J. Alqatawna - Academia.edu (original) (raw)

Papers by J. Alqatawna

Research paper thumbnail of E-Business Security: Methodological Considerations

A great deal of research works in the field information systems security has been based on a posi... more A great deal of research works in the field information systems security has been based on a positivist paradigm. Applying the reductionism concept of the positivist paradigm for information security means missing the bigger picture and thus, the lack of holism which could be one of the reasons why security is still overlooked, comes as an afterthought or perceived from a purely technical dimension. We need to reshape our thinking and attitudes towards security especially in a complex and dynamic environment such as e- Business to develop a holistic understanding of e-Business security in relation to its context as well as considering all the stakeholders in the problem area. In this paper we argue the suitability and need for more inductive interpretive approach and qualitative research method to investigate e-Business security. Our discussion is based on a holistic framework of enquiry, nature of the research problem, the underling theoretical lens and the complexity of e-Business...

Research paper thumbnail of A Holistic Framework for Secure e-Business

nguyendangbinh.org

The complexity of today e-Business environments makes traditional security approaches and ad hoc ... more The complexity of today e-Business environments makes traditional security approaches and ad hoc security solutions insufficient to thwart the increasing numbers of security breaches. These approaches which perceive security from one dimension are unable to provide adequate ...

Research paper thumbnail of Towards Holistic Approaches to Secure e-Business: A Critical Review

nguyendangbinh.org

E-Business is more than just combining business with Internet technologies. Diverse issues are fa... more E-Business is more than just combining business with Internet technologies. Diverse issues are facing organisations endeavour to adopt e-Business. E-Business Security is one of the major issues facing e-Business organisations. This issue is usually overlooked, comes as an ...

Research paper thumbnail of Comparative Review of e-service Maturity Models: 6I Model

nguyendangbinh.org

This paper examines what are known as the 'maturity models' or the 'stage-ladder m... more This paper examines what are known as the 'maturity models' or the 'stage-ladder models' which all share stages of growth or maturity with one common point; the implication of the evolution of e-services in series of stages moving upward to embody the notion of a ...

Research paper thumbnail of Risk adaptive hybrid RFID access control system

Security and Communication Networks, 2015

Dynamic environments pose a challenge for traditional access control models where permissions are... more Dynamic environments pose a challenge for traditional access control models where permissions are granted or revoked merely based on predefined and static access policies making them incapable of dynamically adapting to changing conditions. Risk adaptive access control models have been gaining more attention in the research community as an alternative approach to overcome the limitations of traditional access control models. Radio Frequency Identification RFID is an emerging technology widely utilized in both physical and logical access control systems because of its contactless nature, low cost, high read/write speed and long distance operation. Serverless RFID system architecture offers better availability assurance and lower implementation cost, while access rights management is easier in server-based architecture. In this study, we continue to build on our previous research on the privacy and security of RFID access control systems without a backend database in order to overcome its limitations. We propose a hybrid design for a risk adaptive RFID access control system; that is, dynamically alternating between two access control modes, online server-based and offline serverless, to adapt to the level of risk depending on rule-based risk scenarios and current risk value. The proposed design combines features of both serverless and risk adaptive access control systems. Copyright © 2015 John Wiley & Sons, Ltd.

Research paper thumbnail of Improving Knowledge Based Spam Detection Methods: The Effect of Malicious Related Features in Imbalance Data Distribution

International Journal of Communications, Network and System Sciences, 2015

Research paper thumbnail of Multi-Stakeholder Enquiry for Securing e-Business Environments: A Socio-Technical Security Framework

Research paper thumbnail of Section Based Hex-Cell Routing ALGORITHM (SBHCR)

