SlideShare a Scribd company logo
1 of 9
Download to read offline
TOP CITED 2
ARTICLES IN 2017
INTERNATIONAL JOURNAL OF
MANAGING INFORMATION
TECHNOLOGY (IJMIT)
ISSN: 0975-5586 (ONLINE); 0975-5926 (PRINT)
http://airccse.org/journal/ijmit/ijmit.html
AUTONOMIC FRAMEWORK FOR IT SECURITY GOVERNANCE
Sitalakshmi Venkatraman
School of Engineering, Construction and Design (IT), Melbourne Polytechnic, Australia
ABSTRACT
With the recent service enhancements over the Internet, organisations are confronted with a growing
magnitude of security intrusions and attacks. Current intrusion detection strategies have not been effective in
the long term, as new and obfuscated security attacks keep emerging evading the surveillance mechanisms.
With information technology (IT) playing a pivotal role in today’s organizational operations and value
creation, security regulatory bodies have identified this situation not solely as a technology issue, rather due
to the weakness of an organisation's risk management practices and IT governance. Hence, recent attention
has embarked on formulating proactive IT security governance for organisational sustenance. This paper
proposes an autonomic framework for IT security governance that postulates a selflearning adaptive
mechanism for an effective intrusion detection and risk management. Such a framework would facilitate
autonomic ways of integrating existing context-dependent knowledge with new observed behaviour patterns
gathered from network as well as host for detecting unknown security attacks effectively using mobile
agents. In addition, this paper provides a roadmap for autonomic IT security governance by applying the
proposed framework The roadmap employs a continuous improvement feedback loop. for achieving the
targeted quality of service (QoS) in an organisation.
KEYWORDS
IT Security Governance, Intrusion Detection, Autonomic Framework, Self-learning & Mobile Agents
FOR MORE DETAILS:
http://aircconline.com/ijmit/V9N3/9317ijmit01.pdf
VOLUME LINK: http://airccse.org/journal/ijmit/vol9.html
REFERENCES
[1] Lab K., (2015) “Kaspersky Security Bulletin,” Kaspersky Lab, Tech. Rep.
[2] Symantec, (2016) “Internet Security Threat Report: Trends for 2016,” Symantec, Tech. Rep. vol. 21, p. 81.
[3] McAfee Labs,“McAfee Labs Threats Report,” Intel Security, Tech. Rep., 03 2016.
[4] Microsoft, “Microsoft Security Intelligence Report,” Microsoft, Tech. Rep., 12 2015.
[5] HP Enterprise, “HPE Security Research Cyber Risk Report,” Hewlett Packard Enterprise, Tech. Rep., 2016.
[6] IBM X-Force, (2015) “IBM X-Force Threat Intelligence Report 2016,” IBM, Tech. Rep., 2016. [7]
Vasilomanolakis, E. Karuppayah, S. Mühlhäuser, M. and Fischer, M. “Taxonomy and Survey of Collaborative
Intrusion Detection,” ACM Computing Surveys, vol. 47, no. 4, pp. 55:1–55:33. [8] Sommer R. and Paxson V.,
(2010) “Outside the Closed World: On Using Machine Learning for Network Intrusion Detection,” in
Proceedings of the 2010 IEEE Symposium on Security and Privacy. IEEE Computer Society, pp. 305–316.
[9] Jang, J.-w. Yun, J. Mohaisen, A. Woo, J. and. Kim, H. K (2016) “Detecting and Classifying Method Based
on Similarity Matching of Android Malware Behavior with Profile,” SpringerPlus, vol. 5, no. 1, p. 1.
[10] Nguyen, A. Yosinski, J. and Clune, J. (2015) “Deep Neural Networks Are Easily Fooled: High Confidence
Predictions for Unrecognizable Images,” The IEEE Conference on Computer Vision and Pattern Recognition.
[11] Schmugar, C. (2007) "The future of cybercrime", Sage: Security Vision From McAfee Avert Labs, 1(2), 1
5.
[12] Faruki, P. Bhandari S., Laxmi, V. Gaur M., and Conti, M. (2016) “DroidAnalyst: Synergic App Framework
for Static and Dynamic App Analysis,” in Recent Advances in Computational Intelligence in Defense and
Security. Springer, pp. 519–552.
[13] Li, W.-X. Wang, J.-B. Mu, D.-J. and Yuan, Y. (2011) “Survey on Android Rootkit,” Microprocessors, vol.
32. no.2, pp. 68-72.
[14] Kim, S. Park, J. Lee K., You, I. and Yim K., (2012) “A Brief Survey on Rootkit Techniques in
Malicious Codes,” Journal of Internet Services and Information Security, vol. 2, no. 3/4, pp. 134–147.
[15] Lam, P. Wang L.-L., Ngan, H. Y. T. Yung, N. H. C. and Yeh, A. G.-O. (2015) “Outlier Detection In Large-
Scale Traffic Data By Naïve Bayes Method and Gaussian Mixture Model Method,” arXiv.
[16] Yang, J. Deng, T. and Sui, R. (2015) “An Adaptive Weighted One-Class SVM for Robust Outlier
Detection,” in Proceedings of the 2015 Chinese Intelligent Systems Conference. Springer, pp. 475– 484.
[17] Pereira, G.V. Luciano, E. M. Macadar, M. A. and Daniel, V.M. (2013) “Information technology
governance practices adoption through an institutional perspective: The perception of brazilian and american
CIOs,” 46th Hawaii International Conference on System Sciences, pp. 4446–4455.
[18] Turel O. and Bart, C. (2014) “Board-level IT governance and organizational performance,” Eur. J. Inf.
Syst., vol. 23, no. 2, pp. 223–239.
[19] Borth, M. A., and Bradley, R. V. (2009). "Unexplored Linkages between Corporate Governance and IT
Governance: An Evaluation and Call to Research Information Technology Governance and Service
Management: Frameworks and Adaptations" IGI Global. pp. 202-220.
[20] Buchwald, A. Urbach, N. and Ahlemann, F. (2014) “Business value through controlled IT: Toward an
integrated model of IT governance success and its impact,” J. Inf. Technol., vol. 29, no. 2, pp. 128– 147.
[21] Yu, S. Wang, G. and Zhou, W. (2015) “Modeling Malicious Activities in Cyber Space,” IEEE
Network, vol. 29, no. 6, pp. 83–87.
[22] IFAC (2004), "Enterprise Governance-Getting the Balance Right", PAIB Report to IFAC.
[23] Cumps, B., Viaene, S., & Dedene, G. (2012). "Linking the Strategic Importance of ICT with Investment in
Business-ICT Alignment: An Explorative Framework". In W. Van Grembergen & S. De Haes (Eds.), Business
Strategy and Applications in Enterprise IT Governance (pp. 37-55). Hershey, Pennsylvania, USA: IGI Global.
[24] De Haes S. and Van Grembergen, W. (2015) "Enterprise Governance of Information Technology", Cham:
Springer International Publishing.
[25] ITGI (2003), "Board briefing on IT governance", 2nd Edition, Information Systems Audit and Control
Foundation, 2003.
[26] Bartens, Y ., Schulte, F., & Vos, S. (2014). "E-Business IT Governance Revisited: An Attempt towards
Outlining a Novel Bi-directional Business/IT Alignment in COBIT5", Paper presented at the 47th
Hawaii
International Conference on System Sciences (HICSS), 2014.
[27] Chou, Y.-C., Chuang, H. H.-C., & Shao, B. B. M. (2014). "The impacts of information technology on total
factor productivity: A look at externalities and innovations". International Journal of Production
Economics, 158, 290-299.
[28] ISO/IEC 38500, (2015) "Information Technology - Governance of IT for the organization" ISO/IEC
38500:2015, 2nd Edition, ISO:Switzerland.
[29] OECD (2005) Corporate Governance. OECD glossary of statistical terms, Organisation for Economic Co
operation and Development (OECD),
[30] Stroud, R.E. (2012). "Introduction to COBIT 5" . ISACA.
[31] Kephart, J. and Chess, D. M. (2003) "The vision of autonomic computing", IEEE Computer, vol. 36, no. 1,
pp. 41-50.
[32] Ganek, A. G. and Corbi, T. A. (2003) "The Dawning of the Autonomic Computing Era". IBM Systems
Journal. vol. 42, no. 1, pp. 5-18.
[33] Dudley, G., Joshi, N., Ogle, D.M., Subramanian, B. and Topol, B.B. (2004) "Autonomic self-healing
systems in a cross-product IT environment", Proceedings of the International Conference on Autonomic
Computing), 312-313.
[34] Dobson, S. Sterritt, R. Nixon, P. and Hinchey. M. (2010) "Fulfilling the vision of autonomic computing".
Computer, vol. 43, pp. 35-41.
[35] Vidales, P., Baliosian, J., Serrat, J., Mapp,G., Stajano, F. and Hopper, A. (2005) "Autonomic System for
Mobility Support in 4G Networks". IEEE Journal on Selected Areas in Communications. vol. 23, no. 12, pp.
2288-2304.
[36] Sancho G., Villemur T. and Tazi S., (2010) “An Ontology-driven Approach for Collaborative Ubiquitous
Systems”, International Journal of Autonomic Computing (IJAC) InderScience Publishers Mai pp 263 – 279
.
[37] Cabri, G., Leonardi, L. and Zambonelli, F. (2002) "Engineering Mobile Agent Applications Via Context-
Dependent Coordination". IEEE Transactions on Software Engineering. vol. 28, no. 11, pp. 1040-1058.
[38] Russell, S.J.; Norvig, P. (2010). “Artificial intelligence: A modern approach” (3rd ed. ed.). Upper Saddle
River: Prentice Hall.
[39] Alizadeh, H. Khoshrou A., and Zúquete, A. (2015) “Traffic Classification and Verification using
Unsupervised Learning of Gaussian Mixture Models,” in International Workshop on Measurements &
Networking. IEEE.
