57 research outputs found

    The Nature, Antecedents and Outcomes of Interpersonal Trust within Co-worker Relationships in Jordan.

    Get PDF
    Research in the area of interpersonal trust within organisations has to a great extent focused on developing theoretical models identifying the nature, antecedents and outcomes of trust and empirically testing these models within the context of various organisational work relationships. However, the applicability of the propositions introduced by these models to cultural contexts different from those in which they were initially developed and to previously overlooked work relationship contexts has not been thoroughly understood or empirically examined. This thesis mainly examines trust, its antecedents and outcomes in co-worker relationship contexts involving permanent and contingent co-workers working within Jordanian organisations. The thesis reports the findings of two studies through which the applicability of the propositions of one of the most widely accepted theoretical frameworks pertaining to trust (the Mayer, Davis and Schoorman, 1995, integrative model of organisational trust) to co-worker contexts is empirically tested through the analysis of interview data collected from twenty employees and through the analysis of questionnaire data collected from two hundred employees (154 permanent employees and 46 contingent employee) from five different Jordanian organisations. Mayer et al.’s (1995) proposed model was mostly generalizable across co-worker contexts involving permanent and contingent employees. In addition, trust in a co-worker related significantly to interpersonal citizenship behaviours (ICB) towards the respective co-worker and unlike contingent employees, permanent employees differentiated between their permanent and contingent co-workers in terms of trust, trustworthiness perceptions and ICBs. However, both groups did not differentiate between their co-workers in terms of antisocial work behaviours. These findings indicate for academics and practitioners the importance of considering the employment status of employees when examining or managing the antecedents and outcomes of trust across various co-worker relationship contexts

    Beware the Fury of the Digital Age Consumer: Online Consumer Revenge: A Cognitive Appraisal Perspective

    Get PDF
    Online consumer revenge is costing companies millions of dollars annually. Yet, a limited number of studies have investigated the factors that influence online consumer revenge and the degree to which they carry on across cultural boundaries. A serious gap was noticed concerning the forms, triggers, and process of consumer revenge in the online context. Additionally, it was noticed that previous theoretical models of consumer revenge go directly from the desire for revenge state to the actual revenge state without explaining the cognitive process the consumer goes through when evaluating the decision whether or not to commit revenge. To address these research gaps, a mixed method approach was applied. A qualitative approach was employed first to explore this behaviour. Afterwards, a scenario based survey was used in order to examine and test the casual relationships between the variables identified in the first study on a larger sample from Jordan and Britain. Overall, the findings of this thesis have proven for the first time the secondary appraisal state consumers go through when evaluating their online revenge coping options. In this state, consumers were found to evaluate the reach of their actions, the risk involved, and the ability to perform the online revenge behaviour. Additionally, this thesis found that the British participants cognitively evaluate their online revenge options more extensively when compared to the Jordanian participants. The findings of this thesis also identify a new set of triggers for online consumer revenge including the type (process/outcome) and the severity of the service failure. This finding shifts away from the traditional fairness violations view of the triggers of consumer revenge. Moreover, the findings of this thesis establishes the role of the national culture in influencing online revenge as demonstrated by the difference in the harm appraisals, negative emotions, and the desires for revenge between the English and Jordanian participants

    Islam and the Muslims in the Anglo-American Literary Tradition: The Historical Roots and the Reiterations

    Get PDF
    The relationship between Islam and the West was first troubled by biblical texts pejorative of the Arabs, and the rise of Islam in the seventh century aggravated this negative view of Arabs and Muslims. Although the brilliant Muslim civilization in Spain mitigated this negative image, Western fears of Europe’s Latin Christianity being caught by the pincer of Muslim Spain in the West and Levantine Islam from the East gave rise to the Crusades that sought to drive a wedge between the two flanks of Islam by seizing the Holy Land and thereby neutralizing the Islamic threat. The Crusades, virulent religious wars spanning two centuries, gave rise to reviling images of Islam and its prophet which persisted for two more centuries, only to be aggravated still further by the dreaded Turkish threat. A respite came with growing trade links between Europe and the Levantine provinces of the Ottoman Empire. Wealth accruing from sound, effective trade agreements with the alien Ottoman power facilitated a more open-minded outlook. Mutual material benefits led to a more respectful understanding of the dreaded Muslim adversary and a growing interest in its heritage. Thus, mutual material interest, based on equity, forms a sound basis for Western–Islamic understanding. Momentary, localized disruptive factors should not be allowed to ruffle a would-be strategic, long-term understanding between the two sides, or cancel present, past or future improvements in relations. The Crusades arose, we are told, because of Christian pilgrims falling victim to local bandits who infested the Holy Land due to a local breakdown in government. American reiterations of Medieval European polemics against Islam arose from feelings running high due to the Barbary Wars

    Developing a faster pattern matching algorithms for intrusion detection system

    Get PDF
    © Research Institute for Intelligent Computer Systems, 2019. Fast pattern matching algorithms mostly used by IDS, which are considered one of the important systems used to monitor and analyze host and network traffic. Their main function is to detect various types of malicious and malware files by examining incoming and outgoing data through the network. As the network speed growing, the malicious behavior and malware files are increasing; the pattern matching algorithms must be faster. In this research paper we are presenting a new method of pattern matching, which could be a platform for enhancement in the future. In this field, researchers spared no efforts to introduce fast algorithms for pattern matching. The Most popular algorithms are Boyer-Moore, Aho-Corasick, Naïve String search, Rabin Karp String Search and Knuth-Morris-Pratt. Based on studying these techniques we are developing algorithms that process the text data, using different algorithm technique and then we\u27ll test the performance and compare the processing time with the fastest proven pattern matching algorithms available. Document the result and draw the overall conclusion