International journal of Computer Networks & Communications, 2015

A Hex-Cell network topology can be constructed using units of hexagon cells. It has been introduc... more A Hex-Cell network topology can be constructed using units of hexagon cells. It has been introduced in the literature as interconnection network suitable for large parallel computers, which can connect large number of nodes with three links per node. Although this topology exhibits attractive characteristics such as embeddability, symmetry, regularity, strong resilience, and simple routing, the previously suggested routing algorithms suffer from the high number of logical operations and the need for readdressing of nodes every time a new level is add to the network. This negatively impacts the performance of the network as it increases the execution time of these algorithms. In this paper we propose an improved optimal point to point routing algorithm for Hex-Cell network. The algorithm is based on dividing the Hex-Cell topology into six divisions, hence the name Section Based Hex-Cell Routing (SBHCR). The SBHCR algorithm is simple and preserves the advantage of the addressing scheme proposed for the Hex-Cell network. It does not depend on the depth of the network topology which leads to overcome the issue of readdressing of nodes every time a new level is added. Evaluation against two previously suggested routing algorithms has shown the superiority of SBHCR in term of less logical operations.

Research paper thumbnail of Simple Visual Monitoring Tool for Jordanian Traffic, Yet Intelligent

Research paper thumbnail of Factors Influencing the Adoption of E-Learning in Jordan: an Extended TAM Model

This study examines the factors contributing to attitudes towards E-Learning in higher education ... more This study examines the factors contributing to attitudes towards E-Learning in higher education among students in Jordan. The research developed a TAM-EL (Technology Acceptance Model for E-learning) for predicting the intention to adopt E-Learning using the constructs of the Technology Acceptance Model (TAM). TAM-EL proposes that Perception of usefulness of technology, Perception of ease of use of the technology, Patronised (degree of support for the technology), and Practised (previous experience with the technology) influence attitude towards the adoption of E-Learning. Data was collected from 380 undergraduate students to test the model. Factor analysis and confirmatory factor analysis were used to validate the instrument, however; the partial least square method was used to test the model for the study, moreover; stepwise regression analysis were used to test the hypotheses of the study. The findings indicate that students have an important role as stakeholders in the adoption of E-Learning in Jordan. While the variable of Attitude contributes to approximately 57% of the variance in the Prediction of E-Learning, the variable of Patronised contributes only approximately 28% of the variance in the Prediction of E-Learning. Moreover, the findings show an obvious recommendation is the need to engage users in a more determined manner.

Research paper thumbnail of An alternative Routing algorithm for hex-Cell network

In distributed systems, the underlying communication network and the routing algorithm affect the... more In distributed systems, the underlying communication network and the routing algorithm affect the overall performance of the computing nodes. Although the Hex-Cell network represents an interesting network topology with features such as the capability of embedding several topological structures and extensibility at a minimal cost; yet it needs an efficient routing algorithm in order to fully benefit from these interesting features. This paper proposes a new routing algorithm for Hex-Cell network. This routing algorithm is based on a new addressing mode which utilises the addresses of the two neighbours' cells of each source and destination nodes. The proposed routing algorithm uses two levels of routing: internal Node Routing which operates between the nodes within the cell and external Cell Routing which route messages from cell to cell. This concept is very useful with structure of Hex-Cell network specifically for grouping (clustering) six processors as one component (Cell) and there are central processor which organises these processors; therefore, Cell Routing can be used for routing from one group to another group, and for internal routing each group may us the proposed Node Routing or any another centre or distribute routing algorithm.

Research paper thumbnail of Road scene analysis for determination of road traffic density

Frontiers of Computer Science, 2014

Road traffic density has always been a concern in large cities around the world, and many approac... more Road traffic density has always been a concern in large cities around the world, and many approaches were developed to assist in solving congestions related to slow traffic flow. This work proposes a congestion rate estimation approach that relies on real-time video scenes of road traffic, and was implemented and evaluated on eight different hotspots covering 33 different urban roads. The approach relies on road scene morphology for estimation of vehicles average speed along with measuring the overall video scenes randomness acting as a frame texture analysis indicator. Experimental results shows the feasibility of the proposed approach in reliably estimating traffic density and in providing an early warning to drivers on road conditions, thereby mitigating the negative effect of slow traffic flow on their daily lives.

