Yehia Ibrahim Alzoubi

ORCID: 0000-0003-4329-4072
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Software Engineering Techniques and Practices
  • IoT and Edge/Fog Computing
  • Blockchain Technology Applications and Security
  • Organizational and Employee Performance
  • Software Engineering Research
  • Collaboration in agile enterprises
  • Software System Performance and Reliability
  • Job Satisfaction and Organizational Behavior
  • Cloud Data Security Solutions
  • Network Security and Intrusion Detection
  • Information and Cyber Security
  • Islamic Finance and Banking Studies
  • Technology Adoption and User Behaviour
  • Smart Cities and Technologies
  • Privacy-Preserving Technologies in Data
  • Service-Oriented Architecture and Web Services
  • Caching and Content Delivery
  • Digital Transformation in Industry
  • Socioeconomic Development in MENA
  • Outsourcing and Supply Chain Management
  • Mobile Crowdsensing and Crowdsourcing
  • Software Reliability and Analysis Research
  • Employee Performance and Management
  • AI in Service Interactions
  • Green IT and Sustainability

American University of the Middle East
2020-2024

Norwegian University of Science and Technology
2024

College of Business Administration
2023

Universiti Malaysia Pahang Al-Sultan Abdullah
2023

University of Technology Sydney
2014-2018

University of Technology
2017

In recent years, blockchain technology has seen significant growth and widespread adoption in various industries. However, one major drawback of investments is their substantial energy consumption, which negative impacts on both the economy environment. The main cause concern generation atmospheric carbon emissions resulting from excessive usage. This research study aims to identify networks systems that assert themselves as environmentally friendly determine them produces least amount...

10.1016/j.jclepro.2023.139541 article EN cc-by Journal of Cleaner Production 2023-11-09

Recently, the widespread adoption of artificial intelligence, particularly generative AI technology, has surged across various industries. However, a notable drawback this technology is its significant energy consumption during model training and operation, which poses challenges to sustainability goals environment. Consequently, initiatives have emerged promote what termed "green intelligence," aiming mitigate these environmental impacts. Nevertheless, research discussing remains scarce....

10.1016/j.jclepro.2024.143090 article EN cc-by Journal of Cleaner Production 2024-07-06

Abstract Fog nodes are implemented near to end‐users Internet of Things (IoT) devices, which mitigate the impact low latency, location awareness, and geographic distribution unsupported features many IoT applications. Moreover, computing decreases data offload into Cloud, response time. Despite these benefits, faces challenges in meeting security privacy requirements. These occur due limitations resources. In fact, may add new issues. Although papers have discussed issues recently, most at a...

10.1002/spy2.145 article EN Security and Privacy 2020-12-30

Cybersecurity is a critical issue that must be prioritized not just by enterprises of all kinds, but also national security. To safeguard an organization's cyberenvironments, information, and communication technologies, many are investing substantially in cybersecurity these days. One part the cyberdefense mechanism building enterprises' security policies library, for consistent implementation controls. Significant common various compared explored this study to provide robust comprehensive...

10.3390/s22020538 article EN cc-by Sensors 2022-01-11

The Internet of things model enables a world in which all our everyday devices can be integrated and communicate with each other their surroundings to gather share data simplify task implementation. Such an environment would require seamless authentication, protection, stability, attack resistance, ease deployment, self-maintenance, among things. Blockchain, technology that was born the cryptocurrency Bitcoin, may fulfill requirements. However, due characteristics both Blockchain technology,...

10.3390/fi14070216 article EN cc-by Future Internet 2022-07-21

Abstract The use of agile methodology has become widespread in organizations that previously relied on traditional or structured software development methods, such as the waterfall approach. Successful completion rates for initiatives are at 40%, whereas only 15% projects were successfully completed. To take advantage benefits each method, many using a hybrid approach combines Agile with Waterfall and methodologies. Rather than asking which is superior, it more productive to determine one...

10.1007/s13198-023-01958-5 article EN cc-by International Journal of Systems Assurance Engineering and Management 2023-06-12

The study aims to capture links between the use of encrypted communication channel -Telegram and lone wolf attacks occurred in Europe 2015-2016. To understand threads ISIS on Telegram we used digital ethnography approach which consists self-observation information flows four ISIS’s most celebrated telegram Channels. We draw public sphere theory coined term terror socio-sphere 3.0 as theoretical background this study. collected data is presented screenshots a visual evidence threads. This...

10.5038/1944-0472.10.3.1604 article EN cc-by-nc Journal of Strategic Security 2017-10-01

Agile software development performance depends on active communication. Active communication is an arduous task when agile teams are geographically distributed. enterprise architecture was reported to enhance such and performance. There little empirical evidence how can of distributed development. This paper contributes this research gap by empirically examining the relationships between architecture, communication, (on-time completion, on-budget functionality, quality). Using a quantitative...

