Users Online: 146
Home
About us
Editorial board
Search
Ahead of print
Current issue
Archives
Submit article
Instructions
Subscribe
Contacts
Login
Export selected to
Endnote
Reference Manager
Procite
Medlars Format
RefWorks Format
BibTex Format
Table of Contents
January-June 2016
Volume 1 | Issue 1
Page Nos. 1-41
Online since Friday, October 7, 2016
Accessed 51,416 times.
PDF access policy
Journal allows immediate open access to content in HTML + PDF
View issue as eBook
Author Institution Mapping
Issue statistics
RSS
Show all abstracts
Show selected abstracts
Export selected to
Add to my list
EDITORIAL
Promoting research in applied sciences in Saudi Arabia
p. 1
Khalid Bin Abdulrahman
[HTML Full text]
[PDF]
[Mobile Full text]
[EPub]
[Sword Plugin for Repository]
Beta
REVIEW ARTICLES
Protecting the content through learning object metadata
p. 3
Shaina Raza, Syed Raza Bashir
The web is full of numerous educational resources but they are not being properly used by the educators. There is so much pedagogical content available on the open web that is being ignored. A lot of learning initiatives stepped in to propose recommendations and guidelines to ensure interoperability of digital content. This has led to the development of learning objects repository (LOR) whose goals are interoperability, reuse, sharing, and retrieval of learning content. However, at the same time, the reproduction of learning material should not breach the copyright protection of the right holders as it is an act of cybercrime. In the lifecycle of LOR development, learning objects (LOs) are annotated using metadata descriptors to specify their syntax and semantics. This annotation process has led to the development of learning objects metadata (LOM) whose ultimate goals are to make searching and cataloging of LOs an easier task. LOM standard includes a number of sections, one of which is the “Rights” category which takes care of intellectual property rights and terms for the use of an LO. This paper presents the idea that how learning resources are annotated using LOM standard and how this annotation contributes to anti-cybercrime in formal education. More specifically, the paper tells that the “Rights” category and some related elements that work together for the provision of protection to the content holders. The paper also suggests that there should be some standardized mechanism for the automatic annotation of LOs so as to give copyright protection on permanent basis.
[ABSTRACT]
[HTML Full text]
[PDF]
[Mobile Full text]
[EPub]
[Sword Plugin for Repository]
Beta
A comparative analysis of cybercrime and cyberlaws in Islamic Republic of Pakistan, Kingdom of Saudi Arabia, and the United Arab Emirates
p. 9
Muhammad Bakhsh, Amjad Mahmood, Israr Iqbal Awan
The usage of web applications especially social media is increasing day by day. Moreover, the usage of information and communication technology applications both in public and private sector is the need of the hour since the usage of these applications has improved working efficiency. On the other side, excessive use of computer networks and its applications has augmented the issues of cybercrime, and there exist cyberlaws to deal these crimes but in developing countries, these laws are not matured. Furthermore, cyberlaws have been developed in almost every developed and developing country, but their implementation is weak, especially in Southeast Asia and the Middle East due to law unawareness in the masses. An attempt has been made in this paper to analyze the cybercrimes and cyberlaws, a part from the review of these laws in accordance with Pakistan and gulf countries.
[ABSTRACT]
[HTML Full text]
[PDF]
[Mobile Full text]
[EPub]
[Sword Plugin for Repository]
Beta
ORIGINAL ARTICLES
Do people intend to purchase using their smartphone apps? The effect of the privacy concerns among Malaysian buyers
p. 16
Zakariya Belkhamza
Introduction:
The rise of e commerce and m commerce has brought to intention the privacy concern among mobile buyers, and studies showed that it is an important factor of attitude and intention to buy products or services through smartphones.
Objective:
The objective of this paper is to investigate the issue of privacy concerns on the purchasing intention among the Malaysian buyers. This was performed by investigating the relationship between the privacy concerns and the intention to purchase using smartphone apps. Methodology: This study gathered data from individual consumers aged between 20 and 40 years old since these consumers have the capability to acquire not just free apps but also paid apps along with better experience in using smartphones. Respondents must also have experienced purchasing and installing smartphone apps through app stores or repositories such as Google Play Store and Apple Store. The research uses nonprobability convenience sampling and snowball sampling as it has been widely used by researchers and academicians in the past with regard to investigating consumer behaviors on e commerce related issues
Results:
The paper provides significant insights on the issue of privacy concern in the usage of smartphone apps stores which can help the developers such as Google and Apple to improve their apps stores to provide better protection for the users' privacy and security in Malaysia.
[ABSTRACT]
[HTML Full text]
[PDF]
[Mobile Full text]
[EPub]
[Sword Plugin for Repository]
Beta
Cyber security in civil aviation
p. 23
Adrie Stander, Jacques Ophoff
Introduction:
A number of recent claims in the media suggest it is possible to hack into avionics systems and control aircraft from a distance. While cyber security is not seen as a critical issue in aviation at the moment, it is likely to become much more important in the future through the accelerated adoption of information technologies in aviation.
