. Prospects for further research focus on evaluating students' knowledge and abilities over the next six months after the introduction of the proposed Moodle-based program. -
Zahorskyi, Volodymyr;Bobrovskyi, Oleksii;Bondarenko, Dmytro;Karpa, Marta;Akimov, Oleksandr;Akimova, Liudmyla 163
The main purpose of the study is to analyze the features of ensuring information security in the system of public administration of the constant development of the region. The actualization of the research topic is because the information has become a powerful means of manipulating the public and individual consciousness, as well as a real weapon used in new types of conflicts, confrontations, and confrontations. Creating opportunities for everyone to access information sources, developing the ability to use it, and at the same time protecting people from dirty information flows create a kind of subject-research field, one of the most relevant aspects of which is the problem of forming and implementing information security policy at the state, public and civil levels. The research methodology involved the use of theoretical and scientific methods. As a result of the study, the key features of ensuring information security in the system of public management of the continuous development of the region of the EU countries were identified. -
Public policies are subject to the general strategies and agendas of the state and the enactment of law is subject to the superior laws. This paper will clarify in a practical way how the strategies and agenda of an Islamic state and the superior law (the primary sources of Sharia law) affect the mechanism of enacting laws and creating policies in an Islamic government. Especially, in the field of criminal law.
-
Alotaibi, Shaykhah Hajed;Khan, Muhammad Badruddin 175
This research article develops an Arabic books' recommendation system, which is based on the content similarity that assists users to search for the right book and predict the appropriate and suitable books pertaining to their literary style. In fact, the system directs its users toward books, which can meet their needs from a large dataset of Information. Further, this system makes its predictions based on a set of data that is gathered from different books and converts it to vectors by using the TF-IDF system. After that, the recommendation algorithms such as the cosine similarity, the sequence matcher similarity, and the semantic similarity aggregate data to produce an efficient and effective recommendation. This approach is advantageous in recommending previously unrated books to users with unique interests. It is found to be proven from the obtained results that the results of the cosine similarity of the full content of books, the results of the sequence matcher similarity of Arabic titles of the books, and the results of the semantic similarity of English titles of the books are the best obtained results, and extremely close to the average of the result related to the human assigned/annotated similarity. Flask web application is developed with a simple interface to show the recommended Arabic books by using cosine similarity, sequence matcher similarity, and semantic similarity algorithms with all experiments that are conducted. -
The law gives the Ministry of Commerce the power of monitoring, oversight, and accountability for corporations in general. However, Article 219 of the Companies Law has made oversight of listed companies within the jurisdiction of the Capital Market Authority, but this exception, in the author's opinion, is not clear because the law obligated the Ministry of Commerce to monitor and account for joint-stock companies, whether they were listed or not included in some cases.
-
Stoliarchuk, Olesia;Kokhanova, Olena;Prorok, Nataliia;Khrypko, Svitlana;Shevtsova, Olena;Tkachyshyna, Oksana;Lobanchuk, Olena 197
Given the prevalence of violence in Ukrainian families, measures to prevent parental abusive treatment against children are urgent. It is important to study today's youth awareness about violence within families in order to enhance a culture of engagement with spouses and children in future. The aim of the study is to examine students' reflective experiences and their attitudes towards forms, frequency, causes and effects of parental abusive treatment. During the research the following methods were used step-by-step: theoretical analyses of scientific resources, anonymous questionnaire, quantitative and correlation analyses. According to result of survey 98 students who were interviewed, none of them fell victim of sexual abuse in their families. However, more than a half (51%) of the students surveyed experienced some forms of parental physical punishment. All the interviewed students encountered psychological cases of parental violence. The mostprevalent forms of parental abuse among the interviewees are criticism, negative comparison, emotional detachment, arrogance, intimidation, blackmail and humiliation. The most prevalent consequences of parental abuse among students are anxiety, low self-esteem, insecurity, impatience, suspiciousness, constraint in communication. Students agree that budget limitations, forced labor, criticism, spanking, emotional detachment, ignoring type of communication, reproach, blackmail are acceptable methods of