Krassie Petrova | Auckland University of Technology (original) (raw)

Papers by Krassie Petrova

Research paper thumbnail of The International HETL Review

George Siemens and Stephen Downes developed a theory for the digital age, called connectivism, de... more George Siemens and Stephen Downes developed a theory for the digital age, called connectivism, denouncing boundaries of behaviorism, cognitivism, and constructivism. Their proposed learning theory has issued a debate over whether it is a learning theory or instructional theory or merely a pedagogical view. While the theory presented is important and valid, is it a tool to be used in the learning process for instruction or curriculum rather than a standalone learning theory? It has forced educators to look at what is being done in digital education and rethink, debate, and philosophize over how each part fits. Continually evaluating how each new generation learns with regard to instruction and curriculum serves to hold education to high standards. Certainly this theory is worth our thorough consideration.

Research paper thumbnail of SMS Banking

Innovative Mobile Platform Developments for Electronic Services Design and Delivery

Research paper thumbnail of Guest editorial: Hybrid, blended and mixed-mode learning quality: more lessons learned in the COVID pandemic and beyond

Quality Assurance in Education

Research paper thumbnail of Teaching Advanced Computer Networking

IGI Global eBooks, May 25, 2011

This chapter reports on the authors' experiences of using miniproject-based learning (MPBL) as a ... more This chapter reports on the authors' experiences of using miniproject-based learning (MPBL) as a key pedagogical method for teaching advanced computer networks within the context of a Master's course in Net-centric computing at the Auckland University of Technology (AUT). A two-threaded delivery approach was adopted that comprised an MPBL thread and a lecture thread. The MPBL thread within the course allows the students to gain practical experience and a deeper understanding of the key concepts of network protocols and technologies. The lecture thread uses face-to-face teaching, group discussion and class presentations to allow students to develop better communication and presentation skills. The effectiveness of the MPBL approach was evaluated extensively-formally by students and by an external moderator, and informally in discussions within the teaching team. The implementation of the MPBL was judged to be successful because of the positive student and external moderator feedback. Therefore, the authors propose that MPBL is a suitable pedagogical tool for teaching advanced computer networks to graduate and postgraduate students.

Research paper thumbnail of Design and Evaluation of a Web-Based Tool for Teaching Computer Network Design to Undergraduates

IGI Global eBooks, Jun 28, 2012

Previous studies have shown that motivating students to learn about local area network (LAN) desi... more Previous studies have shown that motivating students to learn about local area network (LAN) design can be difficult when presented in the traditional lecture format. To overcome this problem, a Web-based tool (“WebLan-Designer”) was developed as an aid in teaching and learning of LAN design at the introductory level. A WebLan-Designer provides a set of learning resources (tutorials, quizzes, network modeling, network design scenarios, key terms and definitions, and review questions and answers) and assists undergraduate students in learning the basics of both wired and wireless LAN design. The tool is Internet-based and can be accessed at any time so that students can study LAN design at their own pace and convenience. This flexible learning approach contributes positively to distance education and e-learning. The effectiveness of WebLan-Designer is evaluated both formally and informally; positive student and peer feedback indicates that the design and implementation of the tool has been successful and that using WebLan-Designer may have a positive impact on student learning and comprehension.

Research paper thumbnail of WebLan-Designer

IGI Global eBooks, May 24, 2011

Research paper thumbnail of Co-Creating Well-Being and Health Options Using Internet Technologies

Research paper thumbnail of ICT for development in Asia and the Pacific

International Journal of Education and …, 2005

... of Learning, Canada; Peter Day, University of Brighton, UK; John Dekkers, Central Queensland ... more ... of Learning, Canada; Peter Day, University of Brighton, UK; John Dekkers, Central Queensland University, Australia; Susana Finquelievich, Universidad de ... of the West Indies, Jamaica, West Indies; Philip Hui, Hong Kong Institute of Education, Hong Kong; David Jones, Central ...

