{"title":"Decision Making on Introducing of Blockchain Technology in Croatian Public Administration","authors":"Alen Kišić, N. Vrček","doi":"10.32591/coas.ojit.0701.01001k","DOIUrl":"https://doi.org/10.32591/coas.ojit.0701.01001k","url":null,"abstract":"Blockchain technology has many features enabling great potential to transform every aspect of life. In this paper, we consider application of Blockchain in public administration sector. We utilize the Value Measuring Methodology (VMM) for the purpose of the profitability assessment of introducing Blockchain into the public administration. This process is conducted by multi criteria decision making with a group of experts. Results of cost-effectiveness analysis and AHP analysis, which are part of VNM, indicated direct user value as the largest benefit, followed by operational value for the State. Potential risks are identified along with the costs summarizing an analysis.","PeriodicalId":210545,"journal":{"name":"Open Journal for Information Technology","volume":" 21","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-05-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140990542","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Classifier Model to Detect Phishing Emails Using Ensemble Technique","authors":"Fredrick Nthurima, Abraham Matheka","doi":"10.32591/coas.ojit.0602.06157n","DOIUrl":"https://doi.org/10.32591/coas.ojit.0602.06157n","url":null,"abstract":"Phishing attacks usually take advantage of weaknesses in the way users behave. An attacker sends an email to the recipient that mimics a genuine email with phishing links. When the recipient clicks on the embedded links, the attacker can harvest critical information like credit card numbers, usernames or passwords as a result of entering the compromised account. Online surveys have put phishing attacks as the leading attack for web content, mostly targeting financial institutions. According to a survey conducted by Ponemon Institute LLC 2017, the loss due to phishing attacks is about $1.5 billion annually. This is a global threat to information security, and it’s on the rise due to IoT (Internet of Things) and thus requires a better phishing detection mechanism to mitigate these losses and reputation injury. This research paper explores and reports the use of multiple machine learning models by using an algorithm called Random Forest and using more phishing email features to improve the accuracy of phishing detection and prevention. This project will explore the existing phishing methods, investigate the effect of combining two machine learning algorithms to detect and prevent phishing attacks, design and develop a supervised classifier to detect and prevent phishing emails and test the model with existing data. A dataset consisting of benign and phishing emails will be used to conduct supervised learning by the model. Expected accuracy is 99.9%, with a rate of less than 0.1% for False Negatives (FN) and False Positives (FP).","PeriodicalId":210545,"journal":{"name":"Open Journal for Information Technology","volume":"2007 28","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-12-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139160304","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Fredrick Nthurima, Abraham Mutua, Waithaka Stephen Titus
{"title":"Detecting Phishing Emails Using Random Forest and AdaBoost Classifier Model","authors":"Fredrick Nthurima, Abraham Mutua, Waithaka Stephen Titus","doi":"10.32591/coas.ojit.0602.03123n","DOIUrl":"https://doi.org/10.32591/coas.ojit.0602.03123n","url":null,"abstract":"Phishing attack occurs when a phishing email which is a legitimate-looking email, designed to lure the recipient into believing that it is a genuine email to open and click malicious links embedded into the email. This leads to user reveal sensitive information such as credit card number, usernames or passwords to the attacker thereby gaining entry into the compromised account. Online surveys have put phishing attack as the leading attack for web content mostly targeting financial institutions. According to a survey conducted by Ponemon Institute LLC 2017, the loss due to phishing attack is about $1.5 billion per year. This is a global threat to information security and it’s on the rise due to IoT (Internet of Things) and thus requires a better phishing detection mechanism to mitigate these loses and reputation injury. This research paper explores and reports the use of a combination of machine learning algorithms; Random Forest and AdaBoost and use of more phishing email features in improving the accuracy of phishing detection and prevention. This project will explore the existing phishing methods, investigate the effect of combining two machine learning algorithms to detect and prevent phishing attacks, design and develop a supervised classifier which can detect phishing and prevent phishing emails and test the model with existing data. A dataset consisting of both benign and phishing emails will be used to conduct a supervised learning by the model. Expected accuracy is 99.9%, False Negative (FN) and False Positive (FP) rates of 0.1% and below.","PeriodicalId":210545,"journal":{"name":"Open Journal for Information Technology","volume":"26 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134991766","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Hybrid Model for Detecting Insurance Fraud Using K-Means and Support Vector Machine Algorithms","authors":"Brian Ndirangu Muthura, Abraham Matheka","doi":"10.32591/coas.ojit.0602.05143m","DOIUrl":"https://doi.org/10.32591/coas.ojit.0602.05143m","url":null,"abstract":"Private stakeholders and governments across the globe are striving to improve the quality and access of healthcare services to citizens. The need to improve healthcare services, coupled with the increase in social awareness and improvement of people’s living standards, has