Search Results Heading

MBRLSearchResults

mbrl.module.common.modules.added.book.to.shelf
Title added to your shelf!
View what I already have on My Shelf.
Oops! Something went wrong.
Oops! Something went wrong.
While trying to add the title to your shelf something went wrong :( Kindly try again later!
Are you sure you want to remove the book from the shelf?
Oops! Something went wrong.
Oops! Something went wrong.
While trying to remove the title from your shelf something went wrong :( Kindly try again later!
    Done
    Filters
    Reset
  • Language
      Language
      Clear All
      Language
  • Subject
      Subject
      Clear All
      Subject
  • Item Type
      Item Type
      Clear All
      Item Type
  • Discipline
      Discipline
      Clear All
      Discipline
  • Year
      Year
      Clear All
      From:
      -
      To:
  • More Filters
221 result(s) for "Algarni, Abdullah"
Sort by:
What Message Characteristics Make Social Engineering Successful on Facebook: The Role of Central Route, Peripheral Route, and Perceived Risk
Past research suggests that the human ability to detect social engineering deception is very limited, and it is even more limited in the virtual environment of social networking sites (SNS) such as Facebook. At the organizational level, research suggests that social engineers could succeed even among those organizations that identify themselves as being aware of social engineering techniques. This may be partly due to the complexity of human behaviors in failing to recognize social engineering tricks in SNSs. Due to the vital role that persuasion and perception play on users’ decision to accept or reject social engineering tricks, this paper aims to investigate the impact of message characteristics on users’ susceptibility to social engineering victimization on Facebook. In doing so, we investigate the role of the central route of persuasion, peripheral route of persuasion, and perceived risk on susceptibility to social engineering on Facebook. In addition, we investigate the mediation effects between the explored factors, and whether there is any relationship between the effectiveness of them and users’ demographics.
The hidden influence: Medical students’ knowledge and attitude of conflict of interest–A cross-sectional study in Jeddah, Saudi Arabia
Conflicts of interest (COI) pose ethical challenges in medical education and clinical practice, potentially influencing decision-making. While COI policies and education vary globally, inconsistent training leaves medical students vulnerable to industry influence. In Saudi Arabia, COI education remains underexplored. This study assesses medical students' knowledge, attitudes, and exposure to COI, aiming to identify gaps and inform educational improvements. A cross-sectional study was conducted among 392 medical students from multiple universities in Jeddah, Saudi Arabia. A validated questionnaire was administered to assess COI knowledge, attitudes, and exposure to industry interactions. Data were analyzed using IBM SPSS 29.0, with statistical significance set at p < 0.05. A total of 392 participants were included. Overall, 71.4% of students were able to define COI, while 28.6% lacked awareness. Clinical students had significantly higher knowledge scores than preclinical students (p = 0.001). Grade Point Average (GPA) was significantly associated with attitudes toward COI, with students who had excellent GPAs scoring the highest (p < 0.001). No significant differences were observed in knowledge or attitude scores based on gender, research experience, and university affiliation. Over half of the students (52.6%) felt inadequately educated about COI, and 48.5% had never attended a COI lecture. Clinical students (65.2%) reported more interactions with pharmaceutical representatives than preclinical students (34.8%). While medical students generally recognize COI, gaps in knowledge and formal education persist. Clinical exposure appears to enhance knowledge, yet inconsistent education leaves students vulnerable to industry influence. Strengthening COI education within medical curricula is essential to promote ethical decision-making and uphold professional integrity.
Cybersecurity for Analyzing Artificial Intelligence (AI)-Based Assistive Technology and Systems in Digital Health
Assistive technology (AT) is increasingly utilized across various sectors, including digital healthcare and sports education. E-learning plays a vital role in enabling students with special needs, particularly those in remote areas, to access education. However, as the adoption of AI-based AT systems expands, the associated cybersecurity challenges also grow. This study aims to examine the impact of AI-driven assistive technologies on cybersecurity in digital healthcare applications, with a focus on the potential vulnerabilities these technologies present. Methods: The proposed model focuses on enhancing AI-based AT through the implementation of emerging technologies used for security, risk management strategies, and a robust assessment framework. With these improvements, the AI-based Internet of Things (IoT) plays major roles within the AT. This model addresses the identification and mitigation of cybersecurity risks in AI-based systems, specifically in the context of digital healthcare applications. Results: The findings indicate that the application of the AI-based risk and resilience assessment framework significantly improves the security of AT systems, specifically those supporting e-learning for blind users. The model demonstrated measurable improvements in the robustness of cybersecurity in digital health, particularly in reducing cyber risks for AT users involved in e-learning environments. Conclusions: The proposed model provides a comprehensive approach to securing AI-based AT in digital healthcare applications. By improving the resilience of assistive systems, it minimizes cybersecurity risks for users, specifically blind individuals, and enhances the effectiveness of e-learning in sports education.
