Norliza Katuk - Academia.edu (original) (raw)
Papers by Norliza Katuk
Modern mobile phones or smartphones have become a pervasive and affordable device for users at di... more Modern mobile phones or smartphones have become a pervasive and affordable device for users at different levels of age around the world. Smartphones equipped with many useful sensors, including camera, barometer, accelerometer, and digital compass. The sensors on smartphones attracted researchers and developers to develop mobile applications (apps) and study the potential use of the sensors to support daily life activities. Unlike other types of sensor, the smartphone camera has been underutilized. Analysis of the literature suggested that smartphone camera mainly serves for personal and social photography. Practically, a smartphone camera can be used as an imaging device for reading a barcode. Although barcode has been used for identifying products and items, the use of a smartphone camera as a reading device has not been explored thoroughly. Further, scholarly resources describing the fundamental knowledge of smartphone camera barcode reading is not available in the literature which could be the reason contributed to slow research progress of the domain. Therefore, this study aims to review the current trends and future directions of smartphone camera for barcode reading. Specifically, the study reviews the literature on the types of applications that are currently available and run on the standard mobile platform for reading a barcode. It also analyzes the necessary components that made up barcode reading apps. Further, the review identifies technical and non-technical issues that are critical for the development of the apps. The contributions of this work are twofold, first, it provides the fundamental knowledge on the building blocks of camera barcode reading apps, and second, it explores the issues in the current camera barcode reading apps that could encourage exploration towards addressing the issues. Practically, the findings could spark new research ideas to address the current issues related to the use of smartphone camera for barcode reading in the near future.
The journal of social sciences research, Dec 25, 2018
Security and privacy issues are a major concern to users of social network sites (SNS). These iss... more Security and privacy issues are a major concern to users of social network sites (SNS). These issues range from unauthorized access to personal information to cyber bullying. Previous researchers have been exerting different perspectives including technical, psychological and law to study privacy and security issues. However, the issues of security and privacy seems to be ongoing. In view of the security threats and privacy issues of student using SNS, this study sets out to examine the security awareness, preparedness towards cyber-attacks and security behaviors among IT and Non-IT postgraduate students. As such, 400 postgraduate students were surveyed using a selfadministered questionnaire. The findings reported in this study revealed that IT students have significantly high security awareness and behavior as compared to Non-IT students. However, there is no significant difference between the preparedness towards cyber-attacks of both IT and Non-IT students. Finally, this study demonstrates that there is a significant relationship between preparedness towards cyber-attacks and security behaviors. The theoretical and practical implications of this study highlight the importance of security awareness and understanding of technical-know how in preempting security attacks among SNS users.
Journal of Telecommunication, Electronic and Computer Engineering, Sep 15, 2017
The Internet and web have been the main resource for various types of information for majority of... more The Internet and web have been the main resource for various types of information for majority of people in the world since a decade ago. With the emerging of smartphone technology, the web content is also available for mobile users that connect to the Internet through cellular network. Although mobile users are able to access content from the web; nevertheless, they always experience long access latency due to the speed of the network. Many research and developments have been implemented to help users to access content faster when using mobile devices with cellular network. Caching is one of them; a commonly used method for storing recently-accessed contents so that they can be used in the future. Content caching (CC) can reduce latency, which in return guarantees faster access to the content. Recently, there is a growing interest among researchers and developers in studying a more proactive technique to improve CC called prefetching (PF). PF is a method that caches selected content before it is actually needed. By embedding PF in CC, it is believed that latency could be reduced significantly. By looking at this promising approach, this paper introduces the PF techniques that could be suitable for CC in mobile environment. The paper aims to assist researchers by providing a better understanding on the existing PF techniques so that improvements can be proposed where possible.
Advanced Science Letters, Jun 1, 2017
The problem of password memorability among users has led to the introduction of Single Sign-On (S... more The problem of password memorability among users has led to the introduction of Single Sign-On (SSO) authentication. It enables users to login using a set of username and password which then allows an access into multiple websites without the hassle of repeating the same usernames and passwords. One of the most common SSO protocol is OpenID which is said to offer flexibility and security. Unfortunately, the existing OpenID model is prone to phishing attack whereby there is a lack of mechanism to ensure the authenticity of the OpenID provider. This scenario complicates the situation especially when there exists tools to generate phishing attacks are easily available without requiring much technical expertise. Moreover, users awareness are claimed to be insufficient to rely on since statistics of phishing attacks are shown to be increasing. Thus, this research attempts to propose page token as a mechanism to thwart phishing attack. This research produced and evaluated an improved requirement model that incorporates the page token as proposed mechanism. The outcomes show promising result towards the effort of thwarting phishing attacks.