Research paper thumbnail of Privacy and security for RFID Access Control Systems: RFID Access Control Systems without back-end database

2011 IEEE Jordan Conference on Applied Electrical Engineering and Computing Technologies (AEECT), 2011

Radio Frequency Identification (RFID) is one of the most popular Automatic Identification and Dat... more Radio Frequency Identification (RFID) is one of the most popular Automatic Identification and Data Capture (AIDC) technologies that facilitate objects identification and information exchange over relatively small and widely separated entities. In this paper, the main aim is to address the privacy and security challenges that RFID Access Control Systems face and solve these challenges without relying on back-end database

Research paper thumbnail of Assessing the Role of Governments in Securing E-Business

Emerging Trends in ICT Security, 2014

ABSTRACT Advances in Web technologies have brought about a massive increase in online businesses,... more ABSTRACT Advances in Web technologies have brought about a massive increase in online businesses, but security has significantly lagged behind. We and others argue that governments can and should play a major role in providing a reliable and secure environment for online businesses because they have a major stake in growing the economy. Our finding from previous research indicates that security is usually overlooked; it comes as an afterthought or is perceived from a purely technical dimension. This study attempts to describe and analyze the current role of the government of Jordan in facilitating the security of e-business. Our starting premise is that governments should recognize the full range of socio-technical implications that security may have on the adoption of e-business. This can be achieved by understanding the real security needs and concerns of the various stakeholders at the different e-business stages and then aligning them to its policy and plans. Moreover, we argue that in order for the government to be an effective partner in developing a secure e-business environment, legislating laws and regulations is insufficient; instead, governments must increase security education and awareness, ensure compliance with security standards and regulations, and protect the country’s critical ICT infrastructure.

Research paper thumbnail of The State of Play in Jordanian E-government Services

2009 Sixth International Conference on Information Technology: New Generations, 2009

Abstract This paper presents the major Information and Communication Technology (ICT) initiatives... more Abstract This paper presents the major Information and Communication Technology (ICT) initiatives that have been taking place in Jordan and their effect in creating and promoting an e-culture within the Jordanian society. This is followed by an analysis of the Jordanian public e-...

Research paper thumbnail of Overriding of Access Control in XACML

Eighth IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY'07), 2007

Most access control mechanisms focus on how to define the rights of users in a precise way to pre... more Most access control mechanisms focus on how to define the rights of users in a precise way to prevent any violation of the access control policy of an organization. However, in many cases it is hard to predefine all access needs, or even to express them in machine readable form. One example of such a situation is an emergency case

Research paper thumbnail of A Holistic Framework for Secure e-Business

nguyendangbinh.org

The complexity of today e-Business environments makes traditional security approaches and ad hoc ... more The complexity of today e-Business environments makes traditional security approaches and ad hoc security solutions insufficient to thwart the increasing numbers of security breaches. These approaches which perceive security from one dimension are unable to provide adequate ...

Research paper thumbnail of Towards Holistic Approaches to Secure e-Business: A Critical Review

nguyendangbinh.org

E-Business is more than just combining business with Internet technologies. Diverse issues are fa... more E-Business is more than just combining business with Internet technologies. Diverse issues are facing organisations endeavour to adopt e-Business. E-Business Security is one of the major issues facing e-Business organisations. This issue is usually overlooked, comes as an ...

Research paper thumbnail of E-Business Security: Methodological Considerations

akademik.unsri.ac.id

Abstract—A great deal of research works in the field information systems security has been based ... more Abstract—A great deal of research works in the field information systems security has been based on a positivist paradigm. Applying the reductionism concept of the positivist paradigm for information security means missing the bigger picture and thus, the lack of holism which could be one ...

Research paper thumbnail of Comparative Review of e-service Maturity Models: 6I Model

nguyendangbinh.org

This paper examines what are known as the 'maturity models' or the 'stage-ladder m... more This paper examines what are known as the 'maturity models' or the 'stage-ladder models' which all share stages of growth or maturity with one common point; the implication of the evolution of e-services in series of stages moving upward to embody the notion of a ...