punishment to use when raising their own children. These results clearly demonstrate the problem of the impact of parental abuse on children and its consequences in the future. A virtual dimension of the actualized problem is considered, namely: - virtualization of aggression and cruelty in the postmodern world. - the level of determining the factor of cruelty from the space of virtual culture. - the mirror image of everyday cruelty in the virtual environment; - the phenomenon of video games as a source and context of representation of the factor of cruelty in behavioral realities; - cybercrime as a virtualized result of cruelty in family and everyday realities. - futurological perspectives of virtualization of cruelty in communicative culture in general and in family relations in particular. The postmodern world is fundamentally different from the traditions and culture of the past, primarily due to the development of computer technologies and the virtualization of life in general. So, for example, virtual communities have become, in a certain way, another world, a second reality of life in general. And certain behavioral factors, in particular cruelty in the private environment, became a projection of such a phenomenon as cybercrime. Video games are a unique modern phenomenon, which multipolarly absorb all facets of human potential, communicative tendencies, behavioral and characterological factors, from the warmth of interpersonal relationships to the extreme degree of cruelty. -
In Saudi Arabia, female students tend to struggle with the basics of computer programming, especially coding. To better understand why female students sometimes perform poorly in this discipline, this qualitative study aims to obtain the views of female computer programming teachers at a Saudi university on using mobile learning (m-learning) methods in computer programming lectures. Ten teachers from the all-female Aljouf University were interviewed to assess their perceptions of m-learning, in particular, the usefulness of ViLLE visualisation software. Data were analysed using thematic analysis. Most interview responses about m-learning and ViLLE were positive, although there were some notable negative responses. The Saudi culture-related responses were evenly divided between positive and negative, reflecting the culture's limitations.
-
Rebryna, Anatolii;Kukin, Igor;Soltyk, Oleksandr;Tashmatov, Viacheslav;Bilanych, Halyna;Kramarenko, Iryna 217
The article analyzes the main theoretical approaches to the formation of managerial competencies and establishes the degree of development of the problem. The content of the concept of "managerial competence" has been clarified, to determine the structure of managerial competencies of a future specialist in the education system and indicators of the formation of managerial competencies. The organizational and pedagogical conditions necessary for the effective process of forming the managerial competencies of future specialists are revealed. The following research methods were used in the work: theoretical (analysis of regulatory documents and scientific literature on the problem under study, comparison, generalization, modeling), empirical (diagnostics of the level of formation of managerial competencies of students of the system, questioning, observation, peer review, comparative qualitative and quantitative analysis of diagnostic results the level of formation of managerial competencies). -
Background: Within the framework of the new Saudi Vision 2030, the education system is keen on developing Early Childhood (EC) curricula to meet the needs of children from diverse cultural and linguistic backgrounds, in addition to preparing teachers to be the main driving forces in this field. To achieve these strategic goals, the professional development of teachers has taken the lead in terms of their continuous professional achievements. Purpose: The recent study tended to explore the promotion of Cultural and Linguistic Competence (CLC) of teachers in preschool institutions in different sectors in the Kingdom of Saudi Arabia (KSA) include public, private and international. Method: In the current study, (n=300) of preschool female teachers, who had experience teaching children from diverse language and cultural backgrounds, participated voluntarily by filling out the exploratory questionnaire. It was designed on a five-point Likert scale. The credibility of the scale and the validity of the questionnaire were ascertained, and the content for which it was designed verified in terms of the purposes of the current investigation. Results: The results revealed that preschool female teachers in the private preschool settings have a higher level of CLC compared to those who were teaching in public and international preschools in KSA. In the private sector, preschool female teachers showed create abilities to provide culturally responsive environments for diverse students, applying various communication styles, and showing proper attitudes and values toward diversity. Implication: The current study provided key implications for policy makers regarding the promotion of CLC for all teachers, particularly preschool in government settings in KSA. It contributed to revealing the cultural awareness of preschool teachers' values and attitudes toward diversity.