This paper reports a study concerning linear and non-linear navigations in WBI. The effects of th... more This paper reports a study concerning linear and non-linear navigations in WBI. The effects of the two navigations on students' engagement aspects namely; control, focus, curiosity, and intrinsic interests were investigated. The study aimed to identify whether the linear and the non-linear navigations could be the factors that influence students' engagement while learning in WBI environment. An exploratory experimental study was conducted on seventy-two students from a university in Malaysia using a web-based system for learning Basic Computer Networks. The study suggested that the types of navigations had affected the control aspect, but not the focus, curiosity, and intrinsic interests. Students' engagement from the context of focus, intrinsic interests and curiosity was similar in both linear and non-linear. These findings are further discussed from cultural perspectives of Malaysian students.
Single Sign-On (SSO) requires one time authentication with a set of username and password which t... more Single Sign-On (SSO) requires one time authentication with a set of username and password which then allows an authorized user to enter all resources.This scheme was introduced to overcome the issue of memorability load among users who own several accounts.Currently, there are four main SSO protocols; 1) Security Assertion Markup Language (SAML), 2) OpenID, 3) Info Card and 4) OAuth.These protocols were sh~died separately and they have different architecture deployment and implementation wise.It was found from the literature, that many users were not aware of the existence of those protocols which probably explain the slow adoption.Thus, this paper seeks to study the four protocols together by making further analysis and then compare them in terms of its architecture deployment and implementation wise focusing on security and usability perspective.It is much in hope that this paper will be beneficial in giving a better understanding of the SSO protocols, and contributes to better improvement in its implementation.
Journal of Telecommunication, Electronic and Computer Engineering, Dec 1, 2016
Single Sign-on (SSO) authentication was introduced to overcome the problem of password memorabili... more Single Sign-on (SSO) authentication was introduced to overcome the problem of password memorability issue by enabling the users to login once using a set of username and password that allows an access into multiple websites. Among several SSO protocol, OpenID is said to offer flexibility and security. Unfortunately, the existing OpenID model is prone to phishing attack due to lack of countermeasures to ensure authenticity of OpenID provider. In view of the proliferation of phishing attack that exposed users to fraud website, information theft and unauthorized disclosure, this study attempts to identify and propose a suitable countermeasure in order to thwart phishing attack in OpenID environment. Therefore, this study intends to develop a prototype that implements Page Token in order to mitigate phishing attack. The findings revealed that the Page Token is possible to minimize the potential risk of phishing attack.
This paper presents a research on product-specific web information gathering concept that intends... more This paper presents a research on product-specific web information gathering concept that intends to improve web searching through conventional search engines. Search engines are useful for searching general information; however, the results are not always accurate because they return the results based on keywords occurrences, but not accurateness. Further, users must filter and organize the information accordingly to make the information meaningful. Users must also visit multiple websites independently to check whether the information is relevant. These processes are tedious and very time consuming especially for users who search for specific products information. Hence, we propose a web information gathering model that aims to provide a standard for developing product-specific web searching tools. It was applied in a mobile application called Gold-Trader. The mobile application provides gold and silver prices information to individual or personal traders. It can help individual or personal traders to monitor and compare gold and silver prices from multiple websites without the needs to visit them individually.
UML has been widely used as a modeling tool in software development. Software developed with UML ... more UML has been widely used as a modeling tool in software development. Software developed with UML has to be tested to assure its qua1it.y and to prevent faults. Current practice in UML design evaluation consists of walkthrough and inspections. However, these techniques are too complex and tedious because the reviewer needs to track large amount of information. Furthermore, the lack of assessment of design quality, and deficiency in detecting and correcting design fault in the model can increase the total software development costs and time to market. This indicates that the need of testing and validating design model for web-based applications is high. Therefore, this study intends to justify whether the DCD criteria can be used to derive suitable test cases for web-based application UML design model.