[40] Venkatraman, S. (2010) "Self-Learning Framework for Intrusion Detection", Proceedings of The 2010
International Congress on Computer Applications and Computational Science (CACS 2010), 4- 6 December,
Singapore, pp. 517-520
[41] Cui, T., Ye, H., Teo, H. H., & Li, J. (2015) "Information technology and open innovation: A strategic
alignment perspective". Information & Management, vol. 52, pp. 348-358.
[42] Yu, S. Guo, S. andStojmenovic, I. (2015) “Fool Me if You Can: Mimicking Attacks and Anti-Attacks in
Cyberspace,” IEEE Transactions on Computers, vol. 64, no. 1, pp. 139–151.
CLASSIFICATION OF QUESTIONS AND LEARNING OUTCOME STATEMENTS
(LOS) INTO BLOOM’S TAXONOMY (BT) BY SIMILARITY MEASUREMENTS
TOWARDS EXTRACTING OF LEARNING OUTCOME FROM LEARNING
MATERIAL
Shadi Diab1
and Badie Sartawi2
1
Information and Communication Technology Center, Al-Quds Open University, Ramallah –
Palestine
2
Associate Professor of Computer Science, Al-Quds University, Jerusalem - Palestine
ABSTRACT
Bloom’s Taxonomy (BT) have been used to classify the objectives of learning outcome by dividing the
learning into three different domains; the cognitive domain, the effective domain and the psychomotor
domain. In this paper, we are introducing a new approach to classify the questions and learning outcome
statements (LOS) into Blooms taxonomy (BT) and to verify BT verb lists, which are being cited and used by
academicians to write questions and (LOS). An experiment was designed to investigate the semantic
relationship between the action verbs used in both questions and LOS to obtain more accurate classification
of the levels of BT. A sample of 775 different action verbs collected from different universities allows us to
measure an accurate and clear-cut cognitive level for the action verb. It is worth mentioning that natural
language processing techniques were used to develop our rules as to induce the questions into chunks in
order to extract the action verbs. Our proposed solution was able to classify the action verb into a precise
level of the cognitive domain. We, on our side, have tested and evaluated our proposed solution using
confusion matrix. The results of evaluation tests yielded 97% for the macro average of precision and 90% for
F1. Thus, the outcome of the research suggests that it is crucial to analyse and verify the action verbs cited
and used by academicians to write LOS and classify their questions based on blooms taxonomy in order to
obtain a definite and more accurate classification..
KEYWORDS
Learning outcome; Natural Language Processing, Similarity Measurement; Questions Classification
FOR MORE DETAILS:
http://aircconline.com/ijmit/V9N2/9317ijmit01.pdf
VOLUME LINK: http://airccse.org/journal/ijmit/vol9.html
REFERENCES
[1] Declan Kennedy, Writing and using learning outcomes: a practical guide, Page 18, Cork:
University College Cork, 2006.
[2] EU, Publications Office, Using learning outcome, European Qualifications Framework Series:
Note 4, Luxembourg: ISBN 978-92-79-21085-3, 2011 Page, 2010.
[3] Totschnig, Michael, et al., "Repository services for outcome-based learning" 2010.
[4] Office Of Institutional Effectiveness, Assessment Workbook For Academic Programs, Richmond:
University Of Richmond, 2008.
[5] Advancing Academic Quality in Business Education Worldwide, Bloom’s Taxonomy of
Educational Objectives and Writing Intended Learning Outcomes Statements, Kansas: International
Assembly for Collegiate Business Education, 2016.
[6] M. D. Gall, "The Use of Questions in Teaching," American Educational Research Association,
vol. 40, no. 5, pp. 707-721, 1970.
[7] D. R. Krathwohl, A Revision of Bloom's Taxonomy:, College of Education, The Ohio State
University.
[8] Li and Roth, Learning Question Classifiers, Illinois USA: 19th International Conference on
Compuatational Linguistics (COLING) 2002.
[9] Wen-Chih Chang and Ming-Shun Chung, Automatic Applying Bloom's Taxonomy to Classify and
Analysis the cognition level of english questions items, Taiwan: IEEE, 2009.
[10] Sonal Jain and Jyoti Pareek, Automatic extraction of prerequisites and learning outcome from
learning material, India: Inderscience Enterprises Ltd., 2013.
[11] Syahidah Haris and Nazila Omar, A Rule-based Approach in Bloom’s Taxonomy Question
Classification through Natural Language, Malaysia, 2013.
[12] Syahidah sufi haris and nazlia omar, Bloom's Taxonomy Question Categorization Using Rules
And N-Gram Approach, Malaysia: Journal of Theoretical and Applied Information Technology, 2015.
[13] Payal Biswas et al, Question Classification Using Syntactic And Rule Based Approach, New
Delhi: International Conference on Advances in Computing, Communications and Informatics
(ICACCI), 2014.
[14] Dell Zhang et al, Question Classification using Support Vector Machines, Singapore: ACM 1-
58113- 646-3/03/0007, 2003.
[15] Jibin Fu, Two Level Question Classification Based on SVM and Question Semantic Similarity,
Beijing, China: International Conference on Electronic Computer Technology, 2009.
[16] Anwar Ali Yahya and Addin Osman, Automatic Classification Of Questions Into Bloom's
Cognitive Levels Using Support Vector Machines, Najran: Researchgate, 2011.
[17] K. J. et al, An automatic classifer for exam questions with wordnet and cosine, International
Journal of Emerging Technologies in Learning (iJET) 11(04):142 • April 2016.
[18] Lingling Meng et al, "A Review of Semantic Similarity Measures in WordNet," International
Journal of Hybrid Information Technology, vol. 6, no. 1, p. 1, 2013.
[19] Siddharth Patwardhan et al, "Using Measures of Semantic Relatedness for Word Sense
Disambiguation," Springer, p. 241–257, 2003.
[20] G. V. e. al, "Semantic Similarity Methods in WordNet and Their Application to Information
Retrieval on the Web," ACM New York, NY, USA ©2005, pp. 10-16, 2005.
[21] G. A. Miller, "WordNet - A Lexical Database for English," Communications of the ACM, vol.
38, no. 11, pp. 39-41, 2005. International Journal of Managing Information Technology (IJMIT)
Vol.9, No.2, May 2017 12
[22] C. C. a. R. Mihalcea, Measuring the Semantic Similarity of Texts, University of North Texas:
University of North Texas, 2005.
[23] Z. W. a. M. Palmer, "VERB SEMANTICS AND LEXICAL SELECTION," in In Proceedings of
the 32nd Annual Meeting of the Associations for Computational Linguistics, Las Cruces, New
Mexico,,1994.
[24] Virginia.ED, "Bloom's Taxonomy of Cognitive Skills with Action Verb List Source," University
of Verginia, 20 2 2017. [Online]. Available:
http://avillage.web.virginia.edu/iaas/assess/resources/verblist.pdf. [Accessed 20 2 2017].
[25] U. O. C. Florida, "Bloom's Taxonomy," University of Central Florida, 20 2 2017. [Online].
Available: http://www.fctl.ucf.edu/teachingandlearningresources/coursedesign/bloomstaxonomy/.
[Accessed 20 2 2017].
[26] M. S. University, "Bloom’s Taxonomy Action Verbs," Missouri State University, 20 2 2017.
[Online]. Available: https://www.missouristate.edu/assets/fctl/Blooms_Taxonomy_Action_Verbs.pdf.
[Accessed 20 2 2017].
[27] C. A. College, "Bloom's Taxonomy Verbs," Central Arizona College, 20 2 2017. [Online].
Available:
http://www.centralaz.edu/Documents/class/Bloom's%20Taxonomy%20Verbs%20Web.pdf.
[Accessed 20 2 2017].
[28] F. Kugelman, "http://www.bloomstaxonomy.org/," 6 2 2017. [Online]. Available:
http://www.bloomstaxonomy.org/BloomsTaxonomyquestions.pdf. [Accessed 06 02 2017].
[29] Zaanen et al, "Question classification by structure induction," in IJCAI'05 Proceedings of the 19th
international joint conference on Artificial intelligence, Edinburgh, Scotland , 2005.
[30] C. Adelman, The Language and Syntax of Learning Outcomes Statements, National Institute for
Learning Outcomes Assessment, 2015.
[31] The Center For Learning, Muskie Institute Center for Learning, University of Southern Maine
[Online]. Available: http://php.ipsiconnect.org/doc/VerbList.htm. [Accessed 27 2 2017].
[32] Fresnostate university, "Bloom’s Taxonomy Action Verbs," [Online]. Available:
http://www.fresnostate.edu/academics/oie/documents/assesments/Blooms%20Level.pdf. [Accessed 4
3 2017].
[33] K. Markham, "Simple guide to confusion matrix terminology," dataschool, [Online]. Available:
http://www.dataschool.io/simple-guide-to-confusion-matrix-terminology/. [Accessed 07 03 2017].
[34] E. K. A. E. L. Steven Bird, Natural Language Processing with Python, 2009: O’Reilly Media,
Inc., O’Reilly Media, Inc.
[35] R. Joshi, "How to evaluate the performance of a model in Azure ML and understanding
“Confusion Metrics”," exsilio.com, 9 Septemper 2016. [Online]. Available:
http://blog.exsilio.com/all/accuracyprecision-recall-f1-score-interpretation-of-performance-measures/.
[Accessed 2017 3 7].