    Disclosure of the invention before the Award of the patent And its Impact on the Novelty Standard

    Get PDF
    Since the invention is one of the most essential elements in the process of growth and development of the economic life of nations, Legislations have approved certain criteria which are required for the legal protection of the invention; novelty, innovation, and industrial application, The first criterion has raised heated debate among legal scholars, this debate focused on concept; scope and application of novelty in line with secrecy. Due to the importance of novelty as a pre-condition to the existence of legal protection; it was the central issue of this study, which aimed at clarifying the means and ways to ensure that the invention will achieve the legal protection through the statement of the legal provisions that enable the inventor to maintain the invention novelty under obscure applicable conditions, which was caused by the preceding conditions of granting the file to patent that inheres revealing the secrecy of the invention of its relation to novelty criterion. In certain cases; the disclosure of the invention causes it to enter the prior industrial art because it loses its novelty, in other cases; it does not, and it will keep its novelty and therefore grant the legal protection

    Intensive pre-processing of KDD Cup 99 for network intrusion classification using machine learning techniques

    Get PDF
    © 2019, International Association of Online Engineering. Network security engineers work to keep services available all the time by handling intruder attacks. Intrusion Detection System (IDS) is one of the obtainable mechanism that used to sense and classify any abnormal actions. Therefore, the IDS must be always up to date with the latest intruder attacks signatures to preserve confidentiality, integrity and availability of the services. The speed of the IDS is very important issue as well learning the new attacks. This research work illustrates how the Knowledge Discovery and Data Mining (or Knowledge Discovery in Databases) KDD dataset is very handy for testing and evaluating different Machine Learning Techniques. It mainly focuses on the KDD preprocess part in order to prepare a decent and fair experimental data set. The techniques J48, Random Forest, Random Tree, MLP, Naïve Bayes and Bayes Network classifiers have been chosen for this study. It has been proven that the Random forest classifier has achieved the highest accuracy rate for detecting and classifying all KDD dataset attacks, which are of type (DOS, R2L, U2R, and PROBE)

    Towards More Understanding of the Financial Leverage Controversy The Evidence of the Industrial Firms at Amman Stock Exchange

    Get PDF
    The study objects for investigating the most important internal determinants of financial leverage of the listed industrial firms at Amman Stock Exchange (ASE). It is a cross sectional study that it used the issued data of the total listed industrial firms at ASE, where the total number of these firms till the end of 2015 is 48. Seven independent variables the study takes into consideration including firms' size, liquidity, profitability, assets tangibility, earnings volatility, growth opportunities, and non-debt tax shield. Descriptive statistics, and simple and multiple linear regression methods are used in hypotheses testing. The study shows that liquidity, profitability, tangibility, each of which, have a significant impact on earnings volatility, where other independent variables that the study took into consideration, have no impact.   Keywords: Financial Leverage, Capital Structure, Assets tangibility, non-debt tax shield, earnings volatility, and Return on Assets JEL Classifications: G32, M4

    Optimal spectrum utilisation in cognitive network using combined spectrum sharing approach: overlay, underlay and trading

    Get PDF
    Cognitive radio technology enables unlicensed users (secondary users, SUs) to access the unused spectrum. In the literature, there are three spectrum sharing paradigms that enable SUs to access the licensed spectrum. These access techniques include underlay, overlay and spectrum trading, and have their own drawbacks. To combat these drawbacks, we propose a new approach for each of them and merge them into one combined system. Our overlay scheme provides quick access to the unused spectrum. We propose a new cooperative sensing protocol to reduce the likelihood of interfering with PUs. In order to enable SUs for transmitting simultaneously with PUs, we suggest using our underlay scheme. Our trading scheme allows PUs to trade the unused spectrum for the SUs that require better quality of service. The new combined scheme increases the size of spectrum in the cognitive network. Simulation results show the ability of the new scheme to serve extra traffic

    Causes of death and survival analysis for patients with retinoblastoma in Jordan

    Get PDF
    PurposeTo analyze causes and prognostic factors for death among Retinoblastoma (Rb) patients treated at a single specialized tertiary cancer center in Jordan.MethodsWe reviewed the mortality causes for all Rb patients who have been treated at the King Hussein Cancer Center between 2003 and 2019 and were followed for at least 3 years after diagnosis. The main outcome measures included demographics, laterality, tumor stage, treatment modalities, metastasis, survival, and causes of death.ResultsTwenty-four (5%) of the 478 patients died from retinoblastoma and 5-year survival was 94%. The mean age at diagnosis was 15 months (median, 18 months; range, 4–38 months); eight (33%) received diagnoses within the first year of life. Eleven (46%) were boys, 16 (67%) had bilateral disease, and 3 (13%) had a positive family history. The stage for the worst eye was C for 1 (4%) patient, D in 6 (25%) patients, and E (T3) in 15 (63%) patients. Two patients had extraocular Rb at diagnosis, and four of the patients who had intraocular Rb at diagnosis refused treatment and then came back with extraocular Rb. In total, extraocular disease was encountered in six eyes (six patients). After a 120-month median follow-up period, 24 patients (5%) died of second neoplasms (n = 3) or metastases (n = 21). Significant predictive factors for metastasis and death included advanced IIRC tumor stage (p < 0.0001), the presence of high-risk pathological features in the enucleated eyes (p = 0.013), parental refusal of the recommended primary treatment plan (p < 0.0001), and extraocular extension (p < 0.0001).ConclusionThe 5-year survival rates of Rb patients in Jordan are as high as those in high-income countries. However, 5% are still dying from metastatic disease, prompting the need for awareness campaigns to educate the public about the high cure rates and to prevent treatment abandonment
    • …
    corecore