-
Rudenko, Olha;Koltun, Victoriia;Shcherbak, Nataliya;Kononenko, Inna;Konoplia, Yaroslav 235
The main purpose of the article is to analyze the features of the impact of digital technologies on environmental management in the public administration system of the regions. The revival of the economy and its digitalization, which emerged after the first wave of the economic crisis, is already fraught with an aggravation of the ecological situation in the region. Of course, the conventional model of economic growth has by now exhausted its capabilities and can be characterized as environmentally unsustainable. Digital technologies bring changes that cannot be ignored. Based on the results of the study, key aspects of the impact of digital technologies on environmental management in the public administration system of the regions were identified. -
The article presents the analysis of modern methods of automatic comparison of original and unoriginal text to detect textual plagiarism. The study covers two types of plagiarism - literal, when plagiarists directly make exact copying of the text without changing anything, and intelligent, using more sophisticated techniques, which are harder to detect due to the text manipulation, like words and signs replacement. Standard techniques related to extrinsic detection are string-based, vector space and semantic-based. The first, most common and most successful target models for detecting literal plagiarism - N-gram and Vector Space are analyzed, and their advantages and disadvantages are evaluated. The most effective target models that allow detecting intelligent plagiarism, particularly identifying paraphrases by measuring the semantic similarity of short components of the text, are investigated. Models using neural network architecture and based on natural language sentence matching approaches such as Densely Interactive Inference Network (DIIN), Bilateral Multi-Perspective Matching (BiMPM) and Bidirectional Encoder Representations from Transformers (BERT) and its family of models are considered. The progress in improving plagiarism detection systems, techniques and related models is summarized. Relevant and urgent problems that remain unresolved in detecting intelligent plagiarism - effective recognition of unoriginal ideas and qualitatively paraphrased text - are outlined.
-
Project management and deployment has gone through a long journey from traditional and agile to continuous integration, continuous deployment and continuous monitoring. Software industry benefited with the latest buzzword in the development process, DevOps that not only escalates software productivity but at the same time enhances software quality. But the implementation and assessment of DevOps practices is expository as there are no guidelines to assess and improvise DevOps application in software industries. Hence, there was a need to develop a hybrid model to assist software practitioners in DevOps implementation. The intention behind this paper is to implement the already proposed DevOps hybrid model using suggested tool chains including Jenkins, Selenium, GitLab, Ansible and Nagios automation tools through Jenkins project management environment and plugins. To achieve this implementation objective, a java application is developed with a web-based graphical interface. Further, in this paper, different challenges and benefits of Jenkins implementation shall also be outlined. The paper also presents the effectiveness of DevOps based Model implementation in software organizations. The impact of considering other automation tools and models can also be considered as a part of further research.
-
Semchuk, Bohdan;Havryliuk, Svitlana;Karnaukh, Lesia;Balakirieva, Viktoriia;Palshkova, Iryna;Leonova, Veronika;Bida, Olena 260
The article considers the training, competitiveness of specialists, professional mobility, professionalism and competence of specialists in the context of distance learning. The advantages of distance learning are shown. The characteristic features of distance learning in the preparation of students and in the implementation of these technologies in the educational process of higher educational institutions are determined. Competitiveness, professional mobility, professionalism and competence of a specialist are qualities that determine a person's life and work success. Professional mobility is interpreted as a systemic quality of a specialist's personality, which includes a whole range of knowledge, skills, abilities, personal qualities, value orientations, and so on. The vision of mobility of specialists by foreign scientists is presented. It is noted that the classification of professional mobility presented in the article makes it possible to organize various movements from a single position, to present them as separate manifestations of the general process of professional and pedagogical mobility, to determine which type of mobility ensures the performance of certain social functions. It was found that mobility can be differentiated into differentiated and intergeneration. According to the subject, individual and group mobility are distinguished; according to the direction - internal and external. The classification of employees according to their attitude to mobility is shown, which can be divided into the following groups: actually mobile; potentially mobile; actually stable; potentially stable. -
Blakyta, H.V.;Zubko, T.L.;Zhuk, O.S.;Kasianova, A.O.;Guliaieva, N.M.;Vavdiichyk, I.M. 269
Economy of Ukraine is characterized by the rapidly increased level of financial failures at a corporate level. Conditions of doing business in Ukraine become tighter year after year and it should motivate the business owners not only to watch more accurately the state in which their business is but also to introduce new, more precise, more tight systems of crisis management and economic security. The experience shows that in order to stay afloat and not to suffer losses companies should pay more attention to different areas of economic security, such as production potential, financial indicators, logistics, staff, etc. For this purpose companies should use a system of valuation of the most important for their activity indicators and transform their values in an integral one in order to use this assessment in making managerial decisions. Such a valuation is one of the components which the article presents. The article also reveals the key points which characterize crisis management as an integral part of enterprise development and economic security. There are specified the essence and problems of crisis management and proposed the ways of raising the level of economic security of a company based on the example of an industrial and commercial enterprise. The key focus of the enterprise's economic security management is defined as constructive responses to threats from the external environment and, as a result, ensuring stable functioning and effective realization of untapped potential in the future. The current assumption is to explain the scheme of strategic management of an industrial and commercial enterprise and to calculate the methodology of an express assessment of the level of enterprise economic security, taking into account the components of crisis management. To assess the level of economic security of the enterprise, it is proposed to use the method of point assessment, which is based on a multi-level system of indicators, which covers the main areas of the enterprise's activity. -
The growth of technology nowadays has made many things easy for humans. These things are from everyday small task to more complex tasks. Such growth also comes with the illegal activities that are perform by using technology. These illegal activities can simple as displaying annoying message to big frauds. The easiest way for the attacker to perform such activities is to convenience user to click on the malicious link. It has been a great concern since a decay to classify URLs as malicious or benign. The blacklist has been used initially for that purpose and is it being used nowadays. It is efficient but has a drawback to update blacklist automatically. So, this method is replace by classification of URLs based on machine learning algorithms. In this paper we have use four machine learning classification algorithms to classify URLs as malicious or benign. These algorithms are support vector machine, random forest, n-nearest neighbor, and decision tree. The dataset that is used in this research has 36694 instances. A comparison of precision accuracy and recall values are shown for dataset with and without preprocessing.