More Related Content

What's hot

A Survey of Building Robust Business Models in Pervasive Computing
A Survey of Building Robust Business Models in Pervasive ComputingA Survey of Building Robust Business Models in Pervasive Computing
A Survey of Building Robust Business Models in Pervasive ComputingOsama M. Khaled
 
rpaper
rpaperrpaper
rpaperimu409
 
International Journal on Web Service Computing (IJWSC)
International Journal on Web Service Computing (IJWSC)International Journal on Web Service Computing (IJWSC)
International Journal on Web Service Computing (IJWSC)ijwscjournal
 
SECURETI: Advanced SDLC and Project Management Tool for TI (Philippines)
SECURETI: Advanced SDLC and Project Management Tool for TI (Philippines)SECURETI: Advanced SDLC and Project Management Tool for TI (Philippines)
SECURETI: Advanced SDLC and Project Management Tool for TI (Philippines)AIRCC Publishing Corporation
 
Conceptualizations of it
Conceptualizations of itConceptualizations of it
Conceptualizations of itOsama Mansour
 
Artificial intelligence: Simulation of Intelligence
Artificial intelligence: Simulation of IntelligenceArtificial intelligence: Simulation of Intelligence
Artificial intelligence: Simulation of IntelligenceAbhishek Upadhyay
 
June 2020: Top Read Articles in Advanced Computing
June 2020: Top Read Articles in Advanced ComputingJune 2020: Top Read Articles in Advanced Computing
June 2020: Top Read Articles in Advanced Computingacijjournal
 
Interpretive Structural Modeling of the Prospects of Ict Enabled Process Cont...
Interpretive Structural Modeling of the Prospects of Ict Enabled Process Cont...Interpretive Structural Modeling of the Prospects of Ict Enabled Process Cont...
Interpretive Structural Modeling of the Prospects of Ict Enabled Process Cont...IOSR Journals
 
SMU MBA Solved Assignment MK0016
 SMU  MBA Solved Assignment MK0016 SMU  MBA Solved Assignment MK0016
SMU MBA Solved Assignment MK0016Revlon
 
Top Computer Science & Information Technology Articles of 2019
Top Computer Science & Information Technology Articles of 2019 Top Computer Science & Information Technology Articles of 2019
Top Computer Science & Information Technology Articles of 2019 AIRCC Publishing Corporation
 
Dynamic IT Values and Relationships: A Sociomaterial Perspective
Dynamic IT Values and Relationships: A Sociomaterial PerspectiveDynamic IT Values and Relationships: A Sociomaterial Perspective
Dynamic IT Values and Relationships: A Sociomaterial PerspectiveLeon Dohmen
 
Open Data Analytical Model for Human Development Index to Support Government ...
Open Data Analytical Model for Human Development Index to Support Government ...Open Data Analytical Model for Human Development Index to Support Government ...
Open Data Analytical Model for Human Development Index to Support Government ...Andry Alamsyah
 
Organizational and social impact of Artificial Intelligence
Organizational and social impact of Artificial IntelligenceOrganizational and social impact of Artificial Intelligence
Organizational and social impact of Artificial IntelligenceAJHSSR Journal
 
Responsible AI
Responsible AIResponsible AI
Responsible AINeo4j
 
A3 - Análise de ameaças - Threat analysis in goal oriented security requireme...
A3 - Análise de ameaças - Threat analysis in goal oriented security requireme...A3 - Análise de ameaças - Threat analysis in goal oriented security requireme...
A3 - Análise de ameaças - Threat analysis in goal oriented security requireme...Spark Security
 
Ai open powermeetupmarch25th
Ai open powermeetupmarch25thAi open powermeetupmarch25th
Ai open powermeetupmarch25thIBM
 
Investigating the Benefits of Using Information Systems in Saudi Arabia Const...
Investigating the Benefits of Using Information Systems in Saudi Arabia Const...Investigating the Benefits of Using Information Systems in Saudi Arabia Const...
Investigating the Benefits of Using Information Systems in Saudi Arabia Const...IJERA Editor
 
Responsible AI
Responsible AIResponsible AI
Responsible AINeo4j
 

What's hot (20)

Cloudcomputingthesis
CloudcomputingthesisCloudcomputingthesis
Cloudcomputingthesis
 
A Survey of Building Robust Business Models in Pervasive Computing
A Survey of Building Robust Business Models in Pervasive ComputingA Survey of Building Robust Business Models in Pervasive Computing
A Survey of Building Robust Business Models in Pervasive Computing
 
rpaper
rpaperrpaper
rpaper
 
International Journal on Web Service Computing (IJWSC)
International Journal on Web Service Computing (IJWSC)International Journal on Web Service Computing (IJWSC)
International Journal on Web Service Computing (IJWSC)
 
SECURETI: Advanced SDLC and Project Management Tool for TI (Philippines)
SECURETI: Advanced SDLC and Project Management Tool for TI (Philippines)SECURETI: Advanced SDLC and Project Management Tool for TI (Philippines)
SECURETI: Advanced SDLC and Project Management Tool for TI (Philippines)
 
Conceptualizations of it
Conceptualizations of itConceptualizations of it
Conceptualizations of it
 
Artificial intelligence: Simulation of Intelligence
Artificial intelligence: Simulation of IntelligenceArtificial intelligence: Simulation of Intelligence
Artificial intelligence: Simulation of Intelligence
 
June 2020: Top Read Articles in Advanced Computing
June 2020: Top Read Articles in Advanced ComputingJune 2020: Top Read Articles in Advanced Computing
June 2020: Top Read Articles in Advanced Computing
 
Interpretive Structural Modeling of the Prospects of Ict Enabled Process Cont...
Interpretive Structural Modeling of the Prospects of Ict Enabled Process Cont...Interpretive Structural Modeling of the Prospects of Ict Enabled Process Cont...
Interpretive Structural Modeling of the Prospects of Ict Enabled Process Cont...
 
