scholarly journals تطبيقات الهاتف النقال في العملية التعليمية ومعيقات استخدامها في الأردن : دراسة ميدانية بالمدارس الحكومية = Mobile Phone Applications in the Educational Process and Their Usage Obstacles in Jordan : A Field Study in Public Schools

2017 ◽  
pp. 1-24
Author(s):  
تيسير اندراوس سليم
Author(s):  
Mahasin Gad Alla Mohamed

A systematic random sample of (110) college students (female) aged (18-22) year old, and (15) faculty staff members at the College of Education-female section, Jazan University, was chosen. The study conducted in the academic year (2018). Questionnaire and interviews were used for collecting data. The study sample were asked to express their attitudes towards the usage of mobile phone applications in education. All data were analyzed with the SPSS personal computer program. Appropriate statistics for description (frequencies, percentage, means, standard deviations, and Chi2) were used. The results showed that calculated Chi2 value is bigger than the value of Chi2 derived from statistical tables. Thus, the null hypotheses (H0) rejected. Rejection of the null hypotheses indicates that the difference is significant in favor of the usage of mobile phone applications in the educational process.


2020 ◽  
Vol 2020 ◽  
pp. 1483-1484
Author(s):  
Masoumeh Hosseinpour ◽  
◽  
Ralf Terlutter ◽  
Holger Roschk

2017 ◽  
Vol 8 (1) ◽  
pp. 1-10
Author(s):  
Is Mardianto ◽  
Kuswandi Kuswandi

Security issues have become a major issue on the Internet. One of the security methods that are widely used today is to implement a digital certificate. Digital certificates have evolved over time, one of which is the X.509 digital certificate. Digital certificates have been widely used as authentication applications, web network authentication and other authentication systems that require digital certificates. This research is carried out by implementing an X.509 digital certificate technology as a mobile web service with its client. Secure Hash Algorithm (SHA), Diffie-Hellman, and Advanced Encryption Standard (AES) are used to secure the data exchange transaction between the web service and mobile phone. SHA algorithm will be used for user authentication, Diffie-Hellman algorithm will be used for public key exchange and AES algorithms will be used for symmetric cryptography data. The results of the application of digital certificates, the SHA algorithm, Diffie-Hellman, and AES in mobile phone applications, provide security application running on web service. Index Terms—Digital Certificate, X.509, SHA, Diffie Hellman, AES


2006 ◽  
Vol 23 (1) ◽  
pp. 35-51 ◽  
Author(s):  
Nor Shahriza Abdul Karim ◽  
Siti Hawa Darus ◽  
Ramlah Hussin

Sign in / Sign up

Export Citation Format

Share Document