{"title":"The effectiveness of digital game for introductory programming concepts","authors":"W. S. Yue, Wong Lai Wan","doi":"10.1109/ICITST.2015.7412134","DOIUrl":"https://doi.org/10.1109/ICITST.2015.7412134","url":null,"abstract":"The adoption of games to learn introductory programming concepts has been widely used and there were many evidences of the benefits of learning to code in different levels of education even at primary level. Recent studies acknowledged that the use of games to explore coding environment can be motivating, increases female students' perception in computing programming skill and enhances support for computing. This paper discusses the effectiveness of a Digital Game for learning introductory programming concepts, based on the following constructs: (1) playability; (2) multimedia adequacy; (3) ease of use; (4) enjoyment and (5) immersion. This study was conducted with the objective of evaluating the effectiveness of using Digital Games for understanding programming concepts. Participants are 19 students from a local higher education institution. The analysis of collected data uncovered the extent of students' perception in programming concepts learning via exploring Digital Games and the effectiveness and efficiency of using games to learn programming. Overall results showed that the Digital Game has highly playability, multimedia adequacy, enjoyment, immersion and ease of use. In total, 78.9 % of students agreed and strongly agreed that they very quickly familiarized themselves with the game and the elements of the game are consistent with the game structure.","PeriodicalId":249586,"journal":{"name":"2015 10th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114062558","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Assessment of research efforts in surveillance systems","authors":"Christos Ntrigkogias, Nineta Polemi","doi":"10.1109/ICITST.2015.7412108","DOIUrl":"https://doi.org/10.1109/ICITST.2015.7412108","url":null,"abstract":"Modern European societies face growing terrorism threats alongside with other criminal activities and security incidents. Furthermore, the European zone experiences a migration crisis that reinforces the need for development of high technology surveillance systems. The primary objective of this paper is to define assessment criteria and conduct an assessment of innovative surveillance systems developed in various research projects.","PeriodicalId":249586,"journal":{"name":"2015 10th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129369241","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A survey of authentication methods in mobile cloud computing","authors":"G. Reshmi, C. S. Rakshmy","doi":"10.1109/ICITST.2015.7412056","DOIUrl":"https://doi.org/10.1109/ICITST.2015.7412056","url":null,"abstract":"Mobile Cloud Computing (MCC) is an emerging technology which attempts to combine the storage and processing resources of cloud environment with the dynamicity and accessibility of mobile devices. Security, particularly authentication, is fast evolving as a focal area in mobile cloud computing research. This paper comprehensively surveys the various authentication mechanisms proposed so far for mobile cloud computing. We propose a novel classification system for existing authentication methods in MCC. Further, the pros and cons of the various methods are discussed. We present a comparative analysis and recommends future research in improving the surveyed implicit authentication by establishing cryptographic security of stored usage context and actions.","PeriodicalId":249586,"journal":{"name":"2015 10th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123888616","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Dynamic forward error correction algorithm over IP network services for ITU-T G.722.2 codec","authors":"Fatiha Merazka, F. Babich","doi":"10.1109/ICITST.2015.7412123","DOIUrl":"https://doi.org/10.1109/ICITST.2015.7412123","url":null,"abstract":"In this paper, we present the design of a new packet loss concealment (PLC) algorithm based on Dynamic Forward Error Correction (FEC) to improve speech quality degradation caused by packet losses. It is to be implemented for the standard ITU-T AMR-WD G.722.2 codec. The performance proposed scheme is compared with the original method embedded in the standard ITU-T G.772.2. To evaluate its performance, the perceptual evaluation of speech quality (PESQ) and enhanced modified bark spectral distortion (EMBSD) tests under a variety of packet loss rates are used and the obtained results prove that the proposed PLC based Dynamic FEC is better than the concealment method embedded in the ITU-T G.722.2 for speakers (female and male). The performance measures confirm that our PLC method based Dynamic FEC is superior than the one embedded in the standard ITU-T G.722.2.","PeriodicalId":249586,"journal":{"name":"2015 10th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123726940","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Awareness, behaviour and culture: The ABC in cultivating security compliance","authors":"E. Sherif, S. Furnell, N. Clarke","doi":"10.1109/ICITST.2015.7412064","DOIUrl":"https://doi.org/10.1109/ICITST.2015.7412064","url":null,"abstract":"A significant volume of security breaches occur as a result of human aspects and it is consequently important for these to be given attention alongside technical aspects. Researchers have argued that security culture stimulates appropriate employees' behavior towards adherence. Therefore, work within organizations should be guided by a culture of security, with the purpose of protecting the organization's assets and affecting individual's behaviors towards better security behavior. Although security aware individuals can play an important role in protecting organizational assets, the way in which individuals behave with security controls that are implemented is crucial in protecting such assets. Should the behavior of individuals not be security compliant, it could have an impact on an organization's productivity and confidentiality of data. In this paper, key literature relating to security culture in the period of 1999-2014 is reviewed. The objective is to examine the role of security awareness, behavior, and how they can play an important role in changing the existing culture to a security culture. Some relevant security culture tools have been introduced. An overall framework to understand how security awareness and behavior can play an important role in changing an existing culture to a security culture has been developed.","PeriodicalId":249586,"journal":{"name":"2015 10th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127750339","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Toward power consumption in partitioned Wireless Sensors Networks routing technique","authors":"Ahmad