SMU MBA Solved Assignment MK0016
 SMU  MBA Solved Assignment MK0016 SMU  MBA Solved Assignment MK0016
SMU MBA Solved Assignment MK0016
 
Top Computer Science & Information Technology Articles of 2019
Top Computer Science & Information Technology Articles of 2019 Top Computer Science & Information Technology Articles of 2019
Top Computer Science & Information Technology Articles of 2019
 
Dynamic IT Values and Relationships: A Sociomaterial Perspective
Dynamic IT Values and Relationships: A Sociomaterial PerspectiveDynamic IT Values and Relationships: A Sociomaterial Perspective
Dynamic IT Values and Relationships: A Sociomaterial Perspective
 
Open Data Analytical Model for Human Development Index to Support Government ...
Open Data Analytical Model for Human Development Index to Support Government ...Open Data Analytical Model for Human Development Index to Support Government ...
Open Data Analytical Model for Human Development Index to Support Government ...
 
Organizational and social impact of Artificial Intelligence
Organizational and social impact of Artificial IntelligenceOrganizational and social impact of Artificial Intelligence
Organizational and social impact of Artificial Intelligence
 
Responsible AI
Responsible AIResponsible AI
Responsible AI
 
A3 - Análise de ameaças - Threat analysis in goal oriented security requireme...
A3 - Análise de ameaças - Threat analysis in goal oriented security requireme...A3 - Análise de ameaças - Threat analysis in goal oriented security requireme...
A3 - Análise de ameaças - Threat analysis in goal oriented security requireme...
 
Ai open powermeetupmarch25th
Ai open powermeetupmarch25thAi open powermeetupmarch25th
Ai open powermeetupmarch25th
 
Investigating the Benefits of Using Information Systems in Saudi Arabia Const...
Investigating the Benefits of Using Information Systems in Saudi Arabia Const...Investigating the Benefits of Using Information Systems in Saudi Arabia Const...
Investigating the Benefits of Using Information Systems in Saudi Arabia Const...
 
Publication
PublicationPublication
Publication
 
Responsible AI
Responsible AIResponsible AI
Responsible AI
 

Similar to TOP CITED 2 ARTICLES IN 2017 - INTERNATIONAL JOURNAL OF MANAGING INFORMATION TECHNOLOGY (IJMIT)

May 2021: Top 10 Read Articles in Network Security and Its Applications
May 2021: Top 10 Read Articles in Network Security and Its ApplicationsMay 2021: Top 10 Read Articles in Network Security and Its Applications
May 2021: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
 
June 2021 - Top 10 Read Articles in Network Security and Its Applications
June 2021 - Top 10 Read Articles in Network Security and Its ApplicationsJune 2021 - Top 10 Read Articles in Network Security and Its Applications
June 2021 - Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
 
Most trending articles 2020 - International Journal of Network Security & Its...
Most trending articles 2020 - International Journal of Network Security & Its...Most trending articles 2020 - International Journal of Network Security & Its...
Most trending articles 2020 - International Journal of Network Security & Its...IJNSA Journal
 
Top cited Network Security Articles- Part 1
Top cited Network Security  Articles- Part 1Top cited Network Security  Articles- Part 1
Top cited Network Security Articles- Part 1IJNSA Journal
 
September 2021: Top 10 Read Articles in Network Security and Its Applications
September 2021: Top 10 Read Articles in Network Security and Its ApplicationsSeptember 2021: Top 10 Read Articles in Network Security and Its Applications
September 2021: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
 
Top cited article in Software Engineering Research Field - IJSEA
Top cited article in Software Engineering Research Field - IJSEATop cited article in Software Engineering Research Field - IJSEA
Top cited article in Software Engineering Research Field - IJSEAijseajournal
 
July 2021 - Top 10 Read Articles in Network Security & Its Applications
July 2021 - Top 10 Read Articles in Network Security & Its ApplicationsJuly 2021 - Top 10 Read Articles in Network Security & Its Applications
July 2021 - Top 10 Read Articles in Network Security & Its ApplicationsIJNSA Journal
 
January 2021 - Top 10 Read Articles in Network Security & Its Applications
January 2021 - Top 10 Read Articles in Network Security & Its ApplicationsJanuary 2021 - Top 10 Read Articles in Network Security & Its Applications
January 2021 - Top 10 Read Articles in Network Security & Its ApplicationsIJNSA Journal
 
Most Downloaded article for an year in academia - International Journal of Ne...
Most Downloaded article for an year in academia - International Journal of Ne...Most Downloaded article for an year in academia - International Journal of Ne...
Most Downloaded article for an year in academia - International Journal of Ne...IJNSA Journal
 
October 2020 - Top Read Articles in Network Security & Its Applications
October 2020 - Top Read Articles in Network Security & Its ApplicationsOctober 2020 - Top Read Articles in Network Security & Its Applications
October 2020 - Top Read Articles in Network Security & Its ApplicationsIJNSA Journal
 
March 2021: Top 10 Read Articles in Network Security and Its Applications
March 2021: Top 10 Read Articles in Network Security and Its ApplicationsMarch 2021: Top 10 Read Articles in Network Security and Its Applications
March 2021: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
 
Top downloaded papers - International Journal of Managing Information Technol...
Top downloaded papers - International Journal of Managing Information Technol...Top downloaded papers - International Journal of Managing Information Technol...
Top downloaded papers - International Journal of Managing Information Technol...IJMIT JOURNAL
 
Most cited articles in academia - International journal of network security &...
Most cited articles in academia - International journal of network security &...Most cited articles in academia - International journal of network security &...
Most cited articles in academia - International journal of network security &...IJNSA Journal
 
Trends in datamining in 2020
Trends in datamining in 2020Trends in datamining in 2020
Trends in datamining in 2020IJDKP
 
August 2022: Top 10 Read Articles in Network Security and Its Applications
August 2022: Top 10 Read Articles in Network Security and Its ApplicationsAugust 2022: Top 10 Read Articles in Network Security and Its Applications
August 2022: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
 
July 2022 - Top 10 Read Articles in Network Security & Its Applications
July 2022 - Top 10 Read Articles in Network Security & Its ApplicationsJuly 2022 - Top 10 Read Articles in Network Security & Its Applications
July 2022 - Top 10 Read Articles in Network Security & Its ApplicationsIJNSA Journal
 
March 2024 - Top 10 Read Articles in Network Security & Its Applications
March 2024 - Top 10 Read Articles in Network Security & Its ApplicationsMarch 2024 - Top 10 Read Articles in Network Security & Its Applications
March 2024 - Top 10 Read Articles in Network Security & Its ApplicationsIJNSA Journal
 
December 2021: Top 10 Read Articles in Network Security and Its Applications
December 2021: Top 10 Read Articles in Network Security and Its ApplicationsDecember 2021: Top 10 Read Articles in Network Security and Its Applications
December 2021: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
 
January 2024 - Top 10 Read Articles in Network Security & Its Applications
January 2024 - Top 10 Read Articles in Network Security & Its ApplicationsJanuary 2024 - Top 10 Read Articles in Network Security & Its Applications
January 2024 - Top 10 Read Articles in Network Security & Its ApplicationsIJNSA Journal
 
March 2022 - Top 10 Read Articles in Network Security and Its Applications
March 2022 - Top 10 Read Articles in Network Security and Its ApplicationsMarch 2022 - Top 10 Read Articles in Network Security and Its Applications
March 2022 - Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
 

Similar to TOP CITED 2 ARTICLES IN 2017 - INTERNATIONAL JOURNAL OF MANAGING INFORMATION TECHNOLOGY (IJMIT) (20)

May 2021: Top 10 Read Articles in Network Security and Its Applications
May 2021: Top 10 Read Articles in Network Security and Its ApplicationsMay 2021: Top 10 Read Articles in Network Security and Its Applications
May 2021: Top 10 Read Articles in Network Security and Its Applications
 
June 2021 - Top 10 Read Articles in Network Security and Its Applications
June 2021 - Top 10 Read Articles in Network Security and Its ApplicationsJune 2021 - Top 10 Read Articles in Network Security and Its Applications
June 2021 - Top 10 Read Articles in Network Security and Its Applications
 
Most trending articles 2020 - International Journal of Network Security & Its...
Most trending articles 2020 - International Journal of Network Security & Its...Most trending articles 2020 - International Journal of Network Security & Its...
Most trending articles 2020 - International Journal of Network Security & Its...
 