The Historical Relationship between the Software Vulnerability Lifecycle and Vulnerability Markets: Security and Economic Risks
Vulnerability lifecycles and the vulnerability markets are related in a manner that can lead to serious security and economic risks, especially regarding black markets. In the current era, this is a relationship that requires careful scrutiny from society as a whole. Therefore, in this study, we analyzed the actual data relating to vulnerability-regulated markets in the case of two well-known browsers, Firefox and Chrome. Our analysis shows that financial reward is the main motivation for most discoverers, whose numbers are increasing every year. In addition, we studied the correlation between vulnerability markets and the vulnerability lifecycle from many perspectives, including theoretical concepts, and statistical approaches. Furthermore, we discussed the potential risks for people and organizations in terms of security and economics. We believe that money is the main motivation in vulnerability markets and that the latter are, in turn, the main driver of the vulnerability lifecycle, which presents several risks to the software industry and to society itself. Thus, in our opinion, if vulnerability markets can be controlled, the vulnerability lifecycle will be reduced or eliminated, along with its associated risks.
Quantitative Assessment of Cybersecurity Risks for Mitigating Data Breaches in Business Systems
The evaluation of data breaches and cybersecurity risks has not yet been formally addressed in modern business systems. There has been a tremendous increase in the generation, usage and consumption of industrial and business data as a result of smart and computational intensive software systems. This has resulted in an increase in the attack surface of these cyber systems. Consequently, there has been a consequent increase in the associated cybersecurity risks. However, no significant studies have been conducted that examine, compare, and evaluate the approaches used by the risk calculators to investigate the data breaches. The development of an efficient cybersecurity solution allows us to mitigate the data breaches threatened by the cybersecurity risks such as cyber-attacks against database storage, processing and management. In this paper, we develop a comprehensive, formal model that estimates the two components of security risks: breach cost and the likelihood of a data breach within 12 months. The data used in this model are taken from the industrial business report, which provides the necessary information collected and the calculators developed by the major organizations in the field. This model integrated with the cybersecurity solution uses consolidated factors that have a significant impact on the data breach risk. We propose mathematical models of how the factors impact the cost and the likelihood. These models allow us to conclude that results obtained through the models mitigate the data breaches in the potential and future business system dynamically.
A Multiband Shared Aperture MIMO Antenna for Millimeter-Wave and Sub-6GHz 5G Applications
A shared aperture 2-element multiple-input-multiple-output (MIMO) antenna design for 5G standards is presented in this study, one which uses the same radiating structure to cover both the sub-6GHz and millimeter-wave (millimeter-wave) bands. The proposed antenna comprises four concentric pentagonal slots that are uniformly separated from one another. For the sub-6GHz band, the antenna is excited by a single open-end microstrip transmission-line, while a 1 × 8 power divider (PD) connected via a T-junction structure excites the millimeter-wave band. Both the sub-6GHz and mm-wave antennas operate in a MIMO configuration. The proposed antenna design was fabricated on a 120 × 60 mm2 substrate with an edge-to-edge distance of 49 mm. The proposed sub-6GHz antenna covers the following frequency bands: 4–4.5 GHz, 3.1–3.8 GHz, 2.48–2.9 GHz, 1.82–2.14 GHz, and 1.4–1.58 GHz, while the millimeter-wave antenna operates at 28 GHz with at least 500 MHz of bandwidth. A complete antenna analysis is provided via a step-by-step design procedure, an equivalent circuit diagram showing the operation of the shared aperture antenna, and current density analysis at both millimeter-wave and sub-6GHz bands. The proposed antenna design is also characterized in terms of MIMO performance metrics with a good MIMO operation with maximum envelop correlation coefficient value of 0.113. The maximum measured gain and efficiency values obtained were 91% and 8.5 dBi over the entire band of operation. The antenna is backward compatible with 4G bands and also encompasses the sub-6GHz and 28 GHz bands for future 5G wireless communcation systems.