This paper explains our preliminary study on a composite web services model for travel-based webs... more This paper explains our preliminary study on a composite web services model for travel-based websites. The aim of the model is to provide a generic design for incorporating travel information in websites to assist travellers in searching relevant information over the Internet. The preliminary study explores generic features of travel-based websites as well as additional information that travellers always looking for such as currency and weather information, and local map. The approach that we used in this model is to merge difference web services into a single service that can be embedded in travel-based websites. We developed a prototype named QUICK Travel Assistant to demonstrate the model.
We are responsible of the accuracy of all opinion, technical comment, factual report, data, figur... more We are responsible of the accuracy of all opinion, technical comment, factual report, data, figure, illustration, and photographs in this report. We bear full responsibility for the checking whether material submitted is subjected to copyright or ownership right. UUM does not accept any liability for the accuracy of such comment, report, and other technical and factual information and the copyright or ownership right claims.
Advanced Science Letters, May 1, 2017
This paper proposes the architecture and components of a web-based content sequencing system know... more This paper proposes the architecture and components of a web-based content sequencing system known IT-Tutor. It organizes an appropriate sequence of learning content based on individual students’ prior knowledge. The dynamic and flexible organization of learning content is meant to achieve adaptive computer-based learning. IT-Tutor was evaluated in two usability studies; an expert-review, and a user-test. In the first study, five experts in a usability test and instructional design evaluated the system. IT-Tutor has also been evaluated by twelve students in the second study. The usability tests revealed that IT-Tutor is a usable computer-based learning tool that can be used to support classroom teaching or employed in an independent online learning environment.
International journal of interactive mobile technologies, Feb 22, 2019
Modern mobile phones or smartphones have multipurpose functions apart from being used as a device... more Modern mobile phones or smartphones have multipurpose functions apart from being used as a device for voice and text communications. They are also embedded with many useful sensors, including camera, barometer, accelerometer, and digital compass. Unlike other types of sensor, the smartphone camera has been underutilized. This paper aims to fill the gap by analyzing and reviewing the hardware and software components of smartphones and highlighting the potential uses of the smartphone camera to support human daily life activities. A simple search of research papers indexed in Google Scholar was carried out using guided terms. The papers were filtered to match the research questions for this study. Only relevant papers were analyzed and reviewed. The results of the analysis suggested that the rapid development in the smartphone hardware has extended the use of the smartphone cameras beyond personal and social photography. Consequently, applications (apps) based on smartphone cameras emerge, such as barcode readers, document digitizing tools, augmented reality, translation tools, and indoor positioning device. These apps benefit users and facilitate them in their daily life activities.
This paper presents a research concerning users' behaviours towards Web Single-Sign-On (SSO) ... more This paper presents a research concerning users' behaviours towards Web Single-Sign-On (SSO) for accessing e-learning applications.Many web application providers require users to subscribe to their services and authenticate themselves through the use of login credentials. The number of such applications is increasing exponentially which caused ineffective login credentials management among users.This may also contribute to various security issues to both users and application providers.Web SSO, a type of authentication service has been introduced to overcome the issues pertaining password management.However, the utilization of web SSO for accessing educational materials is still at its infancy stage; where many aspects of the technology has not been fully studied and developed.Hence, there is a need to study how users of e-learning applications behave towards web SSO. A course portal named CWS was developed with two authentication methods (i.e., OpenID and traditional). A focus group interview and a laboratory experiment were conducted on students from two higher learning institutions.The aim of these studies is to understand how students behave towards the authentication methods.The results of the study reveal important findings on users' behaviours towards web SSO implementation particularly OpenID.The outcomes are further discussed in terms of applicability of web SSO within e-learning environment.
Social login (SL) allows web application providers to obtain authentication service from social n... more Social login (SL) allows web application providers to obtain authentication service from social network providers for users who own the social network accounts. By approving a consent dialogue, users are granted access to the web applications when login using the SL. It also allows web application providers to access personal information that is associated with the users' social network credentials (SNC). This can be a source to privacy leakage if the users simply approve the consent dialogue without understanding the contents. Therefore, this research intends to explore users' privacy awareness when they login to web applications using SL for the first time particularly using Facebook SNC. An experimental study was conducted to evaluate the effects of SL permission messages on users' privacy awareness. The results suggested that the permission message with privacy alert has significantly increased the participants' awareness on the privacy of their personal information obtained through SNC. The outcome of this study provides an opportunity as a guide to increase users' awareness on the privacy of their personal information obtained from SNC.
