80 research outputs found

    Effect of Article 11 of the Jordanian Electronic Crimes Law on Exercising Criticism Freedom for Journalists and Workers in the Digital Media

    Get PDF
    This study aims to know the impact of the Jordanian Electronic Crimes Law No. 27 of 2015 on the freedom of the press and the freedom to exercise criticism in the digital media represented in websites and social networks.The study uses the descriptive method to survey the opinions of journalists, employees and activists in digital media field through a governed survey. The sample was randomly selected 150 individuals interested in studying their opinions and studying the effect of the law on their freedom of practicing criticism in many websites and social networks .The study found that 88% of journalists and workers in the digital media suffer from restrictions on their press freedoms through the censorship imposed by the editor and also through the penalties imposed by the Electronic Crimes Law regarding publishing crimes. In addition, an average of 75% of those who saw clear imbalances in the Electronic Crimes Law never corresponded to the freedom of the journalist in criticism. The results also showed that journalists and employees in the digital media are aware of the freedom of criticism and related supervisory roles. Are aware of their rights and duties in this regard with an average of 75% of the total knowledge, and 46% expressed their disagreement with the arrest of journalists in accordance with article 11 of the Electronic Crimes Law. Keywords: Criticism of Electronic Crimes Law Article 11, Freedom of Information in Jordan. DOI: 10.7176/JLPG/85-07 Publication date:May 31st 201

    Multilayer Cyberattacks Identification and Classification Using Machine Learning in Internet of Blockchain (IoBC)-Based Energy Networks

    Get PDF
    The world's need for energy is rising due to factors like population growth, economic expansion, and technological breakthroughs. However, there are major consequences when gas and coal are burnt to meet this surge in energy needs. Although these fossil fuels are still essential for meeting energy demands, their combustion releases a large amount of carbon dioxide and other pollutants into the atmosphere. This significantly jeopardizes community health in addition to exacerbating climate change, thus it is essential need to move swiftly to incorporate renewable energy sources by employing advanced information and communication technologies. However, this change brings up several security issues emphasizing the need for innovative cyber threats detection and prevention solutions. Consequently, this study presents bigdata sets obtained from the solar and wind powered distributed energy systems through the blockchain-based energy networks in the smart grid (SG). A hybrid machine learning (HML) model that combines both the Deep Learning (DL) and Long-Short-Term-Memory (LSTM) models characteristics is developed and applied to identify the unique patterns of Denial of Service (DoS) and Distributed Denial of Service (DDoS) cyberattacks in the power generation, transmission, and distribution processes. The presented big datasets are essential and significantly helps in identifying and classifying cyberattacks, leading to predicting the accurate energy systems behavior in the SG.© 2024 The Author(s). Published by Elsevier Inc. This is an open access article under the CC BY license (http://creativecommons.org/licenses/by/4.0/)fi=vertaisarvioitu|en=peerReviewed

    Enhanced image encryption scheme with new mapreduce approach for big size images

    Get PDF
    Achieving a secured image encryption (IES) scheme for sensitive and confidential data communications, especially in a Hadoop environment is challenging. An accurate and secure cryptosystem for colour images requires the generation of intricate secret keys that protect the images from diverse attacks. To attain such a goal, this work proposed an improved shuffled confusion-diffusion based colour IES using a hyper-chaotic plain image. First, five different sequences of random numbers were generated. Then, two of the sequences were used to shuffle the image pixels and bits, while the remaining three were used to XOR the values of the image pixels. Performance of the developed IES was evaluated in terms of various measures such as key space size, correlation coefficient, entropy, mean squared error (MSE), peak signal to noise ratio (PSNR) and differential analysis. Values of correlation coefficient (0.000732), entropy (7.9997), PSNR (7.61), and MSE (11258) were determined to be better (against various attacks) compared to current existing techniques. The IES developed in this study was found to have outperformed other comparable cryptosystems. It is thus asserted that the developed IES can be advantageous for encrypting big data sets on parallel machines. Additionally, the developed IES was also implemented on a Hadoop environment using MapReduce to evaluate its performance against known attacks. In this process, the given image was first divided and characterized in a key-value format. Next, the Map function was invoked for every key-value pair by implementing a mapper. The Map function was used to process data splits, represented in the form of key-value pairs in parallel modes without any communication between other map processes. The Map function processed a series of key/value pairs and subsequently generated zero or more key/value pairs. Furthermore, the Map function also divided the input image into partitions before generating the secret key and XOR matrix. The secret key and XOR matrix were exploited to encrypt the image. The Reduce function merged the resultant images from the Map tasks in producing the final image. Furthermore, the value of PSNR did not exceed 7.61 when the developed IES was evaluated against known attacks for both the standard dataset and big data size images. As can be seen, the correlation coefficient value of the developed IES did not exceed 0.000732. As the handling of big data size images is different from that of standard data size images, findings of this study suggest that the developed IES could be most beneficial for big data and big size images