Optically Transparent Antennas: A Review of the State-of-the-Art, Innovative Solutions and Future Trends
The requirement of mounting several access points and base stations is increasing tremendously due to recent advancements and the need for high-data-rate communication services of 5G and 6G wireless communication systems. In the near future, the enormous number of these access points might cause a mess. In such cases, an optically transparent antenna (OTA) is the best option for making the environment more appealing and pleasant. OTAs provide the possible solution as these maintain the device aesthetics to achieve transparency as well as fulfill the basic coverage and bandwidth requirements. Various attempts have been made to design OTAs to provide coverage for wireless communication, particularly for the dead zones. These antennas can be installed on building windows, car windscreens, towers, trees, and smart windows, which enables network access for vehicles and people passing by those locations. Several transparent materials and techniques are used for transparent antenna design. Thin-film and mesh-grid techniques are very popular to transform metallic parts of the antenna into a transparent material. In this article, a comprehensive review of both the techniques used for the design of OTAs is presented. The performance comparison of OTAs on the basis of bandwidth, gain, transparency, transmittance, and efficiency is also presented. An OTA is the best choice in these situations to improve the aesthetics and comfort of the surroundings with high antenna performance.
Miniaturized Folded-Slot CubeSat MIMO Antenna Design with Pattern Diversity
In this paper, a folded slot-based multiple-input–multiple-output (MIMO) antenna design for Cube Satellite (CubeSat) applications is presented for the ultra-high frequency (UHF) band. A unique combination of a reactively loaded meandered slot with a folded structure is presented to achieve the antenna’s miniaturization. The proposed antenna is able to operate over a wide frequency band from 430~510 MHz. Moreover, pattern diversity is achieved by the antenna’s element placement, resulting in good MIMO diversity performance. The four elements are placed on one Unit (1U) for CubeSat dimensions of 100 mm × 100 mm × 100 mm. The miniaturized antenna design with pattern diversity over a wide operating band is well suited for small satellite applications, particularly CubeSats in the UHF band.
Trends of opioids consumption for cancer patients treated by the palliative care department at the last week of life in a tertiary care center
Background Pain is one of the most distressing symptoms for cancer patients. It remains a public health problem, and there is a need for better pain management at the societal level. Objectives The purpose of this study is to characterize the opioid dosages and its type administered to adult cancer patients during their last week of life and to investigate the factors that may have contributed to it by the palliative care team at King Abdulaziz Medical City in Riyadh, Saudi Arabia. Methods A retrospective cross-sectional study was performed at the King Abdulaziz Medical City (KAMC), utilizing charts of adult cancer patients admitted to palliative care. We studied the use of opioids in the last week of the patient’s life (day 7 before patient’s death and day 1 before patient’s death). We studied all cancer patients who were admitted to the palliative care department at KAMC and died in the hospital from 1/1/2022 to 1/1/2023 (one year). Results The study included 178 patients who met the inclusion and exclusion criteria. Of our sample, 47.2% were male and 52.8% were female. The average age at death was 67.82(± 14.03) years. The average length of last admission to palliative care department was 22.25(± 14.25) days. The most frequent tumor types were gastrointestinal cancers (30.9%), then pancreatic cancers (12.9%), breast cancers and hepatocellular cancers (10.1% for each one of them). Morphine was the most common opioid prescribed at 32.0% 7-days prior to death and increasing to 37.6% 1-day prior to death. Hydromorphone was second most common opioid prescribed, at 17.4% 7-days prior to death and increasing to 24.2% 1-day prior to death. Using a morphine to hydromorphone conversion ratio of 5:1, the mean opioid equivalent to oral morphine 7 days prior to death was 32.01 mg, and on the day prior to death it was 27.78 mg. Conclusion Our study showed that the use of opioids in palliative inpatient care is common in Saudi Arabia, with morphine and hydromorphone being the most commonly used opioids. Our study results emphasize the need for an individualized approach to palliative care, considering patient-specific factors such as comorbidities and pain management.
A Compact Sub-GHz Wide Tunable Antenna Design for IoT Applications
This work presents a compact meandered loop slot-line 5G antenna for Internet of Things (IoT) applications. Recently, sub-gigahertz (sub-GHz) IoT technology is widely spreading. It enables long-range communications with low power consumption. The proposed antenna structure is optimized to operate at sub-GHz bands without any additional complex biasing circuitry or antenna structure. A miniaturized design was achieved by a meandered structured loop slot-line that is loaded reactively with a varactor diode. Wideband frequency reconfigurability (FR) was achieved by the use of the varactor diode. The proposed antenna resonates over the frequency band of 758–1034 MHz with a minimum bandwidth of 17 MHz over the entire frequency band. The RO4350 substrate with dimensions of 0.18λg × 0.13λg mm2 is used to design the proposed antenna design. The efficiency and gain values varied from 54–67% and 0.86–1.8 dBi. Compact planar structure, narrow-band operation (suitable for NB-IoT) and simple biasing circuitry, which allows for sub-GHz operation, are unique and attractive features of the design.