As an early view in my doctoral study, this paper submits a framework for evaluating intelligent ... more As an early view in my doctoral study, this paper submits a framework for evaluating intelligent tutoring systems (ITSs), embracing well-known pedagogical theories -- Cognitive Theory of Multimedia Learning and Modality Principles. What I have interested in is that these theories have been successfully applied in e-learning systems design and evaluation, but rare is found on ITSs. Hence, the study
Advances in intelligent systems and computing, 2015
This paper presents a research concerning password management and single-sign-on for accessing ln... more This paper presents a research concerning password management and single-sign-on for accessing lnternet applications. Many lnternet applications require users to subscribe to their services and authenticate themselves through the use of login credentials. The number of such applications is increasing exponentially which caused ineffective login credentials management among users. This study was conducted with two objectives (i) to identify how users manage their usernames and passwords, and (ii) to examine whether users see the benefits of single-sign-on. To achieve these objectives, a focus group interview was conducted on students from a local university. The results of the study suggested that the students did not practice proper password management. Further, it suggested that single-sign-on may not be the immediate solution to improve the students' password management.
Network Intrusion Detection Systems (NIDSs) have always been designed to enhance and improve the ... more Network Intrusion Detection Systems (NIDSs) have always been designed to enhance and improve the network security issue by detecting, identifying, assessing and reporting any unauthorized and illegal network connections and activities. The purpose of this research is to improve on the existing Anomaly Based Intrusion Detection (ABID) method using K-Means clustering technique as to maximize the detection rate and accuracy while minimizing the false alarm. The problem with outliers may disturb the K-Means clustering process as it might be avoided in the clustering process from mixing with the normal data that make the NIDSs become less accurate. Thus this research aims to improve the performance of the ABID systems that balance the loss of information or ignored data in clustering. An integrated machine learning algorithm using K-Means Clustering with discretization technique and Naïve Bayes Classifier (KMC-D+NBC) is proposed against ISCX 2012 Intrusion Detection Evaluation Dataset. The outcome depicts that the proposed method generates better detection rate and accuracy up to 99.3% and 99.5% respectively and reduces the false alarm to 1.2% with better efficiency of 0.03 seconds time taken to build model.
Modern mobile phones or smartphones have become a pervasive and affordable device for users at di... more Modern mobile phones or smartphones have become a pervasive and affordable device for users at different levels of age around the world. Smartphones equipped with many useful sensors, including camera, barometer, accelerometer, and digital compass. The sensors on smartphones attracted researchers and developers to develop mobile applications (apps) and study the potential use of the sensors to support daily life activities. Unlike other types of sensor, the smartphone camera has been underutilized. Analysis of the literature suggested that smartphone camera mainly serves for personal and social photography. Practically, a smartphone camera can be used as an imaging device for reading a barcode. Although barcode has been used for identifying products and items, the use of a smartphone camera as a reading device has not been explored thoroughly. Further, scholarly resources describing the fundamental knowledge of smartphone camera barcode reading is not available in the literature which could be the reason contributed to slow research progress of the domain. Therefore, this study aims to review the current trends and future directions of smartphone camera for barcode reading. Specifically, the study reviews the literature on the types of applications that are currently available and run on the standard mobile platform for reading a barcode. It also analyzes the necessary components that made up barcode reading apps. Further, the review identifies technical and non-technical issues that are critical for the development of the apps. The contributions of this work are twofold, first, it provides the fundamental knowledge on the building blocks of camera barcode reading apps, and second, it explores the issues in the current camera barcode reading apps that could encourage exploration towards addressing the issues. Practically, the findings could spark new research ideas to address the current issues related to the use of smartphone camera for barcode reading in the near future.
The journal of social sciences research, Dec 25, 2018
Security and privacy issues are a major concern to users of social network sites (SNS). These iss... more Security and privacy issues are a major concern to users of social network sites (SNS). These issues range from unauthorized access to personal information to cyber bullying. Previous researchers have been exerting different perspectives including technical, psychological and law to study privacy and security issues. However, the issues of security and privacy seems to be ongoing. In view of the security threats and privacy issues of student using SNS, this study sets out to examine the security awareness, preparedness towards cyber-attacks and security behaviors among IT and Non-IT postgraduate students. As such, 400 postgraduate students were surveyed using a selfadministered questionnaire. The findings reported in this study revealed that IT students have significantly high security awareness and behavior as compared to Non-IT students. However, there is no significant difference between the preparedness towards cyber-attacks of both IT and Non-IT students. Finally, this study demonstrates that there is a significant relationship between preparedness towards cyber-attacks and security behaviors. The theoretical and practical implications of this study highlight the importance of security awareness and understanding of technical-know how in preempting security attacks among SNS users.
