Aisha Awal - Academia.edu (original) (raw)

Papers by Aisha Awal

Research paper thumbnail of Personality, culture and password behavior

Proceedings of the Second African Conference for Human Computer Interaction: Thriving Communities

Culture - an aggregation of people's location, language, tribe and economic activities might ... more Culture - an aggregation of people's location, language, tribe and economic activities might have a role to play in the security decisions of users. Culture in this context is even more relevant in most African societies as there are many ethnic groups. Studies on users' password behavior have seen some advances, but little is known of the relationship between people's password behaviors, their personality and cultural backgrounds. In this paper, we report a study of the relationship between passwords and personality of the users. We also analyzed culture (via ethnic grouping) to determine its relationship with password strength. The results of the study of 230 participants indicate that although there exists a relationship between personality of users and their passwords behavior, it is quite weak and mainly negatively related except for participants high in agreeableness (cooperative) traits, hence might create stronger passwords. In addition, most participants (93%) created weak passwords, notwithstanding, participants who have defined themselves as belonging to Hausa tend to create better passwords than Nupe and Gbagyi ethnic group participants.

Research paper thumbnail of Assessing The Usability Of University Websites From Users' Perspective

University websites aim at providing up-to-date information and services to students,lecturers, a... more University websites aim at providing up-to-date information and services to students,lecturers, administrators and other users in efficient ways. Unfortunately, website design is often driven by technology, organisational structure, or business objectives, rather than by its usability from the perspective of students in university Website designers end up developing websites which do not meet the needs of the primary users (students). The study evaluated the usability of the University website from the perspective of of 364 university students and investigated whether area of specialisation has significant impacts on these usability factors. This aim is achieved by using a questionnaire based on the five factors of usability defined by WAMMI (Website Analysis and Measurement Inventory): attractiveness, controllability, helpfulness, efficiency and learnability.The results identifies the usability factors that need to be given more consideration when designing an educational website a...

Research paper thumbnail of A Power Management Model for Android Operated Smart Phones

Power management (PM) of smartphones has evolved since the introduction of Advanced Power Managem... more Power management (PM) of smartphones has evolved since the introduction of Advanced Power Management (APM) and Advanced Configuration & Power Interface (ACPI). These are primarily aimed at personal computers. Although Android is based on Linux kernel, Android has put forward its own power management system during Google I/O 2011, it was reported that 400,000 Android devices are being activated per day and the proper power management of these devices is becoming an issue [2]. With more sophisticated hardware components being available on the smartphones and the tablets, the developers are exploiting them to provide state-of-the-art user experience. This comes at the cost of high drain of battery. It is studied that Wi-Fi, GPS, colourful bright display of Organic LED (OLED) and some uncontrollable background running applications consume very high power. Another study shows that the third-party advertisements shown in free Android apps consume up to 30% of the total power consumed by t...

Research paper thumbnail of An Ict Driven Security Model to Improve Vigilance

In so many countries some of the companies and organizations lose their valuable properties due t... more In so many countries some of the companies and organizations lose their valuable properties due to inefficiency and inconsistency of some of their security personnel, this use to happen because of unavailability of security tracking system that can monitor and track all the security personnel. When developing a security tracking system, GPS and Android's Network Location Provider can be utilize to acquire the user location. Android's Network Location Provider determines user location using cell tower and Wi-Fi signals, providing location information in a way that works indoors and outdoors, responds faster, and uses less battery power. To obtain the user location in this application, one can use both GPS and the Network Location Provider, or just one. Here we can track the positions of the security personnel that are holding the Device constantly for period of his working hour and save them on a well secured remote database and display them on google map in a webpage. So, th...

Research paper thumbnail of Ontology Development for the Domain of Software Requirement Elicitation Technique

International journal of engineering research and technology, 2018

Domain ontology is the ontology of describing domain-specific objects, it provides definitions of... more Domain ontology is the ontology of describing domain-specific objects, it provides definitions of the concepts in a specific domain, as well as the relationships between them. 5W1H analysis method is widely utilized to give a comprehensive and delicate analysis to a specific issue. The Hierarchical Modelling Methods which includes: Button-Up, Top-Down and Middle-Out is used to model concepts. These conceptual modelling methods solved the real problem in different application domain, but they did not give an analysis and extraction method for concepts and relations in domain ontology, especially large and complex ones, and not present a general modelling method suitable for all kinds of domain ontology. Domain ontology for software requirement elicitation is developed using 5W1H approach, the ontology specify concepts (classes) and relations between the concepts in software requirement elicitation domain. The 5W1H approach helped in extracting and analyzing concepts and relations wit...