Objective:
This study aims to determine if there are grounds for such claims. The aim of this paper is not to show how to compromise the information systems of an aircraft, but to indicate that this is not impossible and that vulnerabilities exist.
Methodology:
Since experimental work in this area is difficult, for obvious reasons, an extensive literature survey was conducted in order to find material related to the subject. Most of the material found is of a theoretical nature and even where possible vulnerabilities were identified it is difficult to show that it could be exploited in real life.
Results:
The study has found that steps are taken by aircraft manufacturers and controlling bodies to prevent the occurrence of such incidents. However, possible vulnerabilities exist and coordinated action is needed by the aviation industry as a whole, to determine and eradicate such vulnerabilities. Vulnerabilities are likely to increase with the move towards fly-by-wire aircraft.
[ABSTRACT]
[HTML Full text]
[PDF]
[Mobile Full text]
[EPub]
[Sword Plugin for Repository]
Beta
Cyber insecurity as a manifestation of new form of global urban vulnerability
p. 27
Aliyu Salisu Barau
Introduction:
As unprecedented urbanization continues to unfold; cities increasingly depend on the expanding internet of things (IoT). Cyber-attacks and insecurity are the emerging challenges that remain least investigated.
Methods:
To address this challenge, an online survey was conducted to gain insights from experts resident in 32 cities from Europe, North and South America, Africa, Asia, and Australia. The issues covered in the survey include types of devices for accessing the internet, time spent accessing the internet, extent of city dependency on IoT, feeling about cyber-attack threats, services most vulnerable to cyber-attacks.
Results:
The study concludes that vulnerability of urban population to cyber-attacks is inevitable at present. As more people and cities are connected to digital devices the more, they comprise their privacy and security. Unlike conventional urban vulnerability, the knowledge of managing cyber vulnerability is limited to a few individuals and corporations.
Conclusion:
To promote the culture of cyber-attack resilience, people need to understand the basic ideas behind malware (viruses, worms, and trojans) and cryptography.
[ABSTRACT]
[HTML Full text]
[PDF]
[Mobile Full text]
[EPub]
[Sword Plugin for Repository]
Beta
Ambulance response time to cardiac emergencies in Riyadh
p. 33
Khalid Alnemer, Khalid I Al-Qumaizi, Ahmed Alnemer, Ammar Alsayegh, Alwaleed Alqahtani, Yasser Alrefaie, Mohammed Alkhalifa, Ahmed Alhariri
Background:
Ambulance response time (ART) plays a significant role in patient survival, especially in cardiac emergencies; qualifying as the crucial factor to measure the quality of prehospital emergency care. Thus, this retrospective, cross-sectional study aimed to measure the ART to public cardiac emergencies and to analyze its association with patient survival in Riyadh.
Methods:
Records of cardiac emergency medical services from the Saudi Red Crescent Authority for 1 year (January 1, 2013–December 31, 2013) in Riyadh were requisitioned. ART was calculated for 18 stations across Riyadh and assessed for confounding factors such as time (day of the week and time of the day), age, gender, and location of the incident.
Results:
The mean ART was approximately 13 min, with a trend toward prolongation during working hours on weekdays. ART and survival were unaffected by gender and location of the incident but was confounded by the age of the patient (
P
= 0.001).
Conclusions/Recommendations:
ART was much longer than the defined international standard of 8 min and comparable to other regions of the world. We recommend the use of motorcycles to transport paramedics to the emergency site, air ambulance, and dedicated ambulance lanes to reduce ART.
[ABSTRACT]
[HTML Full text]
[PDF]
[Mobile Full text]
[EPub]
[Sword Plugin for Repository]
Beta
CASE REPORT
Clinical relevance of hypothyroidism screening in a child with an unexplained elevated serum creatinine
p. 39
Mosleh Jabari, Hassan Alshehri
The association of hypothyroidism with a reduction in glomerular filtration rate and renal plasma flow is widely mentioned in the literature. However, elevation of serum creatinine (SCr) is not frequently described in the textbooks and literature as an indicator of hypothyroidism. Here, we present a 6-year-old girl who had deprived the energy for vigorous physical activity and reported fatigue to perform her daily activities with no other history of significant medical conditions with unremarkable physical examination. All her initial laboratory findings were within the normal range except an increased SCr level (75 μmol/L). The presence of nonspecific symptoms and unexplained elevation of SCr led to endocrinological investigations, which revealed hypothyroidism caused by autoimmune thyroiditis. Replacement therapy with thyroxine improved her hypothyroid state and SCr level to normal after 6 weeks. Therefore, we recommend measurement of thyroid function in these patients to rule out the likelihood of hypothyroidism.
[ABSTRACT]
[HTML Full text]
[PDF]
[Mobile Full text]
[EPub]
[Sword Plugin for Repository]
Beta
Feedback
Subscribe
Next Issue
Previous Issue
Sitemap
|
What's New
|
Feedback
|
Disclaimer
|
Privacy Notice
© Imam Journal of Applied Sciences | Published by Wolters Kluwer -
Medknow
Online since 15 October, 2011