Research paper thumbnail of A Zero-Trust Federated Identity and Access Management Framework for Cloud and Cloud-based Computing Environments

Association for Information Systems (AIS), 2020

Identity and Access Management (IAM) is an important aspect of information security. The deployme... more Identity and Access Management (IAM) is an important aspect of information security. The deployment of cloud computing (CC) and cloud-based computing (CbC) creates a complex information security scenario involving multiple global stakeholders and geographically dispersed infrastructures. Therefore, implementing IAM in CC/CbC requires the consideration and consolidation of multiple factors. A trust-based approach towards information security may not be a credible option for the CC/CbC environment as trust-based relationships among different architectural elements and including human beings may pose an additional security threat to the cloud space. In this paper, we propose a zero-trust framework for federated IAM in CC/CbC. The proposed framework incorporates a decentralised approach towards IAM that aims to minimise any single entity's controlling power over the digital assets in the CC/CbC space. The critical component of the proposed framework is the decentralised audit log.

Research paper thumbnail of 1 Biometric Security Systems: Finally, a Friend?

Abstract--Information systems security has broadened its meaning and significance and has started... more Abstract--Information systems security has broadened its meaning and significance and has started to affect our lives and behaviours. The research literature identifies five related research domains: information systems, security policies, security technologies, security assurance, and security interfaces. This paper discusses some aspects of user acceptance of biometrical measurements for the purposes of authentication and access control and concludes that initial user rejection of the commonly implemented biometrics and fear of privacy abuse have been replaced by a de facto user acceptance. It hypothesizes that there is correlation between users ’ awareness of the broader consequences of a particular biometric system and the level of their acceptance of the system. Index terms—Identification of Persons, Access Control,

Research paper thumbnail of 516 Poster paper

In this paper, NACCQ’s online eJournal BACIT

Research paper thumbnail of Tablet Apps to Replace Primary School Homework: A Gamification and Constructivist Learning Approach

Research paper thumbnail of Student Revising for a Test Using SMS

In this paper an experiment involving mLearning using Short Message Service (SMS) is described. T... more In this paper an experiment involving mLearning using Short Message Service (SMS) is described. The experiment was designed after a study of the readiness of the participants in terms of mobile device ownership, mobile technology preferences, and learning styles. Qualitative data was gathered and analysed using an activity theory framework. The SMS scenario developed for the experiment is contentspecific and was provided as a commercial service in ‘pull’ mode. The study allowed to conclude that mobility support, information density, and information relevance were the factors which contribute most to creating mLearning value while cost was a major detractor.

Research paper thumbnail of QR Codes Advantages and Dangers

Proceedings of the 13th International Joint Conference on e-Business and Telecommunications, 2016

Research paper thumbnail of MOBDroid: An Intelligent Malware Detection System for Improved Data Security in Mobile Cloud Computing Environments

2020 30th International Telecommunication Networks and Applications Conference (ITNAC)

We propose an intelligent malware detection system (MOBDroid) that aims to protect the end-user’s... more We propose an intelligent malware detection system (MOBDroid) that aims to protect the end-user’s mobile device (MD) in mobile cloud computing (MCC) environment. MOBDroid utilizes the Android Operating System (OS) permission-based security system. The APK files of 28,306 benign and malicious applications (apps) collected from the AndroZoo and RmvDroid malware repositories were used in the system development process. The apps were decompiled in order to extract their manifest files and construct a dataset comprising the permissions requested by each of the apps. We identified some unique permissions that could be used to distinguish between malicious and benign apps and performed a series of experiments using a machine learning (ML) model; the model drew on the ML.net library and was implemented in C#.net. In the experiments conducted, we obtained classification accuracy of 96.89%, a detection rate of 98.65%, and false negative rate of 1.35%. The results indicate that our model compares very favorably to other models reported in the extant literature.

Research paper thumbnail of Teaching Computer Networking & Telecommunications: A Network Analysis and Software Development Approach," presented at 14th annual conference of the NACCQ

on a paper presented at the 13 th NACCQ conference here we analyse the delivery approach adopted ... more on a paper presented at the 13 th NACCQ conference here we analyse the delivery approach adopted for the course and evaluate its overall effectiveness. We begin with a section which reflects on how we transformed the learning outcomes into concrete assessment objectives. We then describe the teaching and learning strategies implemented, the resource development process (including course materials, and the setting up a customised networking environment) and more specifically the approach towards integrating a software development component and a network analysis component into the course fabric. The paper concludes with a section discussing the strengths and weaknesses of the course and the direction of its future development. The conclusions are drawn from data on course evaluation collected both formally (student Proceedings of the NACCQ Napier New Zealand July 2001 www.naccq.ac.nz course evaluation forms) and informally- from discussions within the teaching team. The feedback from...