Journal of Telecommunication, Electronic and Computer Engineering, Sep 15, 2017
The Internet and web have been the main resource for various types of information for majority of... more The Internet and web have been the main resource for various types of information for majority of people in the world since a decade ago. With the emerging of smartphone technology, the web content is also available for mobile users that connect to the Internet through cellular network. Although mobile users are able to access content from the web; nevertheless, they always experience long access latency due to the speed of the network. Many research and developments have been implemented to help users to access content faster when using mobile devices with cellular network. Caching is one of them; a commonly used method for storing recently-accessed contents so that they can be used in the future. Content caching (CC) can reduce latency, which in return guarantees faster access to the content. Recently, there is a growing interest among researchers and developers in studying a more proactive technique to improve CC called prefetching (PF). PF is a method that caches selected content before it is actually needed. By embedding PF in CC, it is believed that latency could be reduced significantly. By looking at this promising approach, this paper introduces the PF techniques that could be suitable for CC in mobile environment. The paper aims to assist researchers by providing a better understanding on the existing PF techniques so that improvements can be proposed where possible.
Advanced Science Letters, Jun 1, 2017
The problem of password memorability among users has led to the introduction of Single Sign-On (S... more The problem of password memorability among users has led to the introduction of Single Sign-On (SSO) authentication. It enables users to login using a set of username and password which then allows an access into multiple websites without the hassle of repeating the same usernames and passwords. One of the most common SSO protocol is OpenID which is said to offer flexibility and security. Unfortunately, the existing OpenID model is prone to phishing attack whereby there is a lack of mechanism to ensure the authenticity of the OpenID provider. This scenario complicates the situation especially when there exists tools to generate phishing attacks are easily available without requiring much technical expertise. Moreover, users awareness are claimed to be insufficient to rely on since statistics of phishing attacks are shown to be increasing. Thus, this research attempts to propose page token as a mechanism to thwart phishing attack. This research produced and evaluated an improved requirement model that incorporates the page token as proposed mechanism. The outcomes show promising result towards the effort of thwarting phishing attacks.
This paper reports a study concerning linear and non-linear navigations in WBI. The effects of th... more This paper reports a study concerning linear and non-linear navigations in WBI. The effects of the two navigations on students' engagement aspects namely; control, focus, curiosity, and intrinsic interests were investigated. The study aimed to identify whether the linear and the non-linear navigations could be the factors that influence students' engagement while learning in WBI environment. An exploratory experimental study was conducted on seventy-two students from a university in Malaysia using a web-based system for learning Basic Computer Networks. The study suggested that the types of navigations had affected the control aspect, but not the focus, curiosity, and intrinsic interests. Students' engagement from the context of focus, intrinsic interests and curiosity was similar in both linear and non-linear. These findings are further discussed from cultural perspectives of Malaysian students.
Single Sign-On (SSO) requires one time authentication with a set of username and password which t... more Single Sign-On (SSO) requires one time authentication with a set of username and password which then allows an authorized user to enter all resources.This scheme was introduced to overcome the issue of memorability load among users who own several accounts.Currently, there are four main SSO protocols; 1) Security Assertion Markup Language (SAML), 2) OpenID, 3) Info Card and 4) OAuth.These protocols were sh~died separately and they have different architecture deployment and implementation wise.It was found from the literature, that many users were not aware of the existence of those protocols which probably explain the slow adoption.Thus, this paper seeks to study the four protocols together by making further analysis and then compare them in terms of its architecture deployment and implementation wise focusing on security and usability perspective.It is much in hope that this paper will be beneficial in giving a better understanding of the SSO protocols, and contributes to better improvement in its implementation.
