Hesham Abusaimeh
YOU?
Author Swipe
View article: Real-Time AI Integrity: Enhancing Cheating Detection through Neural Network-CNN Data Analysis
Real-Time AI Integrity: Enhancing Cheating Detection through Neural Network-CNN Data Analysis Open
The rising demand for online learning and the high academic reliance on artificial intelligence (AI) have led to the need for the development of an automated system that detects and mitigates instances of student cheating, especially in la…
View article: The Impact of Adaptive Learning Technologies, Personalized Feedback, and Interactive AI Tools on Student Engagement: The Moderating Role of Digital Literacy
The Impact of Adaptive Learning Technologies, Personalized Feedback, and Interactive AI Tools on Student Engagement: The Moderating Role of Digital Literacy Open
Using adaptive learning technologies, personalized feedback, and interactive AI tools, this study investigates how these tools affect student engagement and what the mediating role of individuals’ digital literacy is at the same time. The …
View article: Conceptualizing Ethical AI-Enabled Marketing: Current State and Agenda for Future Research
Conceptualizing Ethical AI-Enabled Marketing: Current State and Agenda for Future Research Open
This paper addresses the conceptual exploration of various issues that form an integral part of the ethical dimensions surrounding the use of artificial intelligence (AI) in the field of marketing. We critically review some of the main eth…
View article: Corrections to “Ethical Considerations in the Use of ChatGPT: An Exploration Through the Lens of Five Moral Dimensions”
Corrections to “Ethical Considerations in the Use of ChatGPT: An Exploration Through the Lens of Five Moral Dimensions” Open
Presents corrections to the paper, (Corrections to “Ethical Considerations in the Use of ChatGPT: An Exploration Through the Lens of Five Moral Dimensions”).
View article: Conceptualizing ethical AI-enabled marketing: Current state and agenda for future research
Conceptualizing ethical AI-enabled marketing: Current state and agenda for future research Open
This paper addresses the conceptual exploration of various issues that form an integral part of the ethical dimensions surrounding the use of artificial intelligence (AI) in the field of marketing. We critically review some of the main eth…
View article: Ethical Considerations in the Use of ChatGPT: An Exploration Through the Lens of Five Moral Dimensions
Ethical Considerations in the Use of ChatGPT: An Exploration Through the Lens of Five Moral Dimensions Open
This article seeks to illuminate the ethical challenges and concerns presented by the utilization of the large language model, ChatGPT. Five critical ethical dimensions as proposed by Laudon and Laudon – Information rights and obligations,…
View article: Assessment of effects in advances of accounting technologies on quality financial reports in Jordanian public sector
Assessment of effects in advances of accounting technologies on quality financial reports in Jordanian public sector Open
The study aimed to examine the effects of accounting technology improvements on the generation of accurate and reliable financial reports in the public sector of Jordan. In order to carry out this inquiry, the researchers set research goal…
View article: Balanced Scorecard and Competitive Strategies of Small and Medium Manufacturing Organizations
Balanced Scorecard and Competitive Strategies of Small and Medium Manufacturing Organizations Open
The competition between Jordanian Small and Medium Manufacturing Enterprises (SMMEs) and imported products from foreign countries especially from China is increasing, so Jordanian SMMEs have to use different strategic tools to be able to c…
View article: Prescriptive Analytics-Based SIRM Model for Predicting Covid-19 Outbreak
Prescriptive Analytics-Based SIRM Model for Predicting Covid-19 Outbreak Open
View article: Using cloud computing services to enhance competitive advantage of commercial organizations
Using cloud computing services to enhance competitive advantage of commercial organizations Open
Using advanced technology in business has created hyper-competition among organizations to satisfy customers' needs. Using advanced technology aims to provide customers with quality products/services at suitable prices in the right place b…
View article: Competitive strategy development through green supply chain practices
Competitive strategy development through green supply chain practices Open
Nowadays, the topic of preserving the environment and serving local communities is a hot issue. Hence, this study aims to explore how the green supply chain affects Jordan's pharmaceutical manufacturing industry's ability to compete global…
View article: Theoretical prediction of doping iron ions effect on the optoelectronic and magnetic cobalt-based perovskite (Co<sub>1-x</sub>Fe<sub>x</sub>ScO<sub>3</sub>)
Theoretical prediction of doping iron ions effect on the optoelectronic and magnetic cobalt-based perovskite (Co<sub>1-x</sub>Fe<sub>x</sub>ScO<sub>3</sub>) Open