Research paper thumbnail of Security and Organizational Strategy

Secure Edge Computing, 2021

Research paper thumbnail of WebLan-Designer Demonstration

At the conference the authors will demonstrate various features of WebLan-Designer and its useful... more At the conference the authors will demonstrate various features of WebLan-Designer and its usefulness in teaching and learning LAN design. To make lessons more interesting and to encourage class participation, we use WebLan-Designer as an integral part of two two-hour sessions. The first session is based on wired LAN design whereas the second session is on wireless LAN design. In the classroom, students are asked to design a server-based LAN on paper. After a prescribed period of time (e.g. 15 minutes), we introduce WebLan-Designer to the students and do a walk-through with them to verify (visually and interactively) their solutions of the LAN design exercises. The learning resources built into the system (interactive quizzes and tutorials for wired and wireless LAN design) are particularly important as they can be used to enable the teaching of some aspects of LAN design in more detail.

Research paper thumbnail of Backup Monitoring in Large Heterogeneous Business Cloud Computing Environments A Framework for the Development of a Reliable Automated Process

With the growing popularity of cloud computing technologies, the expectations towards cloud servi... more With the growing popularity of cloud computing technologies, the expectations towards cloud service providers (CSPs) increase not only in terms of functionality, cost, and service delivery speed, but also for the security of customer data stored remotely. Backup and restore processes are an important part of data security management, as they ensure data integrity and availability. CSPs can be certified for their compliance with established industry standards for data security. However, there is a lack of guidance on how to design internal processes in order to achieve compliance and improve data security management. The study addresses the gap by building a proof of concept software artefact and proposing a conceptual framework that may be used to guide the development of a reliable backup monitoring process and related software, particularly in large heterogeneous system environments.

Research paper thumbnail of Mobile Services and Applications: An Empirical Investigation From the Service Supply Perspective

Research paper thumbnail of The International HETL Review

George Siemens and Stephen Downes developed a theory for the digital age, called connectivism, de... more George Siemens and Stephen Downes developed a theory for the digital age, called connectivism, denouncing boundaries of behaviorism, cognitivism, and constructivism. Their proposed learning theory has issued a debate over whether it is a learning theory or instructional theory or merely a pedagogical view. While the theory presented is important and valid, is it a tool to be used in the learning process for instruction or curriculum rather than a standalone learning theory? It has forced educators to look at what is being done in digital education and rethink, debate, and philosophize over how each part fits. Continually evaluating how each new generation learns with regard to instruction and curriculum serves to hold education to high standards. Certainly this theory is worth our thorough consideration.

Research paper thumbnail of SMS Banking

Innovative Mobile Platform Developments for Electronic Services Design and Delivery

Research paper thumbnail of Guest editorial: Hybrid, blended and mixed-mode learning quality: more lessons learned in the COVID pandemic and beyond

Quality Assurance in Education

Research paper thumbnail of Teaching Advanced Computer Networking

IGI Global eBooks, May 25, 2011

This chapter reports on the authors' experiences of using miniproject-based learning (MPBL) as a ... more This chapter reports on the authors' experiences of using miniproject-based learning (MPBL) as a key pedagogical method for teaching advanced computer networks within the context of a Master's course in Net-centric computing at the Auckland University of Technology (AUT). A two-threaded delivery approach was adopted that comprised an MPBL thread and a lecture thread. The MPBL thread within the course allows the students to gain practical experience and a deeper understanding of the key concepts of network protocols and technologies. The lecture thread uses face-to-face teaching, group discussion and class presentations to allow students to develop better communication and presentation skills. The effectiveness of the MPBL approach was evaluated extensively-formally by students and by an external moderator, and informally in discussions within the teaching team. The implementation of the MPBL was judged to be successful because of the positive student and external moderator feedback. Therefore, the authors propose that MPBL is a suitable pedagogical tool for teaching advanced computer networks to graduate and postgraduate students.