Top cited Network Security Articles- Part 1
Top cited Network Security  Articles- Part 1Top cited Network Security  Articles- Part 1
Top cited Network Security Articles- Part 1
 
September 2021: Top 10 Read Articles in Network Security and Its Applications
September 2021: Top 10 Read Articles in Network Security and Its ApplicationsSeptember 2021: Top 10 Read Articles in Network Security and Its Applications
September 2021: Top 10 Read Articles in Network Security and Its Applications
 
Top cited article in Software Engineering Research Field - IJSEA
Top cited article in Software Engineering Research Field - IJSEATop cited article in Software Engineering Research Field - IJSEA
Top cited article in Software Engineering Research Field - IJSEA
 
July 2021 - Top 10 Read Articles in Network Security & Its Applications
July 2021 - Top 10 Read Articles in Network Security & Its ApplicationsJuly 2021 - Top 10 Read Articles in Network Security & Its Applications
July 2021 - Top 10 Read Articles in Network Security & Its Applications
 
January 2021 - Top 10 Read Articles in Network Security & Its Applications
January 2021 - Top 10 Read Articles in Network Security & Its ApplicationsJanuary 2021 - Top 10 Read Articles in Network Security & Its Applications
January 2021 - Top 10 Read Articles in Network Security & Its Applications
 
Most Downloaded article for an year in academia - International Journal of Ne...
Most Downloaded article for an year in academia - International Journal of Ne...Most Downloaded article for an year in academia - International Journal of Ne...
Most Downloaded article for an year in academia - International Journal of Ne...
 
October 2020 - Top Read Articles in Network Security & Its Applications
October 2020 - Top Read Articles in Network Security & Its ApplicationsOctober 2020 - Top Read Articles in Network Security & Its Applications
October 2020 - Top Read Articles in Network Security & Its Applications
 
March 2021: Top 10 Read Articles in Network Security and Its Applications
March 2021: Top 10 Read Articles in Network Security and Its ApplicationsMarch 2021: Top 10 Read Articles in Network Security and Its Applications
March 2021: Top 10 Read Articles in Network Security and Its Applications
 
Top downloaded papers - International Journal of Managing Information Technol...
Top downloaded papers - International Journal of Managing Information Technol...Top downloaded papers - International Journal of Managing Information Technol...
Top downloaded papers - International Journal of Managing Information Technol...
 
Most cited articles in academia - International journal of network security &...
Most cited articles in academia - International journal of network security &...Most cited articles in academia - International journal of network security &...
Most cited articles in academia - International journal of network security &...
 
Trends in datamining in 2020
Trends in datamining in 2020Trends in datamining in 2020
Trends in datamining in 2020
 
August 2022: Top 10 Read Articles in Network Security and Its Applications
August 2022: Top 10 Read Articles in Network Security and Its ApplicationsAugust 2022: Top 10 Read Articles in Network Security and Its Applications
August 2022: Top 10 Read Articles in Network Security and Its Applications
 
July 2022 - Top 10 Read Articles in Network Security & Its Applications
July 2022 - Top 10 Read Articles in Network Security & Its ApplicationsJuly 2022 - Top 10 Read Articles in Network Security & Its Applications
July 2022 - Top 10 Read Articles in Network Security & Its Applications
 
March 2024 - Top 10 Read Articles in Network Security & Its Applications
March 2024 - Top 10 Read Articles in Network Security & Its ApplicationsMarch 2024 - Top 10 Read Articles in Network Security & Its Applications
March 2024 - Top 10 Read Articles in Network Security & Its Applications
 
December 2021: Top 10 Read Articles in Network Security and Its Applications
December 2021: Top 10 Read Articles in Network Security and Its ApplicationsDecember 2021: Top 10 Read Articles in Network Security and Its Applications
December 2021: Top 10 Read Articles in Network Security and Its Applications
 
January 2024 - Top 10 Read Articles in Network Security & Its Applications
January 2024 - Top 10 Read Articles in Network Security & Its ApplicationsJanuary 2024 - Top 10 Read Articles in Network Security & Its Applications
January 2024 - Top 10 Read Articles in Network Security & Its Applications
 
March 2022 - Top 10 Read Articles in Network Security and Its Applications
March 2022 - Top 10 Read Articles in Network Security and Its ApplicationsMarch 2022 - Top 10 Read Articles in Network Security and Its Applications
March 2022 - Top 10 Read Articles in Network Security and Its Applications
 

More from IJMIT JOURNAL

MULTIMODAL COURSE DESIGN AND IMPLEMENTATION USING LEML AND LMS FOR INSTRUCTIO...
MULTIMODAL COURSE DESIGN AND IMPLEMENTATION USING LEML AND LMS FOR INSTRUCTIO...MULTIMODAL COURSE DESIGN AND IMPLEMENTATION USING LEML AND LMS FOR INSTRUCTIO...
MULTIMODAL COURSE DESIGN AND IMPLEMENTATION USING LEML AND LMS FOR INSTRUCTIO...IJMIT JOURNAL
 
Novel R&D Capabilities as a Response to ESG Risks-Lessons From Amazon’s Fusio...
Novel R&D Capabilities as a Response to ESG Risks-Lessons From Amazon’s Fusio...Novel R&D Capabilities as a Response to ESG Risks-Lessons From Amazon’s Fusio...
Novel R&D Capabilities as a Response to ESG Risks-Lessons From Amazon’s Fusio...IJMIT JOURNAL
 
International Journal of Managing Information Technology (IJMIT) ** WJCI Indexed
International Journal of Managing Information Technology (IJMIT) ** WJCI IndexedInternational Journal of Managing Information Technology (IJMIT) ** WJCI Indexed
International Journal of Managing Information Technology (IJMIT) ** WJCI IndexedIJMIT JOURNAL
 
International Journal of Managing Information Technology (IJMIT) ** WJCI Indexed
International Journal of Managing Information Technology (IJMIT) ** WJCI IndexedInternational Journal of Managing Information Technology (IJMIT) ** WJCI Indexed
International Journal of Managing Information Technology (IJMIT) ** WJCI IndexedIJMIT JOURNAL
 
NOVEL R & D CAPABILITIES AS A RESPONSE TO ESG RISKS- LESSONS FROM AMAZON’S FU...
NOVEL R & D CAPABILITIES AS A RESPONSE TO ESG RISKS- LESSONS FROM AMAZON’S FU...NOVEL R & D CAPABILITIES AS A RESPONSE TO ESG RISKS- LESSONS FROM AMAZON’S FU...
NOVEL R & D CAPABILITIES AS A RESPONSE TO ESG RISKS- LESSONS FROM AMAZON’S FU...IJMIT JOURNAL
 
A REVIEW OF STOCK TREND PREDICTION WITH COMBINATION OF EFFECTIVE MULTI TECHNI...
A REVIEW OF STOCK TREND PREDICTION WITH COMBINATION OF EFFECTIVE MULTI TECHNI...A REVIEW OF STOCK TREND PREDICTION WITH COMBINATION OF EFFECTIVE MULTI TECHNI...
A REVIEW OF STOCK TREND PREDICTION WITH COMBINATION OF EFFECTIVE MULTI TECHNI...IJMIT JOURNAL
 
INTRUSION DETECTION SYSTEM USING CUSTOMIZED RULES FOR SNORT
INTRUSION DETECTION SYSTEM USING CUSTOMIZED RULES FOR SNORTINTRUSION DETECTION SYSTEM USING CUSTOMIZED RULES FOR SNORT
INTRUSION DETECTION SYSTEM USING CUSTOMIZED RULES FOR SNORTIJMIT JOURNAL
 
