Iman Farhadian Dehkordi, K. Manochehri, Vahe Aghazarian
{"title":"Internet of Things (IoT) Intrusion Detection by Machine Learning (ML): A Review","authors":"Iman Farhadian Dehkordi, K. Manochehri, Vahe Aghazarian","doi":"10.17576/apjitm-2023-1201-02","DOIUrl":"https://doi.org/10.17576/apjitm-2023-1201-02","url":null,"abstract":"","PeriodicalId":160138,"journal":{"name":"Asia-Pacific Journal of Information Technology and Multimedia","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115916455","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Anatomy of Network Security Execution through Utilizing SPSS to Evaluate Public Wi-Fi","authors":"Amani Balqis Johal, Aws A. Abdulsahib","doi":"10.17576/apjitm-2023-1201-06","DOIUrl":"https://doi.org/10.17576/apjitm-2023-1201-06","url":null,"abstract":"The increasing number of internet users has had a significant influence on the functions of Wi-Fi. Due to its extensive availability and free service, Wi-Fi has become an indispensable instrument for communication, especially among students. The continuous expansion of Wi-Fi provides an opportunity for malevolent attackers to undertake cyberattacks using public Wi-Fi as a route. Therefore, a full grasp of Wi-Fi dangers is required, which brought to this study that attempts to discuss the usage and awareness of public Wi-Fi among students. It is to study the human behaviour of students by doing the sampling of research, which involves distributing the survey questions to primary and secondary students at Alnoor International School to assess whether they are alert to the implications of using public Wi-Fi. To determine the findings of the study, chart forms are used. It showed that most students are aware of how dangerous public Wi-Fi can be, but they don't know enough about security to know how to protect themselves from potential dangers and threats from hackers.","PeriodicalId":160138,"journal":{"name":"Asia-Pacific Journal of Information Technology and Multimedia","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125398011","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Investigating The Correlation between The Five Major Personality Traits and a Student’s Online Habits","authors":"Siti Maisarah Zurkarnain, Aws A. Abdulsahib","doi":"10.17576/apjitm-2023-1201-04","DOIUrl":"https://doi.org/10.17576/apjitm-2023-1201-04","url":null,"abstract":"","PeriodicalId":160138,"journal":{"name":"Asia-Pacific Journal of Information Technology and Multimedia","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133532761","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mohamed Yassin Abdelwahab, Zainab Abu Bakar, Yazeed Al Moaiad
{"title":"Arabic Text Summarization using Pre-Processing Methodologies and Techniques","authors":"Mohamed Yassin Abdelwahab, Zainab Abu Bakar, Yazeed Al Moaiad","doi":"10.17576/apjitm-2023-1201-05","DOIUrl":"https://doi.org/10.17576/apjitm-2023-1201-05","url":null,"abstract":".","PeriodicalId":160138,"journal":{"name":"Asia-Pacific Journal of Information Technology and Multimedia","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124596831","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Nur Rahmah Zulkifli, N. Sahari, Nor Azan Mat Zin, Rosadah Abdul Majid
{"title":"Inclusive Design Requirement in Designing Accessibility for Low Cognitive Users","authors":"Nur Rahmah Zulkifli, N. Sahari, Nor Azan Mat Zin, Rosadah Abdul Majid","doi":"10.17576/apjitm-2023-1201-01","DOIUrl":"https://doi.org/10.17576/apjitm-2023-1201-01","url":null,"abstract":"","PeriodicalId":160138,"journal":{"name":"Asia-Pacific Journal of Information Technology and Multimedia","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131041674","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Senibina Anotasi Data untuk Mengesan Kemurungan Secara Automatik","authors":"Yun Yao Chang, Nazlia Omar","doi":"10.17576/apjitm-2023-1201-03","DOIUrl":"https://doi.org/10.17576/apjitm-2023-1201-03","url":null,"abstract":"","PeriodicalId":160138,"journal":{"name":"Asia-Pacific Journal of Information Technology and Multimedia","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131535023","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Culturicon Design Model: A Case of Designer’s Validation Process","authors":"Mohd Zhafri Mohd Zukhi, H. Husni, Azham Hussain","doi":"10.17576/apjitm-2023-1201-07","DOIUrl":"https://doi.org/10.17576/apjitm-2023-1201-07","url":null,"abstract":"As more people own smartphones, using visual elements like emoticons, emojis, and stickers in mobile messaging applications has become popular. Smartphone users have grown accustomed to using these visual elements because of their positive effects on communication through applications. Even Oxford Dictionary named one of these visual elements the word of the year. However, due to cultural differences, these visual elements have limitations such as limited selection, misinterpretation, and misuse. To overcome the limitations, this study presented a Culturicon Design Model combining cultural dimensions and Human-Computer Interaction icon design principles. In doing so, the model must be validated before its efficacy can be established. This paper aims to outline the designer’s validation process. The designer developed Culturicon samples based on the model as part of the validation process. Then, they validated the model by responding to the validation form. The findings revealed that all designers agreed that the model is understandable and practical for designing Culturicon.","PeriodicalId":160138,"journal":{"name":"Asia-Pacific Journal of Information Technology and Multimedia","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127486019","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Nur Athirah Hassan Basri, Rahmita Wirza O.K. Rahmat, H. Madzin, R. Hod
