• Title/Summary/Keyword: international network

Search Result 4,257, Processing Time 0.024 seconds

Consumer Protection in E-commerce: Synthesis Review of Related Books

  • Alharthi, Saud Hamoud
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.8
    • /
    • pp.413-419
    • /
    • 2022
  • To have a complete and comprehensive understanding of the research subject and to form an integrated legal framework for it, I have sought comprehensively to cover the major written literature on the issue under consideration. I also benefitted from a wide range of research and academic studies pertaining to the same topic, although that literature did not specifically address the issue of consumer rights in electronic contracting in the Saudi e-commerce system. Rather, it addressed only the civil and criminal protection of the consumer in e-commerce.

Gifted Students' Viewpoints on Using Educational Technology in their Schools in the Saudi Context

  • Alammari, Abdullah
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.5
    • /
    • pp.245-249
    • /
    • 2022
  • This paper explored gifted students' perspectives on using educational technologies in their schools in the Saudi context. Adopting a descriptive research approach, a questionnaire was used to collect information from a sample of 196 gifted secondary school students in Jeddah. Findings showed that educational technology was used to a high degree, with an overall mean of 3.74 and 4.06 for the degree of importance of technological usage. Based on the findings, the researcher forwards some recommendations for effectively using such technologies to promote gifted students' abilities and talents.

Personal Data Security in Recruitment Platforms

  • Bajoudah, Alya'a;AlSuwat, Hatim
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.6
    • /
    • pp.310-318
    • /
    • 2022
  • Job offers have become more widespread and it has become easier and faster to apply for jobs through electronic recruitment platforms. In order to increase the protection of the data that is attached to the recruitment platforms. In this research, a proposed model was created through the use of hybrid encryption, which is used through the following algorithms: AES,Twofish,. This proposed model proved the effectiveness of using hybrid encryption in protecting personal data.

Micro-Learning Concepts and Principles

  • Almalki, Mohammad Eidah Messfer
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.5
    • /
    • pp.327-329
    • /
    • 2022
  • Education is affected by technical and scientific developments. Progress in one of these areas leads give way to new educational methods and strategies. One of these advanced learning modes is what has been conventionally termed as Micro-learning (ML). It has emerged in educational technology as a result of advances in information technology as well as advances in research in memory, brain, and social-cognitive processes.In this paper, the researcher discusses micro-learning in terms of its concepts, tools, and associated concepts, advantages and disadvantages.

Didactic Games and Gamification in Education

  • Almalki, Mohammad Eidah Messfer
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.4
    • /
    • pp.417-419
    • /
    • 2022
  • This paper undertakes educational games and gamification, their features, importance, and integration into the educational process. Besides outlining features, benefits, and difficulties, it highlights the difference between gaming, gamification, and game-based learning. The article contends that game-based learning and gamification elements such as reward, completion, and cooperation develop students' positive attitudes toward the curriculum and boost their learning motivation.

Proposing Micro-Learning in Saudi Universities

  • Almalki, Mohammad Eidah Messfer
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.4
    • /
    • pp.13-16
    • /
    • 2022
  • This paper proposes using micro-learning at Saudi universities. It commences with an account of the concept of micro-learning and the difference between micro-learning and electronic learning. Then it touches on the significance, principles, and examples of micro-learning, followed by some micro-learning applications and pitfalls. The paper closes with a proposal for using this learning mode at Saudi universities.

Obstacles Facing Science Teachers regarding Distance Learning during the COVID-19 Pandemic in Saudi Arabia

  • Alessa, Matar Ahmed
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.3
    • /
    • pp.326-334
    • /
    • 2022
  • This study aimed to explore science teachers' perceptions of obstacles that have affected their teaching during the COVID-19 pandemic. The sample comprised 204 science teachers in public schools within a Western district of Saudi Arabia. Results revealed that these teachers experienced obstacles across six areas: administration, students, teaching methods, assessment, technology, and learning aids. The study also explored teachers' perceptions of their current experience and offers suggestions for dealing with the identified obstacles.

An Account of Virtual and Augmented Reality in Educational Institutions

  • Al-Salami, Sami Ben Shamlan Bakhit
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.9
    • /
    • pp.137-142
    • /
    • 2022
  • This paper argues for modern technologies in the educational process. It specifically outlines issues germane to virtual and augmented reality. It begins with an account on virtual reality and augmented reality, and touches on their characteristics, the advantages, obstacles and applications. It also discusses some relevant studies that emphasized the role of virtual and augmented reality in education, the difference between two terms. The paper ends with a note of vision on how to activate them in educational institutions.

Personalization of Document Warehouses: Formalization, Design and Implementation

  • Khrouf, Kais;Turki, Hela
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.10
    • /
    • pp.369-373
    • /
    • 2022
  • In the decision-making domain, a document warehouse is designed to meet the analysis needs of users who may have a wide variety of analysis purposes. In this paper, we propose to integrate the preferences and interactions of users based on profiles to the concept of document warehouses. These profiles guarantee the integration of personalized documents and the collaborative recommendation of documents between different users sharing common interests.

Historical Review of Who Has Control Over Public Policy Formulation in Islamic Law

  • Almarashi, Majdi Saeed
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.8
    • /
    • pp.357-361
    • /
    • 2022
  • The paper demonstrates how the Islamic governments in the Islamic history derived the authority for regulations and laws from the Qur'ān and the Sunna (sayings of the Prophet). These two laws are sovereign over public policy. Then, it shows the obstacles that prevented modern Muslim countries from formulating public policy based on Sharia law.