Journal of Telecommunication, Electronic and Computer Engineering, Dec 1, 2016
Single Sign-on (SSO) authentication was introduced to overcome the problem of password memorabili... more Single Sign-on (SSO) authentication was introduced to overcome the problem of password memorability issue by enabling the users to login once using a set of username and password that allows an access into multiple websites. Among several SSO protocol, OpenID is said to offer flexibility and security. Unfortunately, the existing OpenID model is prone to phishing attack due to lack of countermeasures to ensure authenticity of OpenID provider. In view of the proliferation of phishing attack that exposed users to fraud website, information theft and unauthorized disclosure, this study attempts to identify and propose a suitable countermeasure in order to thwart phishing attack in OpenID environment. Therefore, this study intends to develop a prototype that implements Page Token in order to mitigate phishing attack. The findings revealed that the Page Token is possible to minimize the potential risk of phishing attack.
This paper presents a research on product-specific web information gathering concept that intends... more This paper presents a research on product-specific web information gathering concept that intends to improve web searching through conventional search engines. Search engines are useful for searching general information; however, the results are not always accurate because they return the results based on keywords occurrences, but not accurateness. Further, users must filter and organize the information accordingly to make the information meaningful. Users must also visit multiple websites independently to check whether the information is relevant. These processes are tedious and very time consuming especially for users who search for specific products information. Hence, we propose a web information gathering model that aims to provide a standard for developing product-specific web searching tools. It was applied in a mobile application called Gold-Trader. The mobile application provides gold and silver prices information to individual or personal traders. It can help individual or personal traders to monitor and compare gold and silver prices from multiple websites without the needs to visit them individually.
UML has been widely used as a modeling tool in software development. Software developed with UML ... more UML has been widely used as a modeling tool in software development. Software developed with UML has to be tested to assure its qua1it.y and to prevent faults. Current practice in UML design evaluation consists of walkthrough and inspections. However, these techniques are too complex and tedious because the reviewer needs to track large amount of information. Furthermore, the lack of assessment of design quality, and deficiency in detecting and correcting design fault in the model can increase the total software development costs and time to market. This indicates that the need of testing and validating design model for web-based applications is high. Therefore, this study intends to justify whether the DCD criteria can be used to derive suitable test cases for web-based application UML design model.
This paper explains our preliminary study on a composite web services model for travel-based webs... more This paper explains our preliminary study on a composite web services model for travel-based websites. The aim of the model is to provide a generic design for incorporating travel information in websites to assist travellers in searching relevant information over the Internet. The preliminary study explores generic features of travel-based websites as well as additional information that travellers always looking for such as currency and weather information, and local map. The approach that we used in this model is to merge difference web services into a single service that can be embedded in travel-based websites. We developed a prototype named QUICK Travel Assistant to demonstrate the model.
We are responsible of the accuracy of all opinion, technical comment, factual report, data, figur... more We are responsible of the accuracy of all opinion, technical comment, factual report, data, figure, illustration, and photographs in this report. We bear full responsibility for the checking whether material submitted is subjected to copyright or ownership right. UUM does not accept any liability for the accuracy of such comment, report, and other technical and factual information and the copyright or ownership right claims.
Advanced Science Letters, May 1, 2017
This paper proposes the architecture and components of a web-based content sequencing system know... more This paper proposes the architecture and components of a web-based content sequencing system known IT-Tutor. It organizes an appropriate sequence of learning content based on individual students’ prior knowledge. The dynamic and flexible organization of learning content is meant to achieve adaptive computer-based learning. IT-Tutor was evaluated in two usability studies; an expert-review, and a user-test. In the first study, five experts in a usability test and instructional design evaluated the system. IT-Tutor has also been evaluated by twelve students in the second study. The usability tests revealed that IT-Tutor is a usable computer-based learning tool that can be used to support classroom teaching or employed in an independent online learning environment.
International journal of interactive mobile technologies, Feb 22, 2019
Modern mobile phones or smartphones have multipurpose functions apart from being used as a device... more Modern mobile phones or smartphones have multipurpose functions apart from being used as a device for voice and text communications. They are also embedded with many useful sensors, including camera, barometer, accelerometer, and digital compass. Unlike other types of sensor, the smartphone camera has been underutilized. This paper aims to fill the gap by analyzing and reviewing the hardware and software components of smartphones and highlighting the potential uses of the smartphone camera to support human daily life activities. A simple search of research papers indexed in Google Scholar was carried out using guided terms. The papers were filtered to match the research questions for this study. Only relevant papers were analyzed and reviewed. The results of the analysis suggested that the rapid development in the smartphone hardware has extended the use of the smartphone cameras beyond personal and social photography. Consequently, applications (apps) based on smartphone cameras emerge, such as barcode readers, document digitizing tools, augmented reality, translation tools, and indoor positioning device. These apps benefit users and facilitate them in their daily life activities.