Research paper thumbnail of Design and Evaluation of a Web-Based Tool for Teaching Computer Network Design to Undergraduates

IGI Global eBooks, Jun 28, 2012

Previous studies have shown that motivating students to learn about local area network (LAN) desi... more Previous studies have shown that motivating students to learn about local area network (LAN) design can be difficult when presented in the traditional lecture format. To overcome this problem, a Web-based tool (“WebLan-Designer”) was developed as an aid in teaching and learning of LAN design at the introductory level. A WebLan-Designer provides a set of learning resources (tutorials, quizzes, network modeling, network design scenarios, key terms and definitions, and review questions and answers) and assists undergraduate students in learning the basics of both wired and wireless LAN design. The tool is Internet-based and can be accessed at any time so that students can study LAN design at their own pace and convenience. This flexible learning approach contributes positively to distance education and e-learning. The effectiveness of WebLan-Designer is evaluated both formally and informally; positive student and peer feedback indicates that the design and implementation of the tool has been successful and that using WebLan-Designer may have a positive impact on student learning and comprehension.

Research paper thumbnail of WebLan-Designer

IGI Global eBooks, May 24, 2011

Research paper thumbnail of Co-Creating Well-Being and Health Options Using Internet Technologies

Research paper thumbnail of ICT for development in Asia and the Pacific

International Journal of Education and …, 2005

... of Learning, Canada; Peter Day, University of Brighton, UK; John Dekkers, Central Queensland ... more ... of Learning, Canada; Peter Day, University of Brighton, UK; John Dekkers, Central Queensland University, Australia; Susana Finquelievich, Universidad de ... of the West Indies, Jamaica, West Indies; Philip Hui, Hong Kong Institute of Education, Hong Kong; David Jones, Central ...

Research paper thumbnail of A Zero-Trust Federated Identity and Access Management Framework for Cloud and Cloud-based Computing Environments

Association for Information Systems (AIS), 2020

Identity and Access Management (IAM) is an important aspect of information security. The deployme... more Identity and Access Management (IAM) is an important aspect of information security. The deployment of cloud computing (CC) and cloud-based computing (CbC) creates a complex information security scenario involving multiple global stakeholders and geographically dispersed infrastructures. Therefore, implementing IAM in CC/CbC requires the consideration and consolidation of multiple factors. A trust-based approach towards information security may not be a credible option for the CC/CbC environment as trust-based relationships among different architectural elements and including human beings may pose an additional security threat to the cloud space. In this paper, we propose a zero-trust framework for federated IAM in CC/CbC. The proposed framework incorporates a decentralised approach towards IAM that aims to minimise any single entity's controlling power over the digital assets in the CC/CbC space. The critical component of the proposed framework is the decentralised audit log.

Research paper thumbnail of 1 Biometric Security Systems: Finally, a Friend?

Abstract--Information systems security has broadened its meaning and significance and has started... more Abstract--Information systems security has broadened its meaning and significance and has started to affect our lives and behaviours. The research literature identifies five related research domains: information systems, security policies, security technologies, security assurance, and security interfaces. This paper discusses some aspects of user acceptance of biometrical measurements for the purposes of authentication and access control and concludes that initial user rejection of the commonly implemented biometrics and fear of privacy abuse have been replaced by a de facto user acceptance. It hypothesizes that there is correlation between users ’ awareness of the broader consequences of a particular biometric system and the level of their acceptance of the system. Index terms—Identification of Persons, Access Control,

Research paper thumbnail of 516 Poster paper

In this paper, NACCQ’s online eJournal BACIT

Research paper thumbnail of Tablet Apps to Replace Primary School Homework: A Gamification and Constructivist Learning Approach

Research paper thumbnail of Student Revising for a Test Using SMS

In this paper an experiment involving mLearning using Short Message Service (SMS) is described. T... more In this paper an experiment involving mLearning using Short Message Service (SMS) is described. The experiment was designed after a study of the readiness of the participants in terms of mobile device ownership, mobile technology preferences, and learning styles. Qualitative data was gathered and analysed using an activity theory framework. The SMS scenario developed for the experiment is contentspecific and was provided as a commercial service in ‘pull’ mode. The study allowed to conclude that mobility support, information density, and information relevance were the factors which contribute most to creating mLearning value while cost was a major detractor.