-
Bonkalo, Tatyana I.;Stepanova, Olga N.;Latushkina, Elena N.;Kozlyatnikov, Oleg A.;Kumancova, Elizaveta S. 280
The purpose of the study was to identify the level of development of gaming disorder among e-sportsmen as a potential risk of their activity. Three groups were formed for the study. The first group consisted of 102 e-sportsmen aged between 18 and 32; the second group consisted of boys of the same age who, according to preliminary questionnaires, played computer games fairly frequently - at least once a week (n = 102); the third group consisted of individuals of the same gender and age, but who did not share a passion for computer games (n = 102). The study was performed using semi-structured interview during which the respondents filled out the Computer gaming disorder questionnaire developed and tested by O.M. Vidova under our supervision. Our study showed that among 102 e-sportsmen, 82,3% did not have any computer gaming disorder, only some tendency thereto. While 17,6% of e-sportsmen were characterized by a pronounced gaming disorder. E-sportsmen who prefer strategies, less than all other e-sportsmen, tend to escape from reality and accept the game role, to express their emotions through the game, and in general have the lowest level of dependence on games. Additionally, strategic e-sportsmen are most likely to study the game thoroughly and to develop themselves with it. Many Starcraft e-sportsmen tend to explore the possibilities of the game in detail and, at the same time, protect themselves from escaping into virtual reality. The risk of computer gaming disorder among e-sportsmen is largely determined by their sports achievements, the type of sports activity (individual or team), and genre of the preferred computer game. -
The current paper discusses the two most widespread and contradictory educational philosophies of classic German Idealism and modern American pragmatism. Their perspectives of what is truth and what is the best way to distinguish the reasoning idealists from the experienced pragmatists. The implementations of Idealism and pragmatism have affected the education process for several ages and reflect various social changes. The role of schools, educators, environment, teachers, and learners are not the same in both philosophies. However, on reviewing the chronological transmission from Plato's Idealism to Dewey's pragmatism, the resemblances and differences are elaborated here with examples. Furthermore, how these philosophies helped founding advocators for perennialism, essentialism, progressivism, and reconstructionism.
-
The study aimed to measure the effectiveness of using Cognitive virtual tours based on Marzano model to develop the achievement and some of historical research Skills for secondary school students. To achieve the objectives of the study, the experimental method was used and two study groups consisted of (60) students were divided into two groups, one is Control (30) students and the other is in experimental (30) students at Alsalam secondary in Ismailia Governorate. The study used several tools: The experimental processing tool of Cognitive Virtual tours based on Marzano model, Cognitive achievement test for the first unit of Secondary first grade history Course. Historical research skills. The finding of the study showed the effectiveness of using cognitive virtual tours based on Marzano model in developing the achievement and some of historical research skills for first grade secondary students which there are Statistically differences at level (0.01) between the average scores of the students in (experimental and Control) groups in post application for Cognitive achievement test. Practical application of the study can contribute to clarify how to use Cognitive virtual tours based on Marzano model in teaching history, and Draw the attention of history developers to the development of historical research skills.