Research paper thumbnail of E-Business Security: Methodological Considerations

A great deal of research works in the field information systems security has been based on a posi... more A great deal of research works in the field information systems security has been based on a positivist paradigm. Applying the reductionism concept of the positivist paradigm for information security means missing the bigger picture and thus, the lack of holism which could be one of the reasons why security is still overlooked, comes as an afterthought or perceived from a purely technical dimension. We need to reshape our thinking and attitudes towards security especially in a complex and dynamic environment such as e- Business to develop a holistic understanding of e-Business security in relation to its context as well as considering all the stakeholders in the problem area. In this paper we argue the suitability and need for more inductive interpretive approach and qualitative research method to investigate e-Business security. Our discussion is based on a holistic framework of enquiry, nature of the research problem, the underling theoretical lens and the complexity of e-Business...

Research paper thumbnail of A Holistic Framework for Secure e-Business

nguyendangbinh.org

The complexity of today e-Business environments makes traditional security approaches and ad hoc ... more The complexity of today e-Business environments makes traditional security approaches and ad hoc security solutions insufficient to thwart the increasing numbers of security breaches. These approaches which perceive security from one dimension are unable to provide adequate ...

Research paper thumbnail of Towards Holistic Approaches to Secure e-Business: A Critical Review

nguyendangbinh.org

E-Business is more than just combining business with Internet technologies. Diverse issues are fa... more E-Business is more than just combining business with Internet technologies. Diverse issues are facing organisations endeavour to adopt e-Business. E-Business Security is one of the major issues facing e-Business organisations. This issue is usually overlooked, comes as an ...

Research paper thumbnail of Comparative Review of e-service Maturity Models: 6I Model

nguyendangbinh.org

This paper examines what are known as the 'maturity models' or the 'stage-ladder m... more This paper examines what are known as the 'maturity models' or the 'stage-ladder models' which all share stages of growth or maturity with one common point; the implication of the evolution of e-services in series of stages moving upward to embody the notion of a ...

Research paper thumbnail of Risk adaptive hybrid RFID access control system

Security and Communication Networks, 2015

Dynamic environments pose a challenge for traditional access control models where permissions are... more Dynamic environments pose a challenge for traditional access control models where permissions are granted or revoked merely based on predefined and static access policies making them incapable of dynamically adapting to changing conditions. Risk adaptive access control models have been gaining more attention in the research community as an alternative approach to overcome the limitations of traditional access control models. Radio Frequency Identification RFID is an emerging technology widely utilized in both physical and logical access control systems because of its contactless nature, low cost, high read/write speed and long distance operation. Serverless RFID system architecture offers better availability assurance and lower implementation cost, while access rights management is easier in server-based architecture. In this study, we continue to build on our previous research on the privacy and security of RFID access control systems without a backend database in order to overcome its limitations. We propose a hybrid design for a risk adaptive RFID access control system; that is, dynamically alternating between two access control modes, online server-based and offline serverless, to adapt to the level of risk depending on rule-based risk scenarios and current risk value. The proposed design combines features of both serverless and risk adaptive access control systems. Copyright © 2015 John Wiley & Sons, Ltd.

Research paper thumbnail of Improving Knowledge Based Spam Detection Methods: The Effect of Malicious Related Features in Imbalance Data Distribution

International Journal of Communications, Network and System Sciences, 2015

Research paper thumbnail of Multi-Stakeholder Enquiry for Securing e-Business Environments: A Socio-Technical Security Framework

Research paper thumbnail of Section Based Hex-Cell Routing ALGORITHM (SBHCR)