Research paper thumbnail of QR Codes Advantages and Dangers

Proceedings of the 13th International Joint Conference on e-Business and Telecommunications, 2016

Research paper thumbnail of MOBDroid: An Intelligent Malware Detection System for Improved Data Security in Mobile Cloud Computing Environments

2020 30th International Telecommunication Networks and Applications Conference (ITNAC)

We propose an intelligent malware detection system (MOBDroid) that aims to protect the end-user’s... more We propose an intelligent malware detection system (MOBDroid) that aims to protect the end-user’s mobile device (MD) in mobile cloud computing (MCC) environment. MOBDroid utilizes the Android Operating System (OS) permission-based security system. The APK files of 28,306 benign and malicious applications (apps) collected from the AndroZoo and RmvDroid malware repositories were used in the system development process. The apps were decompiled in order to extract their manifest files and construct a dataset comprising the permissions requested by each of the apps. We identified some unique permissions that could be used to distinguish between malicious and benign apps and performed a series of experiments using a machine learning (ML) model; the model drew on the ML.net library and was implemented in C#.net. In the experiments conducted, we obtained classification accuracy of 96.89%, a detection rate of 98.65%, and false negative rate of 1.35%. The results indicate that our model compares very favorably to other models reported in the extant literature.

Research paper thumbnail of Teaching Computer Networking & Telecommunications: A Network Analysis and Software Development Approach," presented at 14th annual conference of the NACCQ

on a paper presented at the 13 th NACCQ conference here we analyse the delivery approach adopted ... more on a paper presented at the 13 th NACCQ conference here we analyse the delivery approach adopted for the course and evaluate its overall effectiveness. We begin with a section which reflects on how we transformed the learning outcomes into concrete assessment objectives. We then describe the teaching and learning strategies implemented, the resource development process (including course materials, and the setting up a customised networking environment) and more specifically the approach towards integrating a software development component and a network analysis component into the course fabric. The paper concludes with a section discussing the strengths and weaknesses of the course and the direction of its future development. The conclusions are drawn from data on course evaluation collected both formally (student Proceedings of the NACCQ Napier New Zealand July 2001 www.naccq.ac.nz course evaluation forms) and informally- from discussions within the teaching team. The feedback from...

Research paper thumbnail of Security and Organizational Strategy

Secure Edge Computing, 2021

Research paper thumbnail of WebLan-Designer Demonstration

At the conference the authors will demonstrate various features of WebLan-Designer and its useful... more At the conference the authors will demonstrate various features of WebLan-Designer and its usefulness in teaching and learning LAN design. To make lessons more interesting and to encourage class participation, we use WebLan-Designer as an integral part of two two-hour sessions. The first session is based on wired LAN design whereas the second session is on wireless LAN design. In the classroom, students are asked to design a server-based LAN on paper. After a prescribed period of time (e.g. 15 minutes), we introduce WebLan-Designer to the students and do a walk-through with them to verify (visually and interactively) their solutions of the LAN design exercises. The learning resources built into the system (interactive quizzes and tutorials for wired and wireless LAN design) are particularly important as they can be used to enable the teaching of some aspects of LAN design in more detail.

Research paper thumbnail of Backup Monitoring in Large Heterogeneous Business Cloud Computing Environments A Framework for the Development of a Reliable Automated Process

With the growing popularity of cloud computing technologies, the expectations towards cloud servi... more With the growing popularity of cloud computing technologies, the expectations towards cloud service providers (CSPs) increase not only in terms of functionality, cost, and service delivery speed, but also for the security of customer data stored remotely. Backup and restore processes are an important part of data security management, as they ensure data integrity and availability. CSPs can be certified for their compliance with established industry standards for data security. However, there is a lack of guidance on how to design internal processes in order to achieve compliance and improve data security management. The study addresses the gap by building a proof of concept software artefact and proposing a conceptual framework that may be used to guide the development of a reliable backup monitoring process and related software, particularly in large heterogeneous system environments.

Research paper thumbnail of Mobile Services and Applications: An Empirical Investigation From the Service Supply Perspective