MEDIATING AND MODERATING FACTORS AFFECTING READINESS TO IOT APPLICATIONS: THE...
MEDIATING AND MODERATING FACTORS AFFECTING READINESS TO IOT APPLICATIONS: THE...MEDIATING AND MODERATING FACTORS AFFECTING READINESS TO IOT APPLICATIONS: THE...
MEDIATING AND MODERATING FACTORS AFFECTING READINESS TO IOT APPLICATIONS: THE...IJMIT JOURNAL
 
EFFECTIVELY CONNECT ACQUIRED TECHNOLOGY TO INNOVATION OVER A LONG PERIOD
EFFECTIVELY CONNECT ACQUIRED TECHNOLOGY TO INNOVATION OVER A LONG PERIODEFFECTIVELY CONNECT ACQUIRED TECHNOLOGY TO INNOVATION OVER A LONG PERIOD
EFFECTIVELY CONNECT ACQUIRED TECHNOLOGY TO INNOVATION OVER A LONG PERIODIJMIT JOURNAL
 
International Journal of Managing Information Technology (IJMIT) ** WJCI Indexed
International Journal of Managing Information Technology (IJMIT) ** WJCI IndexedInternational Journal of Managing Information Technology (IJMIT) ** WJCI Indexed
International Journal of Managing Information Technology (IJMIT) ** WJCI IndexedIJMIT JOURNAL
 
4th International Conference on Cloud, Big Data and IoT (CBIoT 2023)
4th International Conference on Cloud, Big Data and IoT (CBIoT 2023)4th International Conference on Cloud, Big Data and IoT (CBIoT 2023)
4th International Conference on Cloud, Big Data and IoT (CBIoT 2023)IJMIT JOURNAL
 
TRANSFORMING SERVICE OPERATIONS WITH AI: A CASE FOR BUSINESS VALUE
TRANSFORMING SERVICE OPERATIONS WITH AI: A CASE FOR BUSINESS VALUETRANSFORMING SERVICE OPERATIONS WITH AI: A CASE FOR BUSINESS VALUE
TRANSFORMING SERVICE OPERATIONS WITH AI: A CASE FOR BUSINESS VALUEIJMIT JOURNAL
 
DESIGNING A FRAMEWORK FOR ENHANCING THE ONLINE KNOWLEDGE-SHARING BEHAVIOR OF ...
DESIGNING A FRAMEWORK FOR ENHANCING THE ONLINE KNOWLEDGE-SHARING BEHAVIOR OF ...DESIGNING A FRAMEWORK FOR ENHANCING THE ONLINE KNOWLEDGE-SHARING BEHAVIOR OF ...
DESIGNING A FRAMEWORK FOR ENHANCING THE ONLINE KNOWLEDGE-SHARING BEHAVIOR OF ...IJMIT JOURNAL
 
BUILDING RELIABLE CLOUD SYSTEMS THROUGH CHAOS ENGINEERING
BUILDING RELIABLE CLOUD SYSTEMS THROUGH CHAOS ENGINEERINGBUILDING RELIABLE CLOUD SYSTEMS THROUGH CHAOS ENGINEERING
BUILDING RELIABLE CLOUD SYSTEMS THROUGH CHAOS ENGINEERINGIJMIT JOURNAL
 
A REVIEW OF STOCK TREND PREDICTION WITH COMBINATION OF EFFECTIVE MULTI TECHNI...
A REVIEW OF STOCK TREND PREDICTION WITH COMBINATION OF EFFECTIVE MULTI TECHNI...A REVIEW OF STOCK TREND PREDICTION WITH COMBINATION OF EFFECTIVE MULTI TECHNI...
A REVIEW OF STOCK TREND PREDICTION WITH COMBINATION OF EFFECTIVE MULTI TECHNI...IJMIT JOURNAL
 
NETWORK MEDIA ATTENTION AND GREEN TECHNOLOGY INNOVATION
NETWORK MEDIA ATTENTION AND GREEN TECHNOLOGY INNOVATIONNETWORK MEDIA ATTENTION AND GREEN TECHNOLOGY INNOVATION
NETWORK MEDIA ATTENTION AND GREEN TECHNOLOGY INNOVATIONIJMIT JOURNAL
 
INCLUSIVE ENTREPRENEURSHIP IN HANDLING COMPETING INSTITUTIONAL LOGICS FOR DHI...
INCLUSIVE ENTREPRENEURSHIP IN HANDLING COMPETING INSTITUTIONAL LOGICS FOR DHI...INCLUSIVE ENTREPRENEURSHIP IN HANDLING COMPETING INSTITUTIONAL LOGICS FOR DHI...
INCLUSIVE ENTREPRENEURSHIP IN HANDLING COMPETING INSTITUTIONAL LOGICS FOR DHI...IJMIT JOURNAL
 
DEEP LEARNING APPROACH FOR EVENT MONITORING SYSTEM
DEEP LEARNING APPROACH FOR EVENT MONITORING SYSTEMDEEP LEARNING APPROACH FOR EVENT MONITORING SYSTEM
DEEP LEARNING APPROACH FOR EVENT MONITORING SYSTEMIJMIT JOURNAL
 
MULTIMODAL COURSE DESIGN AND IMPLEMENTATION USING LEML AND LMS FOR INSTRUCTIO...
MULTIMODAL COURSE DESIGN AND IMPLEMENTATION USING LEML AND LMS FOR INSTRUCTIO...MULTIMODAL COURSE DESIGN AND IMPLEMENTATION USING LEML AND LMS FOR INSTRUCTIO...
MULTIMODAL COURSE DESIGN AND IMPLEMENTATION USING LEML AND LMS FOR INSTRUCTIO...IJMIT JOURNAL
 

More from IJMIT JOURNAL (20)

MULTIMODAL COURSE DESIGN AND IMPLEMENTATION USING LEML AND LMS FOR INSTRUCTIO...
MULTIMODAL COURSE DESIGN AND IMPLEMENTATION USING LEML AND LMS FOR INSTRUCTIO...MULTIMODAL COURSE DESIGN AND IMPLEMENTATION USING LEML AND LMS FOR INSTRUCTIO...
MULTIMODAL COURSE DESIGN AND IMPLEMENTATION USING LEML AND LMS FOR INSTRUCTIO...
 
Novel R&D Capabilities as a Response to ESG Risks-Lessons From Amazon’s Fusio...
Novel R&D Capabilities as a Response to ESG Risks-Lessons From Amazon’s Fusio...Novel R&D Capabilities as a Response to ESG Risks-Lessons From Amazon’s Fusio...
Novel R&D Capabilities as a Response to ESG Risks-Lessons From Amazon’s Fusio...
 
International Journal of Managing Information Technology (IJMIT) ** WJCI Indexed
International Journal of Managing Information Technology (IJMIT) ** WJCI IndexedInternational Journal of Managing Information Technology (IJMIT) ** WJCI Indexed
International Journal of Managing Information Technology (IJMIT) ** WJCI Indexed
 
International Journal of Managing Information Technology (IJMIT) ** WJCI Indexed
International Journal of Managing Information Technology (IJMIT) ** WJCI IndexedInternational Journal of Managing Information Technology (IJMIT) ** WJCI Indexed
International Journal of Managing Information Technology (IJMIT) ** WJCI Indexed
 
NOVEL R & D CAPABILITIES AS A RESPONSE TO ESG RISKS- LESSONS FROM AMAZON’S FU...
NOVEL R & D CAPABILITIES AS A RESPONSE TO ESG RISKS- LESSONS FROM AMAZON’S FU...NOVEL R & D CAPABILITIES AS A RESPONSE TO ESG RISKS- LESSONS FROM AMAZON’S FU...
NOVEL R & D CAPABILITIES AS A RESPONSE TO ESG RISKS- LESSONS FROM AMAZON’S FU...
 
A REVIEW OF STOCK TREND PREDICTION WITH COMBINATION OF EFFECTIVE MULTI TECHNI...
A REVIEW OF STOCK TREND PREDICTION WITH COMBINATION OF EFFECTIVE MULTI TECHNI...A REVIEW OF STOCK TREND PREDICTION WITH COMBINATION OF EFFECTIVE MULTI TECHNI...
A REVIEW OF STOCK TREND PREDICTION WITH COMBINATION OF EFFECTIVE MULTI TECHNI...
 