Research paper thumbnail of Personality, culture and password behavior

Proceedings of the Second African Conference for Human Computer Interaction: Thriving Communities

Culture - an aggregation of people's location, language, tribe and economic activities might ... more Culture - an aggregation of people's location, language, tribe and economic activities might have a role to play in the security decisions of users. Culture in this context is even more relevant in most African societies as there are many ethnic groups. Studies on users' password behavior have seen some advances, but little is known of the relationship between people's password behaviors, their personality and cultural backgrounds. In this paper, we report a study of the relationship between passwords and personality of the users. We also analyzed culture (via ethnic grouping) to determine its relationship with password strength. The results of the study of 230 participants indicate that although there exists a relationship between personality of users and their passwords behavior, it is quite weak and mainly negatively related except for participants high in agreeableness (cooperative) traits, hence might create stronger passwords. In addition, most participants (93%) created weak passwords, notwithstanding, participants who have defined themselves as belonging to Hausa tend to create better passwords than Nupe and Gbagyi ethnic group participants.

Research paper thumbnail of Assessing The Usability Of University Websites From Users' Perspective

University websites aim at providing up-to-date information and services to students,lecturers, a... more University websites aim at providing up-to-date information and services to students,lecturers, administrators and other users in efficient ways. Unfortunately, website design is often driven by technology, organisational structure, or business objectives, rather than by its usability from the perspective of students in university Website designers end up developing websites which do not meet the needs of the primary users (students). The study evaluated the usability of the University website from the perspective of of 364 university students and investigated whether area of specialisation has significant impacts on these usability factors. This aim is achieved by using a questionnaire based on the five factors of usability defined by WAMMI (Website Analysis and Measurement Inventory): attractiveness, controllability, helpfulness, efficiency and learnability.The results identifies the usability factors that need to be given more consideration when designing an educational website a...

Research paper thumbnail of A Power Management Model for Android Operated Smart Phones

Power management (PM) of smartphones has evolved since the introduction of Advanced Power Managem... more Power management (PM) of smartphones has evolved since the introduction of Advanced Power Management (APM) and Advanced Configuration & Power Interface (ACPI). These are primarily aimed at personal computers. Although Android is based on Linux kernel, Android has put forward its own power management system during Google I/O 2011, it was reported that 400,000 Android devices are being activated per day and the proper power management of these devices is becoming an issue [2]. With more sophisticated hardware components being available on the smartphones and the tablets, the developers are exploiting them to provide state-of-the-art user experience. This comes at the cost of high drain of battery. It is studied that Wi-Fi, GPS, colourful bright display of Organic LED (OLED) and some uncontrollable background running applications consume very high power. Another study shows that the third-party advertisements shown in free Android apps consume up to 30% of the total power consumed by t...

Research paper thumbnail of An Ict Driven Security Model to Improve Vigilance

In so many countries some of the companies and organizations lose their valuable properties due t... more In so many countries some of the companies and organizations lose their valuable properties due to inefficiency and inconsistency of some of their security personnel, this use to happen because of unavailability of security tracking system that can monitor and track all the security personnel. When developing a security tracking system, GPS and Android's Network Location Provider can be utilize to acquire the user location. Android's Network Location Provider determines user location using cell tower and Wi-Fi signals, providing location information in a way that works indoors and outdoors, responds faster, and uses less battery power. To obtain the user location in this application, one can use both GPS and the Network Location Provider, or just one. Here we can track the positions of the security personnel that are holding the Device constantly for period of his working hour and save them on a well secured remote database and display them on google map in a webpage. So, th...

Research paper thumbnail of Ontology Development for the Domain of Software Requirement Elicitation Technique

International journal of engineering research and technology, 2018

Domain ontology is the ontology of describing domain-specific objects, it provides definitions of... more Domain ontology is the ontology of describing domain-specific objects, it provides definitions of the concepts in a specific domain, as well as the relationships between them. 5W1H analysis method is widely utilized to give a comprehensive and delicate analysis to a specific issue. The Hierarchical Modelling Methods which includes: Button-Up, Top-Down and Middle-Out is used to model concepts. These conceptual modelling methods solved the real problem in different application domain, but they did not give an analysis and extraction method for concepts and relations in domain ontology, especially large and complex ones, and not present a general modelling method suitable for all kinds of domain ontology. Domain ontology for software requirement elicitation is developed using 5W1H approach, the ontology specify concepts (classes) and relations between the concepts in software requirement elicitation domain. The 5W1H approach helped in extracting and analyzing concepts and relations wit...