seen an increase in medical policyholders in the insurance industry. Even so, the healthcare sector is grappled with increased costs every other year, leading to revision of premiums and increased costs for the policyholders. One of the main factors contributing to the increased costs is fraudulent claims raised by the service providers and the policyholders, leading to unprecedented risks and losses for insurance firms. The insurance industry has set up fraud detection and mitigation systems to mitigate losses brought about by fraudulent claims, which come in two flavors: rule-based systems and expert claims analysis. With rule-based systems, conditions such as missing details, location of the claim vis a vis the location of the policyholder, among other rules, are evaluated by systems to assess the validity of the claims. On the other hand, insurance firms rely on the human intervention of experts using statistical analyses and artificial rules to detect fraudulent claims. The rule-based and expert analysis methods fail to detect patterns or anomalies in claims, which is central to efficient fraud detection. Data mining and machine learning techniques are being leveraged to detect fraud. This automation presents enormous opportunities for identifying hidden patterns for further analysis by insurance firms. This research aims to analyze a hybrid approach to detect medical insurance fraud using both K-Means (unsupervised) and Support Vector Machines (supervised) machine learning algorithms.","PeriodicalId":210545,"journal":{"name":"Open Journal for Information Technology","volume":"77 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139277388","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Managing the Implementation of Information Technology in Schools","authors":"Alaa Sarsour, Raed Sarsour","doi":"10.32591/coas.ojit.0602.04137s","DOIUrl":"https://doi.org/10.32591/coas.ojit.0602.04137s","url":null,"abstract":"Modern technology has had a transformative impact on educational systems, learning, and teaching practices. The advent of the internet and the development of various digital tools have opened up new opportunities for education. Unfortunately, teachers and scholars, who may have educated themselves or being educated in a whole different era and time of schooling, find it really difficult to teach in the new modern ways. Different sides often blame each other for not being ready to innovations: the public blames teachers and superintendents for not adopting new technology in school and in turn teachers blame the state itself for not providing enough money and time. The authors claim that steps must be taken to implement IT in schools, and list possible steps.","PeriodicalId":210545,"journal":{"name":"Open Journal for Information Technology","volume":"28 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139277969","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Adebola Victor Omopariola, Chukwudi Nnanna Ogbonna, Felix Uloko, Monday Abdullahi
{"title":"Automated Assessment System Using Machine Learning Libraries","authors":"Adebola Victor Omopariola, Chukwudi Nnanna Ogbonna, Felix Uloko, Monday Abdullahi","doi":"10.32591/coas.ojit.0602.02097o","DOIUrl":"https://doi.org/10.32591/coas.ojit.0602.02097o","url":null,"abstract":"Assessment and the grading of students is a task that has been done for as long as school has existed. This was previously done by teachers in primary and secondary, lecturers for institutions like JAMB and lecturers in schools. Up until now students’ marks were influenced by other external factors such as bad handwriting, lengthy paragraphs, roundabout way of speaking rather than going straight to the point and the sheer number of assignments the lecturer has to mark. This has resulted in students getting lower or higher marks than they should be awarded. This project is to create an ML (Machine Learning) powered assessment system that will take the assignment questions and the marking scheme and award the student the marks similar to what the ideal lecturer would have given. This will also reduce the time the lecturers spend on marking and ensure the students get their results on time. This project will be made with Python and machine learning and will be tested with a number of potential answers to the questions and their grading’s. This will enable system to be able to grade assignments as soon as they are uploaded. This research will be limited by the fact that the system can only handle the marking of short sentences accurately and not long paragraphs. The system is also limited by the fact that it can only mark with the aid of the marking scheme and not without it so it is not a truly intelligent model in that regard. The research showed that the system is indeed capable of obtaining the similarity between two paragraphed answers provided but it needs extras to produce the most accurate results.","PeriodicalId":210545,"journal":{"name":"Open Journal for Information Technology","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135168187","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Adebola Victor Omopariola, Raphael Ozighor Enihe, Chukwudi Nnanna Ogbonna, Felix Uloko, Manasseh Chukwudubem Ezeocha, Monday J. Abdullahi