International journal of Computer Networks & Communications, 2015

A Hex-Cell network topology can be constructed using units of hexagon cells. It has been introduc... more A Hex-Cell network topology can be constructed using units of hexagon cells. It has been introduced in the literature as interconnection network suitable for large parallel computers, which can connect large number of nodes with three links per node. Although this topology exhibits attractive characteristics such as embeddability, symmetry, regularity, strong resilience, and simple routing, the previously suggested routing algorithms suffer from the high number of logical operations and the need for readdressing of nodes every time a new level is add to the network. This negatively impacts the performance of the network as it increases the execution time of these algorithms. In this paper we propose an improved optimal point to point routing algorithm for Hex-Cell network. The algorithm is based on dividing the Hex-Cell topology into six divisions, hence the name Section Based Hex-Cell Routing (SBHCR). The SBHCR algorithm is simple and preserves the advantage of the addressing scheme proposed for the Hex-Cell network. It does not depend on the depth of the network topology which leads to overcome the issue of readdressing of nodes every time a new level is added. Evaluation against two previously suggested routing algorithms has shown the superiority of SBHCR in term of less logical operations.

Research paper thumbnail of Simple Visual Monitoring Tool for Jordanian Traffic, Yet Intelligent

Research paper thumbnail of Factors Influencing the Adoption of E-Learning in Jordan: an Extended TAM Model

This study examines the factors contributing to attitudes towards E-Learning in higher education ... more This study examines the factors contributing to attitudes towards E-Learning in higher education among students in Jordan. The research developed a TAM-EL (Technology Acceptance Model for E-learning) for predicting the intention to adopt E-Learning using the constructs of the Technology Acceptance Model (TAM). TAM-EL proposes that Perception of usefulness of technology, Perception of ease of use of the technology, Patronised (degree of support for the technology), and Practised (previous experience with the technology) influence attitude towards the adoption of E-Learning. Data was collected from 380 undergraduate students to test the model. Factor analysis and confirmatory factor analysis were used to validate the instrument, however; the partial least square method was used to test the model for the study, moreover; stepwise regression analysis were used to test the hypotheses of the study. The findings indicate that students have an important role as stakeholders in the adoption of E-Learning in Jordan. While the variable of Attitude contributes to approximately 57% of the variance in the Prediction of E-Learning, the variable of Patronised contributes only approximately 28% of the variance in the Prediction of E-Learning. Moreover, the findings show an obvious recommendation is the need to engage users in a more determined manner.

Research paper thumbnail of An alternative Routing algorithm for hex-Cell network

In distributed systems, the underlying communication network and the routing algorithm affect the... more In distributed systems, the underlying communication network and the routing algorithm affect the overall performance of the computing nodes. Although the Hex-Cell network represents an interesting network topology with features such as the capability of embedding several topological structures and extensibility at a minimal cost; yet it needs an efficient routing algorithm in order to fully benefit from these interesting features. This paper proposes a new routing algorithm for Hex-Cell network. This routing algorithm is based on a new addressing mode which utilises the addresses of the two neighbours' cells of each source and destination nodes. The proposed routing algorithm uses two levels of routing: internal Node Routing which operates between the nodes within the cell and external Cell Routing which route messages from cell to cell. This concept is very useful with structure of Hex-Cell network specifically for grouping (clustering) six processors as one component (Cell) and there are central processor which organises these processors; therefore, Cell Routing can be used for routing from one group to another group, and for internal routing each group may us the proposed Node Routing or any another centre or distribute routing algorithm.

Research paper thumbnail of Road scene analysis for determination of road traffic density

Frontiers of Computer Science, 2014

Road traffic density has always been a concern in large cities around the world, and many approac... more Road traffic density has always been a concern in large cities around the world, and many approaches were developed to assist in solving congestions related to slow traffic flow. This work proposes a congestion rate estimation approach that relies on real-time video scenes of road traffic, and was implemented and evaluated on eight different hotspots covering 33 different urban roads. The approach relies on road scene morphology for estimation of vehicles average speed along with measuring the overall video scenes randomness acting as a frame texture analysis indicator. Experimental results shows the feasibility of the proposed approach in reliably estimating traffic density and in providing an early warning to drivers on road conditions, thereby mitigating the negative effect of slow traffic flow on their daily lives.