    Awareness of sustainability issues among science education and vocational education students at the Hashemite University in Jordan : an empirical investigation

    Get PDF
    The primary purpose of this study was to assess the level of students’ awareness about sustainability issues at the Hashemite University in Jordan. A 30-item instrument, adapted from Dunkerly-Kolb (1998), was used to collect data from a sample of 230 preservice science and vocational teachers during the academic year 2005-2006. Results indicated that preservice science and vocational teachers showed medium level of awareness about sustainability issues. Additionally, results indicated that participants appeared to be independent from their natural surroundings. The study suggested few practical solutions for faculty members and for the university administration to incorporate sustainability principles into university curricula.peer-reviewe

    The Role of Adequate Computer Information System Resources used at the Library Organizations in Enhancing Motivation to Learn among Accounting Students in the Jordanian Universities

    Get PDF
    The present study sought to identify the adequacy level of computer information system resources used at library organizations in the Jordanian university and exploring the part they take in enhancing motivation to learn among students. Further, the study intends to identify variant roles of the adequate computer information system resources used at library organization in enhancing motivation to learn among students by gender and proprietorship of a university. Questionnaire was primarily used as data collection instrument, and processed using the Statistical Program for Social Sciences (SPSS). Sample (N=1911) was randomly selected representing 30% of population. Major results included that: Adequate computer information system resources available at campus libraries enhance motivation to learn, curiosity to research, and increase loyalty to the library among students. Poorly skilled personnel working in the field of computer information systems at the Jordanian libraries. Low adequacy level of computer information system resources available in campus libraries at the Jordanian universities and there is a need for development and improvement of the service delivered. Lag of library administrators at the Jordanian university in troubleshooting faults and interruptions occurring to computer information system resources. Libraries under study lack networking facility or online communications with students Keywords: Adequacy of Computer Information System Resources, Enhancing Motivation to Learn, Informational and Libraries organizations

    Green Communication for Underwater Wireless Sensor Networks: Triangle Metric Based Multi-Layered Routing Protocol

    Full text link
    [EN] In this paper, we propose a non-localization routing protocol for underwater wireless sensor networks (UWSNs), namely, the triangle metric based multi-layered routing protocol (TM2RP). The main idea of the proposed TM2RP is to utilize supernodes along with depth information and residual energy to balance the energy consumption between sensors. Moreover, TM2RP is the first multi-layered and multi-metric pressure routing protocol that considers link quality with residual energy to improve the selection of next forwarding nodes with more reliable and energy-efficient links. The aqua-sim package based on the ns-2 simulator was used to evaluate the performance of the proposed TM2RP. The obtained results were compared to other similar methods such as depth based routing (DBR) and multi-layered routing protocol (MRP). Simulation results showed that the proposed protocol (TM2RP) obtained better outcomes in terms of energy consumption, network lifetime, packet delivery ratio, and end-to-end delay.This project was funded by the Deanship of Scientific Research (DSR), King Abdulaziz University, Jeddah (under grant no. DF-524-156-1441). The authors, therefore, gratefully acknowledge DSR for the technical and financial supportKhasawneh, AM.; Kaiwartya, O.; Lloret, J.; Abuaddous, HY.; Abualigah, L.; Shinwan, MA.; Al-Khasawneh, MA.... (2020). Green Communication for Underwater Wireless Sensor Networks: Triangle Metric Based Multi-Layered Routing Protocol. Sensors. 20(24):1-23. https://doi.org/10.3390/s20247278123202

    Towards Green Computing Oriented Security: A Lightweight Postquantum Signature for IoE