{"title":"Design and Implementation of a Tailoring Management System (Virlor)","authors":"Adebola Victor Omopariola, Raphael Ozighor Enihe, Chukwudi Nnanna Ogbonna, Felix Uloko, Manasseh Chukwudubem Ezeocha, Monday J. Abdullahi","doi":"10.32591/coas.ojit.0602.01067o","DOIUrl":"https://doi.org/10.32591/coas.ojit.0602.01067o","url":null,"abstract":"The tailoring method has a popular view of being a Manuel method, in which clients must attain out to the tailor physically, select the materials for their clothing, provide their measurements, and, in most circumstances, return to the tailor shop to pick it up, consuming more time and more resources. as time progresses the provision of services has modernized, and even preference of service provision of customers has also modernized as well, customers of recent would prefer to employ mobile services that can easily reach them rather than Manuel conventional service deliveries. in this recent society, the majority would prefer a service that is automated to the point they put little or no effort into acquiring these serviced thus the goal of this project, the project is aims to automate the tailoring management services which is manually maintained. After the automation this will mean better services, data security, quick search, and also paperless environment. The project’s major goal is to automate these services in such a way that tailors will have more work opportunities. Every user of the system will have to log into the system using username and password so that security and authentication will be ensured. After logging in, a consumer can place an order, monitor the status of their outfit, and even provide feedback. This system would aid both tailors and customers as it improves effectiveness and efficiency, this system also help in realizing the vision 2030 where the Nigerian government wants its people to be digitally informed and automate all government bodies and ministries, thereby embracing Electronic Governing.","PeriodicalId":210545,"journal":{"name":"Open Journal for Information Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116894437","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cyberdeviance in the Western Balkans and ICT-Media-Based Protection","authors":"Ilda Kashami, Arjan Curi","doi":"10.32591/coas.ojit.0601.05059k","DOIUrl":"https://doi.org/10.32591/coas.ojit.0601.05059k","url":null,"abstract":"The objective of the present paper research is to explore some of the basic aspects of the relationship between cyber-deviant behaviors and the role of border security and cyber security structures that exist in the cyber-digitalization process. The present article intersects diagonal aspects of deviant cyberculture and the role of media and police officers in the screening and prevention of criminal extreme acts. The research also provides a reflective view of consumerism that digitalization brings to the constant formation of adolescents. The implementation of misguided protection strategies and consumer safety from hazardous navigation directly affects the growth of passive and active criminality, qualitative changes in attitudes and behavior by pointing more towards antisocial deviance and crawling at the base ranging from national and regional security and internet addiction.","PeriodicalId":210545,"journal":{"name":"Open Journal for Information Technology","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115811949","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Educational Data Analytics and Fog Computing in Education 4.0","authors":"Jackson Machii, Julius Murumba, E. Micheni","doi":"10.32591/coas.ojit.0601.04047m","DOIUrl":"https://doi.org/10.32591/coas.ojit.0601.04047m","url":null,"abstract":"Universities are generating massive amounts of educational data. Most universities are now focusing on how to harness that data to optimize and visualize it to provide better and more extended education services. Given this scenario, a literature review was used to conduct this study guided by the following objectives: (1) Assess suitable fog computing and educational data analytics architectures; (2) Examine the opportunities offered by fog computing and educational data analytics; (3) Investigate fog computing and educational data analytics challenges; and (4) Examine disruptions and future directions of these technologies in Education 4.0. The study concludes that institutions must use integrated data analytics techniques and distributed technology systems to make decisions about administration, resource allocation, student retention, performance, and improvement strategies. The study also identified the challenges of using fog computing and educational data analytics and concludes that education 4.0 is a learning style that is aligned with the fourth industrial revolution, requiring transformational learning readiness.","PeriodicalId":210545,"journal":{"name":"Open Journal for Information Technology","volume":"100 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132401160","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Drivers and Barriers to Adopting ICT: Mexican EFL Primary School Teachers’ Perceptions","authors":"José Joaquín Enrique Erguera Guerreo","doi":"10.32591/coas.ojit.0601.03033g","DOIUrl":"https://doi.org/10.32591/coas.ojit.0601.03033g","url":null,"abstract":"Information and Communication Technologies (henceforth ICTs) have been widely used by English as a Foreign Language (EFL) teachers as a tool to enhance language learning. This study investigated the drivers and barriers of ICT adoption as perceived by EFL teachers at the primary school level in Mexico. A phenomenological approach was adopted, and semi-structured interviews were used to collect the data. The findings showed that teachers’ positive attitudes towards technology, attention motivation, having access to ICT resources, and enhancing language learning are the main drivers which facilitate the use and adoption of ICT in their classrooms, while, lack of resources, emerging challenges when using ICT resources and teachers’ demotivation are the main barriers. The study concluded that the current findings may help to better understand those factors, and hence inform EFL teachers, policymakers, and education authorities to develop actions to overcome the barriers and promote the pedagogical use of ICT.","PeriodicalId":210545,"journal":{"name":"Open Journal for Information Technology","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114956057","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}