Al-Khasawneh","doi":"10.1109/ICITST.2015.7412097","DOIUrl":"https://doi.org/10.1109/ICITST.2015.7412097","url":null,"abstract":"The increasing research in the areas of Wireless Sensors Networks (WSNs) have a positive impact in the world and have gained increasing attention from both the research community and actual users. A wireless sensor network compromises of a large number of diffuse independent sensors; these sensors is to be used to control an event range in scale from large national environmental pollution monitoring networks, to small scale body-worn medical monitoring systems. The sensor node consists of a wireless radio, processor and a variety of sensors. The sensors are operated with restricted capacity batteries, which of course have a lifetime, so to preserve power; the transmission/reception by the sensor radio should be decreased as much as possible. The potential contribution of this paper is to propose a theoretical model toward power consumption technique based on the idea of partitioning wireless network and we will use heinzelman equations using realistic variables for example, the initial power for each node, the distance between nodes, and the message size.","PeriodicalId":249586,"journal":{"name":"2015 10th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115704328","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cyber-physical testbed — The impact of cyber attacks and the human factor","authors":"Yannis Soupionis, T. Benoist","doi":"10.1109/ICITST.2015.7412114","DOIUrl":"https://doi.org/10.1109/ICITST.2015.7412114","url":null,"abstract":"The case of Critical Infrastructures (CIs), and especially Cyber-Physical CIs, which nowadays rely on computers and the Internet for their operation, is an important research area. Decentralized Critical Infrastructure management systems play a key role in reducing costs and improving the quality of service of industrial processes, but also they introduce various security vulnerabilities. In this paper, we focus on the implementation of a Cyber-Physical testbed which includes physical equipment and the cyber security issues on the communication channel between the CIs, such as a power grid, a transportation infrastructure (railway) and the energy market. We simulate the energy (spot) market auctions and the power grid network, but we emulate the ICT information part which is the focus of our work. We set in motion a well-known attack, Denial-of-Service (DoS), in Cyber-Physical systems and we are able to identify the consequences not only in power distribution network but also in financial and transportation area.","PeriodicalId":249586,"journal":{"name":"2015 10th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"8 Suppl 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116934125","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Visual location recognition using smartphone sensors for indoor environment","authors":"Guanyuan Feng, Xuezhi Tan, Lin Ma","doi":"10.1109/ICITST.2015.7412135","DOIUrl":"https://doi.org/10.1109/ICITST.2015.7412135","url":null,"abstract":"Vision based localization is an essential problem for many applications, such as augmented reality and pedestrian navigation. In this paper, a visual location recognition system based on multi-sensor information is proposed. In this system, a database called visual map is established before the localization stage. The visual map contains the visual features and the corresponding positional features. The basic idea of this localization method is to match two user's query images with two database images by image retrieval and feature matching, and then we try to acquire the query camera poses by the use of the IMU and the electronic compass device on the smartphone. On the basis of the query camera poses and the positions of the matched features, a triangulation localization algorithm is introduced to determine the location of the user. The specific experiments for this visual location recognition system are performed, and the results demonstrate that this method can achieve the excellent performance in location recognition.","PeriodicalId":249586,"journal":{"name":"2015 10th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127144688","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Detecting intelligent malware on dynamic Android analysis environments","authors":"S. Singh, Bharavi Mishra, Saket Singh","doi":"10.1109/ICITST.2015.7412132","DOIUrl":"https://doi.org/10.1109/ICITST.2015.7412132","url":null,"abstract":"In recent years, static and dynamic analysis of Smartphone applications has been popularized. This kind of analysis have assisted in detecting malware among other applications. In order to evade detection on emulator based dynamic analysis environments, number of malware rely on specific details of the emulator and user input, such as IMEI number, button press, phone call, accelerometer readings, etc. Once malware identifies an emulator, it can act benignly and pass the analysis undetected. To enhance the detection capability of dynamic analysis environments, we present a framework which enhances their capibility to detect intelligent mawares. The objective of the framework is twofold, to emulate artificial user behavior and help unravel malware's true behavior. Our framework is divided into two major categories based on dynamic and static properties of a Smartphone. The framework is tested with an open-source sandbox environment and an existing emulator detection application.","PeriodicalId":249586,"journal":{"name":"2015 10th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131845890","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Fingerprint security for protecting EMV payment cards","authors":"Himanshu Vats, Ron Ruhl, S. Aghili","doi":"10.1109/ICITST.2015.7412065","DOIUrl":"https://doi.org/10.1109/ICITST.2015.7412065","url":null,"abstract":"EMV chip based payments cards have been used to combat fraudulent transactions such as counterfeit, lost and stolen cards. Despite of improved security measures payment cards are still not immune to some known threats and vulnerabilities such as card cloning, eavesdropping at POS and shoulder sniffing. A comprehensive study of the all possible threats and present security measures in payments cards is presented. This paper describes how fingerprint can be used for securing payment cards and further enhance the security of EMV environment. Comparison with presently practiced and implemented CHIP and PIN methods is shown elaborating the enhancing security and transaction time reduction by biometric cardholder authentication. Different methods of implementing fingerprint security in payment cards are provided. Major attacks on fingerprinting authentication are discussed and mitigation strategy is presented.","PeriodicalId":249586,"journal":{"name":"2015 10th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124940079","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}