INTRUSION DETECTION SYSTEM USING CUSTOMIZED RULES FOR SNORT
INTRUSION DETECTION SYSTEM USING CUSTOMIZED RULES FOR SNORTINTRUSION DETECTION SYSTEM USING CUSTOMIZED RULES FOR SNORT
INTRUSION DETECTION SYSTEM USING CUSTOMIZED RULES FOR SNORT
 
15223ijmit02.pdf
15223ijmit02.pdf15223ijmit02.pdf
15223ijmit02.pdf
 
MEDIATING AND MODERATING FACTORS AFFECTING READINESS TO IOT APPLICATIONS: THE...
MEDIATING AND MODERATING FACTORS AFFECTING READINESS TO IOT APPLICATIONS: THE...MEDIATING AND MODERATING FACTORS AFFECTING READINESS TO IOT APPLICATIONS: THE...
MEDIATING AND MODERATING FACTORS AFFECTING READINESS TO IOT APPLICATIONS: THE...
 
EFFECTIVELY CONNECT ACQUIRED TECHNOLOGY TO INNOVATION OVER A LONG PERIOD
EFFECTIVELY CONNECT ACQUIRED TECHNOLOGY TO INNOVATION OVER A LONG PERIODEFFECTIVELY CONNECT ACQUIRED TECHNOLOGY TO INNOVATION OVER A LONG PERIOD
EFFECTIVELY CONNECT ACQUIRED TECHNOLOGY TO INNOVATION OVER A LONG PERIOD
 
International Journal of Managing Information Technology (IJMIT) ** WJCI Indexed
International Journal of Managing Information Technology (IJMIT) ** WJCI IndexedInternational Journal of Managing Information Technology (IJMIT) ** WJCI Indexed
International Journal of Managing Information Technology (IJMIT) ** WJCI Indexed
 
4th International Conference on Cloud, Big Data and IoT (CBIoT 2023)
4th International Conference on Cloud, Big Data and IoT (CBIoT 2023)4th International Conference on Cloud, Big Data and IoT (CBIoT 2023)
4th International Conference on Cloud, Big Data and IoT (CBIoT 2023)
 
TRANSFORMING SERVICE OPERATIONS WITH AI: A CASE FOR BUSINESS VALUE
TRANSFORMING SERVICE OPERATIONS WITH AI: A CASE FOR BUSINESS VALUETRANSFORMING SERVICE OPERATIONS WITH AI: A CASE FOR BUSINESS VALUE
TRANSFORMING SERVICE OPERATIONS WITH AI: A CASE FOR BUSINESS VALUE
 
DESIGNING A FRAMEWORK FOR ENHANCING THE ONLINE KNOWLEDGE-SHARING BEHAVIOR OF ...
DESIGNING A FRAMEWORK FOR ENHANCING THE ONLINE KNOWLEDGE-SHARING BEHAVIOR OF ...DESIGNING A FRAMEWORK FOR ENHANCING THE ONLINE KNOWLEDGE-SHARING BEHAVIOR OF ...
DESIGNING A FRAMEWORK FOR ENHANCING THE ONLINE KNOWLEDGE-SHARING BEHAVIOR OF ...
 
BUILDING RELIABLE CLOUD SYSTEMS THROUGH CHAOS ENGINEERING
BUILDING RELIABLE CLOUD SYSTEMS THROUGH CHAOS ENGINEERINGBUILDING RELIABLE CLOUD SYSTEMS THROUGH CHAOS ENGINEERING
BUILDING RELIABLE CLOUD SYSTEMS THROUGH CHAOS ENGINEERING
 
A REVIEW OF STOCK TREND PREDICTION WITH COMBINATION OF EFFECTIVE MULTI TECHNI...
A REVIEW OF STOCK TREND PREDICTION WITH COMBINATION OF EFFECTIVE MULTI TECHNI...A REVIEW OF STOCK TREND PREDICTION WITH COMBINATION OF EFFECTIVE MULTI TECHNI...
A REVIEW OF STOCK TREND PREDICTION WITH COMBINATION OF EFFECTIVE MULTI TECHNI...
 
NETWORK MEDIA ATTENTION AND GREEN TECHNOLOGY INNOVATION
NETWORK MEDIA ATTENTION AND GREEN TECHNOLOGY INNOVATIONNETWORK MEDIA ATTENTION AND GREEN TECHNOLOGY INNOVATION
NETWORK MEDIA ATTENTION AND GREEN TECHNOLOGY INNOVATION
 
INCLUSIVE ENTREPRENEURSHIP IN HANDLING COMPETING INSTITUTIONAL LOGICS FOR DHI...
INCLUSIVE ENTREPRENEURSHIP IN HANDLING COMPETING INSTITUTIONAL LOGICS FOR DHI...INCLUSIVE ENTREPRENEURSHIP IN HANDLING COMPETING INSTITUTIONAL LOGICS FOR DHI...
INCLUSIVE ENTREPRENEURSHIP IN HANDLING COMPETING INSTITUTIONAL LOGICS FOR DHI...
 
DEEP LEARNING APPROACH FOR EVENT MONITORING SYSTEM
DEEP LEARNING APPROACH FOR EVENT MONITORING SYSTEMDEEP LEARNING APPROACH FOR EVENT MONITORING SYSTEM
DEEP LEARNING APPROACH FOR EVENT MONITORING SYSTEM
 
MULTIMODAL COURSE DESIGN AND IMPLEMENTATION USING LEML AND LMS FOR INSTRUCTIO...
MULTIMODAL COURSE DESIGN AND IMPLEMENTATION USING LEML AND LMS FOR INSTRUCTIO...MULTIMODAL COURSE DESIGN AND IMPLEMENTATION USING LEML AND LMS FOR INSTRUCTIO...
MULTIMODAL COURSE DESIGN AND IMPLEMENTATION USING LEML AND LMS FOR INSTRUCTIO...
 

Recently uploaded

Planning a health career 4th Quarter.pptx
Planning a health career 4th Quarter.pptxPlanning a health career 4th Quarter.pptx
Planning a health career 4th Quarter.pptxLigayaBacuel1
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxDr.Ibrahim Hassaan
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptxSherlyMaeNeri
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementmkooblal
 
Quarter 4 Peace-education.pptx Catch Up Friday
Quarter 4 Peace-education.pptx Catch Up FridayQuarter 4 Peace-education.pptx Catch Up Friday
Quarter 4 Peace-education.pptx Catch Up FridayMakMakNepo
 
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxGrade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxChelloAnnAsuncion2
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Celine George
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Jisc
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfSpandanaRallapalli
 

Recently uploaded (20)

Planning a health career 4th Quarter.pptx
Planning a health career 4th Quarter.pptxPlanning a health career 4th Quarter.pptx
Planning a health career 4th Quarter.pptx
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptx
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptx
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of management
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
Quarter 4 Peace-education.pptx Catch Up Friday
Quarter 4 Peace-education.pptx Catch Up FridayQuarter 4 Peace-education.pptx Catch Up Friday
Quarter 4 Peace-education.pptx Catch Up Friday
 
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxGrade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
 
Raw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptxRaw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptx
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Rapple "Scholarly Communications and the Sustainable Development Goals"
Rapple "Scholarly Communications and the Sustainable Development Goals"Rapple "Scholarly Communications and the Sustainable Development Goals"
Rapple "Scholarly Communications and the Sustainable Development Goals"
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdf
 

TOP CITED 2 ARTICLES IN 2017 - INTERNATIONAL JOURNAL OF MANAGING INFORMATION TECHNOLOGY (IJMIT)