10.1109/access.2020.2990389 article EN cc-by IEEE Access 2020-01-01

<span lang="EN-US">Due to the expansion growth of IoT devices, Fog computing was proposed enhance low latency applications and meet distribution nature these devices. However, criticized for several privacy security vulnerabilities. This paper aims identify discuss challenges computing. It also discusses blockchain technology as a complementary mechanism associated with mitigate impact issues. The findings this reveal that can requirements fog computing; however, there are limitations...

10.11591/ijece.v11i6.pp5081-5088 article EN International Journal of Power Electronics and Drive Systems/International Journal of Electrical and Computer Engineering 2021-08-16

Purpose Several organizations decided to work remotely after the Indian Government proclaimed a state of emergency on March 24, 2020, prevent spread COVID-19. Employees across all industries, particularly Generation-Y, were stressed as result COVID-19 outbreak. The purpose this study is fills that gap by looking at effects occupational stress factors (such coworker support, work–life balance [WLB] and role expectation conflict) Generation-Y employees in educational sector during...

10.1108/ict-03-2022-0017 article EN Industrial and Commercial Training 2023-01-10

Identifying the appropriate stakeholder is an integral part of requirements engineering process and primary factor influencing system success. The E-learning a significant platform with variety stakeholders that must be identified. After launch system, issues such as identifying arise threaten system's continuity. Moreover, use non-scientific incompatible methods for stakeholders, well limitations some these methods, are among other highlighted in this research. This study investigates issue...

10.1016/j.jksus.2023.102566 article EN cc-by Journal of King Saud University - Science 2023-01-18

The growth in textual data associated with the increased usage of online services and simplicity having access to these has resulted a rise number text classification research papers. Text significant influence on several domains such as news categorization, detection spam content, sentiment analysis. Turkish is focus this work since only few studies have been conducted context. We utilize obtained from customers’ inquiries that come an institution evaluate proposed techniques. Classes are...

10.3390/app13169428 article EN cc-by Applied Sciences 2023-08-19

In the current information era, knowledge can pose risks in online realm. It is imperative to proactively recognize potential threats, as unforeseen dangers cannot be eliminated entirely. Often, malware exploits and other emerging hazards are only identified after they have occurred. These types of referred zero-day attacks since no pre-existing anti-malware measures available mitigate them. Consequently, significant damages occur when vulnerabilities systems exploited. The effectiveness...

10.3390/electronics12173554 article EN Electronics 2023-08-23

Recognizing aircraft automatically by using satellite images has different applications in both the civil and military sectors. However, due to complexity variety of foreground background analyzed images, it remains challenging obtain a suitable representation for identification. Many studies solutions have been presented literature, but only few suggested handling issue semantic image segmentation techniques lack publicly labeled datasets. With advancement CNNs, researchers some CNN...

10.3390/app14062639 article EN cc-by Applied Sciences 2024-03-21

Software architecture forms the cornerstone for achieving and ensuring various software quality attributes. It encompasses collected requirements of product, serving as a blueprint that delineates features all project stakeholders, along with methods measurement control. Despite significant increase in IoT-based agricultural systems, there is dearth studies on elements their architecture. To address this need, study offers an overview components services tailored to specific attributes...

10.1016/j.atech.2024.100523 article EN cc-by Smart Agricultural Technology 2024-08-01

Summary Data privacy is critical for users who want to use Cloud storage services. There a significant focus on service providers address this need. However, in the evolving dynamic cyber‐space, infractions are rising and pose threats infrastructures. Several studies developed various models techniques ensure of contents. these came with several shortages privacy‐preserving attributes they cover. Thus, article identified comprehensive set data propose flexible efficient framework handle...

10.1002/cpe.7831 article EN cc-by-nc Concurrency and Computation Practice and Experience 2023-06-22

Purpose This paper aims to discuss a novel artificial intelligence (AI) model known as Generative Pretrained Transformer (GPT), specifically ChatGPT, and its potential applications in the corporate sphere. It highlights significance of ChatGPT realms innovation, management policymaking. Design/methodology/approach is explained an AI language produced by OpenAI, using GPT framework extensive training on natural data. addresses model’s capabilities respond queries resembling human interactions...

10.1108/jstpm-10-2023-0173 article EN Journal of Science and Technology Policy Management 2025-02-12

10.1142/s0218194025500159 article EN International Journal of Software Engineering and Knowledge Engineering 2025-02-28
Coming Soon ...