-
Ivanov, Dmitriy Aleksandrovich;Moskovtseva, Kristina Andreevna;Bui, Thien Thuong;Sheveleva, Kseniya Vladimirovna;Vetskaya, Svetlana Anatolyevna 299
The article examines the stage of verification of a crime report from the standpoint of the need for its legislative regulation. Moreover, it investigates the international experience in this field. The existing procedural models are described in detail on the example of the neighboring and faraway countries. An analysis of the provisions of the current criminal procedure law of Russia and foreign experience allowed the authors to identify existing problems in the implementation of departmental control and prosecutorial supervision at the stage of verifying a crime report. The aim of the study is to develop theoretical provisions and recommendations regarding the implementation of departmental procedural control and prosecutorial supervision over the activities of the investigator during the verification of reports of crimes, based on the study of experience, both in Russia and in a number of countries of the near and far abroad, which could find their reflection in law enforcement practice, as well as aimed at improving the current criminal procedure legislation. The authors substantiated the theory that a detailed examination of the foreign procedural foundations of checking a crime report will allow us to form the most suitable model for checking a crime report for our state, taking into account all possible features and successfully implement it into the current criminal procedural law of the Russian Federation. -
This study investigated a case of a gifted Saudi student, X, who was early detected through Mawhiba (The Saudi Institution of Gifted) when he was eight years old. Then, the journey continued until he became a Tamayuz member and received a scholarship in 2022 to pursue his bachelor's at one of the prestige, high-ranking universities in the USA to study Mathematics and Economics. Lack of information about the status of Saudi verbal gifted maked X case a model to explore the roles of Mawhiba's programs in supporting Saudi verbal giftedness in general and particularly in learning the English language, plus seeking the opportunities Mawhiba provided for Saudi verbal gifted to enrich their giftedness in the English language through providing extended social networking and finally stating the sample's perspective about the opportunities and services Mawhiba provided him. The three core instruments to accumulate elaboration and interpret qualitative and quantitative data were academic records, writing samples, family observation, and a written interview.
-
The field of this study is in Islamic jurisprudence. Taking the preferred saying is contrary to the original, and takes it if necessity or need arises. There are reasons for adopting the preferred saying that were mentioned in this research so that the mufti and jurist know when to take the preferred saying, and when to act with the most correct saying. The origin is the work of the jurist and mufti by saying the most correct. If the necessity or the need that prompted the mufti to take the preferred saying ceases, then he returns to work with the most correct saying, and gives it precedence over the most preferred opinion. The researcher recommends that this topic be given more attention from researchers, and that it is taken care of in jurisprudential developments; So that the embarrassment of the nation is lifted, and the jurists clarify the legal ruling on emerging issues.
-
Saleh, Matasem;Jhanjhi, NZ;Abdullah, Azween;Saher, Raazia 328
The Internet of Things (IoT) is a technology that offers lucrative services in various industries to facilitate human communities. Important information on people and their surroundings has been gathered to ensure the availability of these services. This data is vulnerable to cybersecurity since it is sent over the internet and kept in third-party databases. Implementation of data encryption is an integral approach for IoT device designers to protect IoT data. For a variety of reasons, IoT device designers have been unable to discover appropriate encryption to use. The static support provided by research and concerned organizations to assist designers in picking appropriate encryption costs a significant amount of time and effort. IoTES is a web app that uses machine language to address a lack of support from researchers and organizations, as ML has been shown to improve data-driven human decision-making. IoTES still has some weaknesses, which are highlighted in this research. To improve the support, these shortcomings must be addressed. This study proposes the "IoTES with Security" model by adding support for the security level provided by the encryption algorithm to the traditional IoTES model. We evaluated our technique for encryption algorithms with available security levels and compared the accuracy of our model with traditional IoTES. Our model improves IoTES by helping users make security-oriented decisions while choosing the appropriate algorithm for their IoT data. -
A brain tumor forms when some tissue becomes old or damaged but does not die when it must, preventing new tissue from being born. Manually finding such masses in the brain by analyzing MRI images is challenging and time-consuming for experts. In this study, our main objective is to detect the brain's tumorous part, allowing rapid diagnosis to treat the primary disease instantly. With image processing techniques and deep learning prediction algorithms, our research makes a system capable of finding a tumor in MRI images of a brain automatically and accurately. Our tumor segmentation adopts the U-Net deep learning segmentation on the standard MICCAI BRATS 2018 dataset, which has MRI images with different modalities. The proposed approach was evaluated and achieved Dice Coefficients of 0.9795, 0.9855, 0.9793, and 0.9950 across several test datasets. These results show that the proposed system achieves excellent segmentation of tumors in MRIs using deep learning techniques such as the U-Net algorithm.