Research paper thumbnail of Privacy and security for RFID Access Control Systems: RFID Access Control Systems without back-end database

2011 IEEE Jordan Conference on Applied Electrical Engineering and Computing Technologies (AEECT), 2011

Radio Frequency Identification (RFID) is one of the most popular Automatic Identification and Dat... more Radio Frequency Identification (RFID) is one of the most popular Automatic Identification and Data Capture (AIDC) technologies that facilitate objects identification and information exchange over relatively small and widely separated entities. In this paper, the main aim is to address the privacy and security challenges that RFID Access Control Systems face and solve these challenges without relying on back-end database

Research paper thumbnail of Assessing the Role of Governments in Securing E-Business

Emerging Trends in ICT Security, 2014

ABSTRACT Advances in Web technologies have brought about a massive increase in online businesses,... more ABSTRACT Advances in Web technologies have brought about a massive increase in online businesses, but security has significantly lagged behind. We and others argue that governments can and should play a major role in providing a reliable and secure environment for online businesses because they have a major stake in growing the economy. Our finding from previous research indicates that security is usually overlooked; it comes as an afterthought or is perceived from a purely technical dimension. This study attempts to describe and analyze the current role of the government of Jordan in facilitating the security of e-business. Our starting premise is that governments should recognize the full range of socio-technical implications that security may have on the adoption of e-business. This can be achieved by understanding the real security needs and concerns of the various stakeholders at the different e-business stages and then aligning them to its policy and plans. Moreover, we argue that in order for the government to be an effective partner in developing a secure e-business environment, legislating laws and regulations is insufficient; instead, governments must increase security education and awareness, ensure compliance with security standards and regulations, and protect the country’s critical ICT infrastructure.

Research paper thumbnail of The State of Play in Jordanian E-government Services

2009 Sixth International Conference on Information Technology: New Generations, 2009

Abstract This paper presents the major Information and Communication Technology (ICT) initiatives... more Abstract This paper presents the major Information and Communication Technology (ICT) initiatives that have been taking place in Jordan and their effect in creating and promoting an e-culture within the Jordanian society. This is followed by an analysis of the Jordanian public e-...

Research paper thumbnail of Overriding of Access Control in XACML

Eighth IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY'07), 2007

Most access control mechanisms focus on how to define the rights of users in a precise way to pre... more Most access control mechanisms focus on how to define the rights of users in a precise way to prevent any violation of the access control policy of an organization. However, in many cases it is hard to predefine all access needs, or even to express them in machine readable form. One example of such a situation is an emergency case

Research paper thumbnail of A Holistic Framework for Secure e-Business

nguyendangbinh.org

The complexity of today e-Business environments makes traditional security approaches and ad hoc ... more The complexity of today e-Business environments makes traditional security approaches and ad hoc security solutions insufficient to thwart the increasing numbers of security breaches. These approaches which perceive security from one dimension are unable to provide adequate ...

Research paper thumbnail of Towards Holistic Approaches to Secure e-Business: A Critical Review

nguyendangbinh.org

E-Business is more than just combining business with Internet technologies. Diverse issues are fa... more E-Business is more than just combining business with Internet technologies. Diverse issues are facing organisations endeavour to adopt e-Business. E-Business Security is one of the major issues facing e-Business organisations. This issue is usually overlooked, comes as an ...

Research paper thumbnail of E-Business Security: Methodological Considerations

akademik.unsri.ac.id

Abstract—A great deal of research works in the field information systems security has been based ... more Abstract—A great deal of research works in the field information systems security has been based on a positivist paradigm. Applying the reductionism concept of the positivist paradigm for information security means missing the bigger picture and thus, the lack of holism which could be one ...

Research paper thumbnail of Comparative Review of e-service Maturity Models: 6I Model

nguyendangbinh.org

This paper examines what are known as the 'maturity models' or the 'stage-ladder m... more This paper examines what are known as the 'maturity models' or the 'stage-ladder models' which all share stages of growth or maturity with one common point; the implication of the evolution of e-services in series of stages moving upward to embody the notion of a ...