Network routing has a great impact on the efficiency and reliability of the traffic network system in a real-world scenario. To date, achieving network-consistent performance is the main goal of many traffic network research...
As the data on the online social networks is getting larger, it is important to build personalized recommendation systems that recommend suitable content to users, there has been much research in this field that uses conceptual...
While many studies focused on what is management information system (MIS) major, how it attracts potential students, and describes needed skills, the perceptions of fresh MIS graduates' continuous intention to stay working in...
Many studies have investigated technology adoption in western countries and ignored the Arab region. The available Arab studies focused on the technology adoption model (TAM) and its subsequent variations while leaving important...
This work deals with Human Resource Scheduling Problem (HRSP) where fairness is a very important factor when assigning different shifts to the seafaring teams. This type of problem is part and partial of the NP-hard problems...
Many studies have focused on the adoption of social commerce (s-commerce) by customers but not by businesses or by microbusinesses. Further, they have investigated this adoption from a researcher's perspective while using...
Despite the plethora of studies investigating different impacting factors on intention to re-use (IR) e-government services, they suffer from two limitations. First, initial studies provide mixed results on the effect of risk...
Educators have been calling for reform for a decade. Recent technical breakthroughs have led to various improvements in the semantic web-based education system. After last year's COVID-19 outbreak, development quickened. Many...
Within the technology acceptance literature, the issue of top management support and commitment has been studied extensively; however, the issue of leadership per se has not been addressed directly. A missing piece of the...
The influence of eWoM use for s-commerce in the context of Arab region remains unexplored. To bridge this gap, this study develops a model for eWoM use for s-commerce post adoption. This model link three antecedents-factors...
Information management collects data from several online systems. They analyze the information. They issue reports about information for supporting decision-making management. Utilizing current modern innovations try to...
The phishing attack is one of the main cybersecurity threats in web phishing and spear phishing. Phishing websites continue to be a problem. One of the main contributions to our study was working and extracting the URL & Domain...