    Full text link
    [EN] Postquantum cryptography for elevating security against attacks by quantum computers in the Internet of Everything (IoE) is still in its infancy. Most postquantum based cryptosystems have longer keys and signature sizes and require more computations that span several orders of magnitude in energy consumption and computation time, hence the sizes of the keys and signature are considered as another aspect of security by green design. To address these issues, the security solutions should migrate to the advanced and potent methods for protection against quantum attacks and offer energy efficient and faster cryptocomputations. In this context, a novel security framework Lightweight Postquantum ID-based Signature (LPQS) for secure communication in the IoE environment is presented. The proposed LPQS framework incorporates a supersingular isogeny curve to present a digital signature with small key sizes which is quantum-resistant. To reduce the size of the keys, compressed curves are used and the validation of the signature depends on the commutative property of the curves. The unforgeability of LPQS under an adaptively chosen message attack is proved. Security analysis and the experimental validation of LPQS are performed under a realistic software simulation environment to assess its lightweight performance considering embedded nodes. It is evident that the size of keys and the signature of LPQS is smaller than that of existing signature-based postquantum security techniques for IoE. It is robust in the postquantum environment and efficient in terms of energy and computations.This project was funded by the Deanship of Scientific Research (DSR), King Abdulaziz University. Jeddah. under grant No. (DF-457-156-1441).Rani, R.; Kumar, S.; Kaiwartya, O.; Khasawneh, AM.; Lloret, J.; Al-Khasawneh, MA.; Mahmoud, M.... (2021). Towards Green Computing Oriented Security: A Lightweight Postquantum Signature for IoE. Sensors. 21(5):1-20. https://doi.org/10.3390/s2105188312021

    An examination of teacher collaboration in professional learning communities and collaborative teaching practices

    Get PDF
    The present study aims to examine the influence of teacher collaboration within professional learning communities (PLCs) and collaborative teaching practices on both the professional growth and academic achievement of students. The study employed a mixed-methods research design that  incorporated both qualitative and quantitative research methodologies. This research comprises both survey responses and interview transcripts obtained from K-12 educators who are currently engaged in Professional Learning Communities (PLCs) or collaborative teaching methodologies. The findings of this study have the potential to enhance the existing literature on teacher collaboration and furnish educators, policymakers, and researchers with valuable perspectives to steer optimal strategies for promoting effective teacher collaboration in Professional Learning Communities (PLCs) and collaborative teaching approaches. The objective of the research is to investigate the influence of teacher collaboration within Professional Learning Communities (PLCs) and collaborative teaching practices on the development of professional skills and academic achievements of students. The results of this study underscore the importance of recognizing the advantageous effects that collaborative teaching methodologies can have on the academic achievements of students. This necessitates the provision of adequate time for collaborative activities, encouraging supportive leadership within educational institutions, and allocating sufficient resources for collaboration

    Cyberattack patterns in blockchain-based communication networks for distributed renewable energy systems : A study on big datasets

    Get PDF
    Blockchain-based reliable, resilient, and secure communication for Distributed Energy Resources (DERs) is essential in Smart Grid (SG). The Solana blockchain, due to its high stability, scalability, and throughput, along with low latency, is envisioned to enhance the reliability, resilience, and security of DERs in SGs. This paper presents big datasets focusing on SQL Injection, Spoofing, and Man-in-the-Middle (MitM) cyberattacks, which have been collected from Solana blockchain-based Industrial Wireless Sensor Networks (IWSNs) for events monitoring and control in DERs. The datasets provided include both raw (unprocessed) and refined (processed) data, which highlight distinct trends in cyberattacks in DERs. These distinctive patterns demonstrate problems like superfluous mass data generation, transmitting invalid packets, sending deceptive data packets, heavily using network bandwidth, rerouting, causing memory overflow, overheads, and creating high latency. These issues result in ineffective real-time events monitoring and control of DERs in SGs. The thorough nature of these datasets is expected to play a crucial role in identifying and mitigating a wide range of cyberattacks across different smart grid applications.© 2024 The Author(s). Published by Elsevier Inc. This is an open access article under the CC BY license (http://creativecommons.org/licenses/by/4.0/)fi=vertaisarvioitu|en=peerReviewed

    MapReduce a comprehensive review

    Get PDF
    MapReduce encompasses a framework in the processing and management of large scale datasets within a distributed cluster. The framework has been employed in several applications including search indexes generation, analysis of access log, document clustering, and other data analytics. A flexible computation model is adopted in MapReduce in addition to plain interface which comprises the functions of map and reduce. The interface is customizable based on application developers. MapReduce has captured the interest among many scholars whereby the interest has been on increasing its usability and efficiency in support to database-centric operations. Accordingly, this paper provides a complete review regarding a vast continuum of proposals and systems concentrating basically on the support of distributed data management and processing with the use of the framework of MapReduce
    corecore