This paper presents a research concerning users' behaviours towards Web Single-Sign-On (SSO) ... more This paper presents a research concerning users' behaviours towards Web Single-Sign-On (SSO) for accessing e-learning applications.Many web application providers require users to subscribe to their services and authenticate themselves through the use of login credentials. The number of such applications is increasing exponentially which caused ineffective login credentials management among users.This may also contribute to various security issues to both users and application providers.Web SSO, a type of authentication service has been introduced to overcome the issues pertaining password management.However, the utilization of web SSO for accessing educational materials is still at its infancy stage; where many aspects of the technology has not been fully studied and developed.Hence, there is a need to study how users of e-learning applications behave towards web SSO. A course portal named CWS was developed with two authentication methods (i.e., OpenID and traditional). A focus group interview and a laboratory experiment were conducted on students from two higher learning institutions.The aim of these studies is to understand how students behave towards the authentication methods.The results of the study reveal important findings on users' behaviours towards web SSO implementation particularly OpenID.The outcomes are further discussed in terms of applicability of web SSO within e-learning environment.
Social login (SL) allows web application providers to obtain authentication service from social n... more Social login (SL) allows web application providers to obtain authentication service from social network providers for users who own the social network accounts. By approving a consent dialogue, users are granted access to the web applications when login using the SL. It also allows web application providers to access personal information that is associated with the users' social network credentials (SNC). This can be a source to privacy leakage if the users simply approve the consent dialogue without understanding the contents. Therefore, this research intends to explore users' privacy awareness when they login to web applications using SL for the first time particularly using Facebook SNC. An experimental study was conducted to evaluate the effects of SL permission messages on users' privacy awareness. The results suggested that the permission message with privacy alert has significantly increased the participants' awareness on the privacy of their personal information obtained through SNC. The outcome of this study provides an opportunity as a guide to increase users' awareness on the privacy of their personal information obtained from SNC.
As an early view in my doctoral study, this paper submits a framework for evaluating intelligent ... more As an early view in my doctoral study, this paper submits a framework for evaluating intelligent tutoring systems (ITSs), embracing well-known pedagogical theories -- Cognitive Theory of Multimedia Learning and Modality Principles. What I have interested in is that these theories have been successfully applied in e-learning systems design and evaluation, but rare is found on ITSs. Hence, the study
Advances in intelligent systems and computing, 2015
This paper presents a research concerning password management and single-sign-on for accessing ln... more This paper presents a research concerning password management and single-sign-on for accessing lnternet applications. Many lnternet applications require users to subscribe to their services and authenticate themselves through the use of login credentials. The number of such applications is increasing exponentially which caused ineffective login credentials management among users. This study was conducted with two objectives (i) to identify how users manage their usernames and passwords, and (ii) to examine whether users see the benefits of single-sign-on. To achieve these objectives, a focus group interview was conducted on students from a local university. The results of the study suggested that the students did not practice proper password management. Further, it suggested that single-sign-on may not be the immediate solution to improve the students' password management.
Network Intrusion Detection Systems (NIDSs) have always been designed to enhance and improve the ... more Network Intrusion Detection Systems (NIDSs) have always been designed to enhance and improve the network security issue by detecting, identifying, assessing and reporting any unauthorized and illegal network connections and activities. The purpose of this research is to improve on the existing Anomaly Based Intrusion Detection (ABID) method using K-Means clustering technique as to maximize the detection rate and accuracy while minimizing the false alarm. The problem with outliers may disturb the K-Means clustering process as it might be avoided in the clustering process from mixing with the normal data that make the NIDSs become less accurate. Thus this research aims to improve the performance of the ABID systems that balance the loss of information or ignored data in clustering. An integrated machine learning algorithm using K-Means Clustering with discretization technique and Naïve Bayes Classifier (KMC-D+NBC) is proposed against ISCX 2012 Intrusion Detection Evaluation Dataset. The outcome depicts that the proposed method generates better detection rate and accuracy up to 99.3% and 99.5% respectively and reduces the false alarm to 1.2% with better efficiency of 0.03 seconds time taken to build model.