The ab-initio framework has taken place by means of the Full-potential Linear Augmented Plane-Wave (FP-LAPW) method, using the modified Becke-Johnson exchange potential approximation. This modified method was carried out to study the effec…
View article: Computation Offloading for Mobile Cloud Computing Frameworks and Techniques
Computation Offloading for Mobile Cloud Computing Frameworks and Techniques Open
With mobile devices’ limited resources, computing the increasing amount of data locally puts strain on their batteries, processors, storage and bandwidth making it necessary to offload computeheavy tasks to a close proximity edge cloud ser…
View article: The adoption of TikTok application using TAM model
The adoption of TikTok application using TAM model Open
One of the most used social media platforms is TikTok, which is widely and increasingly used due to the short-video interactive music. Very few studies about why people prefer to use TikTok applications were carried out. Therefore, the obj…
View article: Detecting the Phishing Website with the Highest Accuracy
Detecting the Phishing Website with the Highest Accuracy Open
Phishing attacks are increasing and it becomes necessary to use appropriate response methods and to respond effectively to phishing attacks. This paper aims to uncover phishing attack sites by analyzing a three-module set to prevent damage…
View article: Cloud Computing Authentication Attack and Mitigation Survey
Cloud Computing Authentication Attack and Mitigation Survey Open
Securing the information and customer privacy are very important during the attacks are increased, and the biggest breach happened in the previous year's especially in cloud computing.In cloud computing, we need to use a secure authenticat…
View article: Security Attacks in Cloud Computing and Corresponding Defending Mechanisms
Security Attacks in Cloud Computing and Corresponding Defending Mechanisms Open
Cloud computing is considered as a rising model that becomes a necessity to accommodate the rapid growth in the use of technology.Cloud computing provides a wide diversity of facilities and services for the users without the need for havin…
View article: Theoretical investigation of the structural, electronic, and elastic properties of TM3In(TM = Pd and Pt) intermetallic compounds
Theoretical investigation of the structural, electronic, and elastic properties of TM3In(TM = Pd and Pt) intermetallic compounds Open
We present a systematic study of the structural, elastic, and electronic properties of TM3In(TM = Pd and Pt) intermetallic compounds using density functional theory via a full-potential linearized augmented plane wave approach in the conte…
View article: Enhance the Security and Prevent Vampire Attack on Wireless Sensor Networks using Energy and Broadcasts Threshold Values
Enhance the Security and Prevent Vampire Attack on Wireless Sensor Networks using Energy and Broadcasts Threshold Values Open
Measuring and monitoring the surrounded environment are the main tasks of the most battery-based Wireless Sensor Networks (WSNs). The main energy consumption in the WSN is the communication and transferring data between these nodes. There …
View article: Distributed Denial of Service Attacks in Cloud Computing
Distributed Denial of Service Attacks in Cloud Computing Open
The Cloud Computing attacks have been increased since the expanded use of the cloud computing. One of the famous attacks that targets the cloud computing is the distributed denial of service (DDoS) attack. The common features and component…
View article: Virtual Machine Escape in Cloud Computing Services
Virtual Machine Escape in Cloud Computing Services Open
It’s of axioms; every progress that is devised in the field of facilitating daily life through technology is matched by many complications in terms of the methods that led to the creation of these inventions and how to maintain their susta…
View article: Optimizing Power-Based Indoor Tracking System for Wireless Sensor Networks using ZigBee
Optimizing Power-Based Indoor Tracking System for Wireless Sensor Networks using ZigBee Open
Evolution of wireless and digital communication gives birth to the smaller but powerful battery-equipped devices which are easy to maintain and perform the desired tasks. ZigBee is a Wireless Personal Area Network (WPAN) used for home or i…
View article: Applying an Arabic Conversational Agent in the Jordanian E-Government
Applying an Arabic Conversational Agent in the Jordanian E-Government Open
This paper discusses a prototype idea of applyinga Conversational Agent (CA) to be embedded into the Jordanian E-government websites.The Conversational Agent is a smart system used to handle natural conversations between user and machine.A…
View article: Modified USB Security Token for User Authentication
Modified USB Security Token for User Authentication Open
- Computer security has been a significant importance in today’s world. Many researches have been done in order to improve the security services with encryption and decryption of sensitive. In addition, Security protocols have been develop…