-
The purpose of this paper is the clarify the concept of Siāsa Shar'iyyah-the foundational principle of the application of Islamic law-and the occasion and methodology of the Muslim community in the implementation of Sharia. The paper deals with two important issues in terms of the impact of Sharia implementation. The first is the impact of applying Siāsa Shar'iyyah in terms of detailed rulings in Sharia. The second is the overall impact Siāsa Shar'iyyah has on the application of Sharia as a country's political system.
-
The paper demonstrates how the Islamic governments in the Islamic history derived the authority for regulations and laws from the Qur'ān and the Sunna (sayings of the Prophet). These two laws are sovereign over public policy. Then, it shows the obstacles that prevented modern Muslim countries from formulating public policy based on Sharia law.
-
Luzha, Ibush;Baftiu, Naim;Maloku, Betim;Qarkaxhija, Jusuf 362
The assessment of specific impacts on the environment is a preventive measure for environmental protection which is based on the definition and proposal of measures that can prevent harmful effects, reduce or eliminate them. In the physical sense, vibration is the oscillating motion of an object with the effect of internal or external forces applied to it. People who touch a vibrating surface or object will feel these vibrations. In general, there are two types of vibration exposure. The first are the vibrations of the hands and arms transmitted by the held parts of tools or machinery. The second are whole-body vibrations transmitted from a seat or surface to a motorized car. The risk of injury to workers exposed to vibration varies depending on the size, frequency, type, duration of exposure, and organ affected. The purpose of this paper is to review the measurements of vibrations in the Kosovo Energy Corporation in the mine Sibovc Southwest, where coal with a rotary excavator is exploited and the evaluation of vibrations for working conditions for workers working in that environment and improving working conditions for the measurement of vibrations we have used the device Minimate DS 078, the purpose of such environmental impact assessment is to collect data and predict the harmful impacts on the environment, namely the impact on water, air, soil, life and health of as well as identify and propose measures that could prevent, reduce or eliminate altogether. -
Shabani, Milazim;Baftiu, Naim;Baftiu, Egzon;Maloku, Betim 371
The environment in Kosovo is a topic of concern for the citizens and the state because of the temperatures that affect the health of the citizens and the climate around the world. Kosovo's climate is related to its geographical position. Stretching in the middle latitude, Kosovo's climate depends on the amount of heat coming from the Sun, the proximity of the Adriatic Sea, the Vardar valley, the openness to the north. In order to better understand the climatic features of Kosovo, one must know the elements of the climate such as: sunshine, temperature, precipitation, atmospheric pressure, winds. The Meteorological Institute of Kosovo is responsible for measuring temperatures in Kosovo since 2014 and until now 12 meteorological stations have been operationalized with automatic measurement and real-time data transfer to the central system for data collection and archiving. The hydrometeorological institute lacks an application for measuring temperatures in all the countries of Kosovo. Software applications are generally built to suit the requirements of different governments and clients in order to enable easier management of the jobs they operate on. One of the forms of application development is the development of mobile applications based on android. The purpose of the work is to create a mobile application based on the Android operating system that aims to display information about the weather, this type of application is necessary and important for users who want to see the temperature in different places in Kosovo, but also the world. This type of application offers many options such as maximum temperature, minimum temperature, humidity, and air pressure. The built application will have real and accurate data; this will be done by comparing the results with other similar applications. Such an application is necessary for everyone, especially for those people whose daily work is dependent on the weather or even for those who decide to spend their vacations, such as summer or winter. In this paper, comparisons are also made within android applications for tablets, televisions and smart watches. -
To have a complete and comprehensive understanding of the research subject and to form an integrated legal framework for it, I have sought comprehensively to cover the major written literature on the issue under consideration. I also benefitted from a wide range of research and academic studies pertaining to the same topic, although that literature did not specifically address the issue of consumer rights in electronic contracting in the Saudi e-commerce system. Rather, it addressed only the civil and criminal protection of the consumer in e-commerce. I have divided the reviewed literature into two sections according to the sources.
