4 research outputs found

    Cyberstalking Victimization Model Using Criminological Theory: A Systematic Literature Review, Taxonomies, Applications, Tools, and Validations

    Full text link
    Cyberstalking is a growing anti-social problem being transformed on a large scale and in various forms. Cyberstalking detection has become increasingly popular in recent years and has technically been investigated by many researchers. However, cyberstalking victimization, an essential part of cyberstalking, has empirically received less attention from the paper community. This paper attempts to address this gap and develop a model to understand and estimate the prevalence of cyberstalking victimization. The model of this paper is produced using routine activities and lifestyle exposure theories and includes eight hypotheses. The data of this paper is collected from the 757 respondents in Jordanian universities. This review paper utilizes a quantitative approach and uses structural equation modeling for data analysis. The results revealed a modest prevalence range is more dependent on the cyberstalking type. The results also indicated that proximity to motivated offenders, suitable targets, and digital guardians significantly influences cyberstalking victimization. The outcome from moderation hypothesis testing demonstrated that age and residence have a significant effect on cyberstalking victimization. The proposed model is an essential element for assessing cyberstalking victimization among societies, which provides a valuable understanding of the prevalence of cyberstalking victimization. This can assist the researchers and practitioners for future research in the context of cyberstalking victimization

    Evaluation model for Big Data integration tools

    No full text
    Given the growing demand and need by enterprises for data and information to positively support the decision-making process, there is no doubt about the importance of selecting the correct and appropriate integration tool for the different types of business. For this reason, the essential objective of this study is to create a model that will serve as a basis to evaluate the different alternatives and solutions that exist in the market able to overcome the big data integration challenges. The evaluation process of data integration product begins with the definition and prioritisation of critical requirements and criteria. In this evaluation model, the characteristics evaluated are categorised into three main groups: ease of integration and implementation, quality of service and support, and costs. After identifying the essential criteria and characteristics, it is necessary to determine the weights that these criteria should have in the evaluation. Then, it needs to verify which solutions existing in the market best fit the needs of the business and can satisfy them more effectively. And lastly, compare those solutions adopting this framework. It is essential to carry out a weighted evaluation, based on well-defined criteria like ease of use, quality of technical support, data privacy and security. This process is fundamental to verify if the solution offers what the organization needs if it meets the business requirements and their integration needs.This work has been supported by FCT – Fundação para a Ciência e Tecnologia within the Project Scope: UID/CEC/00319/201

    β-Lactamase Production in Key Gram-Negative Pathogen Isolates from the Arabian Peninsula

    No full text
    Infections due to Gram-negative bacilli (GNB) are a leading cause of morbidity and mortality worldwide. The extent of antibiotic resistance in GNB in countries of the Gulf Cooperation Council (GCC), namely, Saudi Arabia, United Arab Emirates, Kuwait, Qatar, Oman, and Bahrain, has not been previously reviewed. These countries share a high prevalence of extended-spectrum-β-lactamase (ESBL)- and carbapenemase-producing GNB, most of which are associated with nosocomial infections. Well-known and widespread β-lactamases genes (such as those for CTX-M-15, OXA-48, and NDM-1) have found their way into isolates from the GCCstates. However, less common and unique enzymes have also been identified. These include PER-7, GES-11, and PME-1. Several potential risk factors unique to the GCC states may have contributed to the emergence and spread of β-lactamases, including the unnecessary use of antibiotics and the large population of migrant workers, particularly from the Indian subcontinent. It is clear that active surveillance of antimicrobial resistance in the GCC states is urgently needed to address regional interventions that can contain the antimicrobial resistance issue

    Chitinase-producing bacteria and their role in biocontrol

    No full text
    corecore