{"title":"A User Study on Virtual Tutor Mobile Augmented Reality from Undergraduate Medical Student Perspectives","authors":"Nur Athirah Hassan Basri, Rahmita Wirza O.K. Rahmat, H. Madzin, R. Hod","doi":"10.17576/apjitm-2023-1201-08","DOIUrl":"https://doi.org/10.17576/apjitm-2023-1201-08","url":null,"abstract":"","PeriodicalId":160138,"journal":{"name":"Asia-Pacific Journal of Information Technology and Multimedia","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116828412","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"PRIVACY BASED CLASSIFICATION MODEL OF PUBLIC DATA BY UTILIZING TWO-STEPS VALIDATION APPROACH","authors":"M. Hussin, R. A. Raja Mahmood","doi":"10.17576/apjitm-2022-0101-10","DOIUrl":"https://doi.org/10.17576/apjitm-2022-0101-10","url":null,"abstract":"Digital information has become a trend and is integral to modernizing and leveraging various resources in Information Technology (IT). Vast data and information can be obtained anytime and anywhere at our fingertips through ICT facilities. This is considered public data due to its being shared publicly, such as on social media. Public data can be arranged according to various criteria and formats. Users have a right to understand which data can be publicly shared and which data is supposed to be in a private state. However, people always misunderstand and mislead which data needs to be secured and which can be shared. It is further critical when this public data is already exposed to data breaches and data theft. In this work, we propose a data privacy classification approach for public data where this data resides on digital platforms. It aims to inform the public about the level of data privacy before they reveal it on open and free digital platforms. We employed three different privacy classes: low, medium, and high. In response to that, we identified entities of public data that refer to digital information platforms such as websites, mobile apps, and online systems. We then dug further into the data attributes of each entity. The public data attributes are sorted and passed to respondents to obtain their input regarding their decisions on which privacy class is suitable for the respective attribute. Based on the input from respondents, we then used a Naive Bayesian classifier to generate probability weightage for re-assigning the data attributes into the most suitable privacy class. This two-level data classification stage brings better perspectives on data privacy. This modified version of the public data privacy class is then verified by the respondents to analyze their preferences while measuring users’ satisfaction. According to the results, our public data privacy classification model meets public expectations. Optimistically, well-organized data classification contributes to better data practices.","PeriodicalId":160138,"journal":{"name":"Asia-Pacific Journal of Information Technology and Multimedia","volume":"138 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132754091","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"THE USABILITY EVALUATION OF ADOLESCENT DEPRESSION SCREENING MODEL USING COGNITIVE WALKTHROUGH","authors":"Nurul Fasihah Jamaludin, Tengku Siti Meriam Tengku Wook","doi":"10.17576/apjitm-2022-0101-06","DOIUrl":"https://doi.org/10.17576/apjitm-2022-0101-06","url":null,"abstract":"This study focuses on evaluating the usability of a newly developed model for depression screening. The model was designed to address the issue of adolescent motivation during the gamification-based depression screening. Depression causes adolescent to experience emotional changes including hopelessness, lack of self-confidence and a sense of worthlessness which ultimately makes them unmotivated to undergo a face-to-face depression screening in medical institution. In this regard, the model applied gamification elements comprises game mechanics and components, extrinsic and intrinsic motivational elements, and types of user. A prototype was developed to validate the generated model. Subsequently, the prototype was evaluated using the cognitive walkthrough method which examines its usability. Five respondents with expertise in the field of adolescent counselling and human-computer interaction were involved in the evaluation. The analysis found that the model has a high level of usability, as all respondents have given positive feedback on the sets of task provided. These findings validated the model in diagnosing depression through the inspection testing. It can be concluded that the model could be adopted as a guideline in developing an actual depression screening system. The model has also undergone some improvements, specifically by providing clearer details on every gamification design element involved.","PeriodicalId":160138,"journal":{"name":"Asia-Pacific Journal of Information Technology and Multimedia","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115488268","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}