-
Ivanova, Raisa;Skrobotova, Olga;Polyakova, Irina;Karaseva, Galina;Strelnikova, Marina 385
The relevance of the published study lies in the fact that since the introduction of the first Global Distribution System, new information and communication technologies have constantly been changing the tourism industry. In the context of a current digital environment, travel agencies can't avoid participating in digital transformation processes aimed at rethinking operational models, skills, and organisational structures in the regions. This publication aims to present and provide a critical overview of digitalisation processes in tourism development in the regions of the Russian Federation, as well as to reflect on the challenges to the widespread digitalisation processes in the regional tourism sector. The subject of research is digitalisation processes, as they radically transform the modern tourism industry, in the regions as well. The pragmatic research paradigm was considered the most appropriate for the study of tourism digitalisation processes in the regions, as it does not require the selection of a specific theoretical basis for data collection. The pragmatic approach forms an alternative to classical theoretical approaches and serves as a particular type of grounded theory, combining both inductive and deductive methods. No software was used for the inductive part of the analysis. The deductive part was conducted using the qualitative data analysis software Nvivo 11. Given the wide diversity of interested parties in the regional tourism digital area, a stratified purposive sampling method was preferred due to its ability to adequately represent the full picture of the phenomenon under study. The selection and stratum criteria were chosen to maximise the representation of different perspectives in the regional tourism digital area. The novelty of the study is due to the digitalisation processes, with an implication of new needs, while opening up promising opportunities for more productive tourism business in the regions of the Russian Federation. Currently, e-tourism in the Russian Federation has become a subject of lively debate among scholars and practitioners. However, the involvement of advanced digitalisation technologies in the field of information processes in the regions of the Russian Federation is of a very sporadic character. -
Consumers are continually in need of protection both locally and globally. The importance of providing consumer protection stems from the fact that the consumer represents the weaker party in the contractual process. This research focuses on examining the extent to which Saudi Law guarantees the protection of consumers using e-commerce from the expected legal problems such as antifraud locally and globally.
-
Natural texts are analyzed to obtain their intended meaning to be classified depending on the problem under study. One way to represent words is by generating vectors of real values to encode the meaning; this is called word embedding. Similarities between word representations are measured to identify text class. Word embeddings can be created using word2vec technique. However, recently fastText was implemented to provide better results when it is used with classifiers. In this paper, we will study the performance of well-known classifiers when using both techniques for word embedding with Arabic dataset. We applied them to real data collected from Wikipedia, and we found that both word2vec and fastText had similar accuracy with all used classifiers.
-
The development in the field of the internet of things (IoT) have improved the quality of the life and also strengthened different areas in the society. All cities across the world are seeking to become smarter. The creation of a smart parking system is the essential use case in smart cities. In recent couple of years, the number of vehicles has increased significantly. As a result, it is critical to make the use of technology that enables hassle-free parking in both public and private spaces. In conventional parking systems, drivers are not able to find free parking space. Conventional systems requires more human interference in a parking lots. To manage these circumstances there is an intense need of IoT enabled parking solution that includes the well defined architecture that will contain the following components such as smart sensors, communication agreement and software solution. For implementing such a smart parking system in this paper we proposed a design of smart parking system and also compare it with convetional system. The proposed design utilizes sensors based on IoT and Data Mining techniques to handle real time management of the parking system. IoT enabled smart parking solution minimizes the human interference and also saves energy, money and time.
-
To have a complete and comprehensive understanding of the research subject and to form an integrated legal framework for it, I have sought comprehensively to cover the major written literature on the issue under consideration. I also benefitted from a wide range of research and academic studies pertaining to the same topic, although that literature did not specifically address the issue of consumer rights in electronic contracting in the Saudi e-commerce system. Rather, it addressed only the civil and criminal protection of the consumer in e-commerce.
-
The Arab Automotive Company was the first corporation in Saudi Arabia and was founded in 1928. Since then, the number of Saudi corporations had increased. In 1985, Tadawul (The Saudi Stock Exchange ) was instituted under the supervision of the Saudi Arabian Monetary Authority (SAMA) and the base value of the index was 1000. This decision came as a response to accelerated growth in the number of Saudi corporations which had increased during the 1970s as the Saudi's economy developed.
-
Saudi laws must be derived from Islamic law. However, Islamic law has a flexible methodology that allows it to deal with any form of business entity. Today there is no difference between the countries around the world about the general concept of the corporation because countries have copied the system of the corporation from each other since the sixteenth century.