  • 1. TOP CITED 2 ARTICLES IN 2017 INTERNATIONAL JOURNAL OF MANAGING INFORMATION TECHNOLOGY (IJMIT) ISSN: 0975-5586 (ONLINE); 0975-5926 (PRINT) http://airccse.org/journal/ijmit/ijmit.html
  • 2. AUTONOMIC FRAMEWORK FOR IT SECURITY GOVERNANCE Sitalakshmi Venkatraman School of Engineering, Construction and Design (IT), Melbourne Polytechnic, Australia ABSTRACT With the recent service enhancements over the Internet, organisations are confronted with a growing magnitude of security intrusions and attacks. Current intrusion detection strategies have not been effective in the long term, as new and obfuscated security attacks keep emerging evading the surveillance mechanisms. With information technology (IT) playing a pivotal role in today’s organizational operations and value creation, security regulatory bodies have identified this situation not solely as a technology issue, rather due to the weakness of an organisation's risk management practices and IT governance. Hence, recent attention has embarked on formulating proactive IT security governance for organisational sustenance. This paper proposes an autonomic framework for IT security governance that postulates a selflearning adaptive mechanism for an effective intrusion detection and risk management. Such a framework would facilitate autonomic ways of integrating existing context-dependent knowledge with new observed behaviour patterns gathered from network as well as host for detecting unknown security attacks effectively using mobile agents. In addition, this paper provides a roadmap for autonomic IT security governance by applying the proposed framework The roadmap employs a continuous improvement feedback loop. for achieving the targeted quality of service (QoS) in an organisation. KEYWORDS IT Security Governance, Intrusion Detection, Autonomic Framework, Self-learning & Mobile Agents FOR MORE DETAILS: http://aircconline.com/ijmit/V9N3/9317ijmit01.pdf VOLUME LINK: http://airccse.org/journal/ijmit/vol9.html
  • 3. REFERENCES [1] Lab K., (2015) “Kaspersky Security Bulletin,” Kaspersky Lab, Tech. Rep. [2] Symantec, (2016) “Internet Security Threat Report: Trends for 2016,” Symantec, Tech. Rep. vol. 21, p. 81. [3] McAfee Labs,“McAfee Labs Threats Report,” Intel Security, Tech. Rep., 03 2016. [4] Microsoft, “Microsoft Security Intelligence Report,” Microsoft, Tech. Rep., 12 2015. [5] HP Enterprise, “HPE Security Research Cyber Risk Report,” Hewlett Packard Enterprise, Tech. Rep., 2016. [6] IBM X-Force, (2015) “IBM X-Force Threat Intelligence Report 2016,” IBM, Tech. Rep., 2016. [7] Vasilomanolakis, E. Karuppayah, S. Mühlhäuser, M. and Fischer, M. “Taxonomy and Survey of Collaborative Intrusion Detection,” ACM Computing Surveys, vol. 47, no. 4, pp. 55:1–55:33. [8] Sommer R. and Paxson V., (2010) “Outside the Closed World: On Using Machine Learning for Network Intrusion Detection,” in Proceedings of the 2010 IEEE Symposium on Security and Privacy. IEEE Computer Society, pp. 305–316. [9] Jang, J.-w. Yun, J. Mohaisen, A. Woo, J. and. Kim, H. K (2016) “Detecting and Classifying Method Based on Similarity Matching of Android Malware Behavior with Profile,” SpringerPlus, vol. 5, no. 1, p. 1. [10] Nguyen, A. Yosinski, J. and Clune, J. (2015) “Deep Neural Networks Are Easily Fooled: High Confidence Predictions for Unrecognizable Images,” The IEEE Conference on Computer Vision and Pattern Recognition. [11] Schmugar, C. (2007) "The future of cybercrime", Sage: Security Vision From McAfee Avert Labs, 1(2), 1 5. [12] Faruki, P. Bhandari S., Laxmi, V. Gaur M., and Conti, M. (2016) “DroidAnalyst: Synergic App Framework for Static and Dynamic App Analysis,” in Recent Advances in Computational Intelligence in Defense and Security. Springer, pp. 519–552. [13] Li, W.-X. Wang, J.-B. Mu, D.-J. and Yuan, Y. (2011) “Survey on Android Rootkit,” Microprocessors, vol. 32. no.2, pp. 68-72. [14] Kim, S. Park, J. Lee K., You, I. and Yim K., (2012) “A Brief Survey on Rootkit Techniques in Malicious Codes,” Journal of Internet Services and Information Security, vol. 2, no. 3/4, pp. 134–147. [15] Lam, P. Wang L.-L., Ngan, H. Y. T. Yung, N. H. C. and Yeh, A. G.-O. (2015) “Outlier Detection In Large- Scale Traffic Data By Naïve Bayes Method and Gaussian Mixture Model Method,” arXiv. [16] Yang, J. Deng, T. and Sui, R. (2015) “An Adaptive Weighted One-Class SVM for Robust Outlier Detection,” in Proceedings of the 2015 Chinese Intelligent Systems Conference. Springer, pp. 475– 484.
  • 4. [17] Pereira, G.V. Luciano, E. M. Macadar, M. A. and Daniel, V.M. (2013) “Information technology governance practices adoption through an institutional perspective: The perception of brazilian and american CIOs,” 46th Hawaii International Conference on System Sciences, pp. 4446–4455. [18] Turel O. and Bart, C. (2014) “Board-level IT governance and organizational performance,” Eur. J. Inf. Syst., vol. 23, no. 2, pp. 223–239. [19] Borth, M. A., and Bradley, R. V. (2009). "Unexplored Linkages between Corporate Governance and IT Governance: An Evaluation and Call to Research Information Technology Governance and Service Management: Frameworks and Adaptations" IGI Global. pp. 202-220. [20] Buchwald, A. Urbach, N. and Ahlemann, F. (2014) “Business value through controlled IT: Toward an integrated model of IT governance success and its impact,” J. Inf. Technol., vol. 29, no. 2, pp. 128– 147. [21] Yu, S. Wang, G. and Zhou, W. (2015) “Modeling Malicious Activities in Cyber Space,” IEEE Network, vol. 29, no. 6, pp. 83–87. [22] IFAC (2004), "Enterprise Governance-Getting the Balance Right", PAIB Report to IFAC. [23] Cumps, B., Viaene, S., & Dedene, G. (2012). "Linking the Strategic Importance of ICT with Investment in Business-ICT Alignment: An Explorative Framework". In W. Van Grembergen & S. De Haes (Eds.), Business Strategy and Applications in Enterprise IT Governance (pp. 37-55). Hershey, Pennsylvania, USA: IGI Global. [24] De Haes S. and Van Grembergen, W. (2015) "Enterprise Governance of Information Technology", Cham: Springer International Publishing. [25] ITGI (2003), "Board briefing on IT governance", 2nd Edition, Information Systems Audit and Control Foundation, 2003. [26] Bartens, Y ., Schulte, F., & Vos, S. (2014). "E-Business IT Governance Revisited: An Attempt towards Outlining a Novel Bi-directional Business/IT Alignment in COBIT5", Paper presented at the 47th Hawaii International Conference on System Sciences (HICSS), 2014. [27] Chou, Y.-C., Chuang, H. H.-C., & Shao, B. B. M. (2014). "The impacts of information technology on total factor productivity: A look at externalities and innovations". International Journal of Production Economics, 158, 290-299. [28] ISO/IEC 38500, (2015) "Information Technology - Governance of IT for the organization" ISO/IEC 38500:2015, 2nd Edition, ISO:Switzerland. [29] OECD (2005) Corporate Governance. OECD glossary of statistical terms, Organisation for Economic Co operation and Development (OECD),
  • 5. [30] Stroud, R.E. (2012). "Introduction to COBIT 5" . ISACA. [31] Kephart, J. and Chess, D. M. (2003) "The vision of autonomic computing", IEEE Computer, vol. 36, no. 1, pp. 41-50. [32] Ganek, A. G. and Corbi, T. A. (2003) "The Dawning of the Autonomic Computing Era". IBM Systems Journal. vol. 42, no. 1, pp. 5-18. [33] Dudley, G., Joshi, N., Ogle, D.M., Subramanian, B. and Topol, B.B. (2004) "Autonomic self-healing systems in a cross-product IT environment", Proceedings of the International Conference on Autonomic Computing), 312-313. [34] Dobson, S. Sterritt, R. Nixon, P. and Hinchey. M. (2010) "Fulfilling the vision of autonomic computing". Computer, vol. 43, pp. 35-41. [35] Vidales, P., Baliosian, J., Serrat, J., Mapp,G., Stajano, F. and Hopper, A. (2005) "Autonomic System for Mobility Support in 4G Networks". IEEE Journal on Selected Areas in Communications. vol. 23, no. 12, pp. 2288-2304. [36] Sancho G., Villemur T. and Tazi S., (2010) “An Ontology-driven Approach for Collaborative Ubiquitous Systems”, International Journal of Autonomic Computing (IJAC) InderScience Publishers Mai pp 263 – 279 . [37] Cabri, G., Leonardi, L. and Zambonelli, F. (2002) "Engineering Mobile Agent Applications Via Context- Dependent Coordination". IEEE Transactions on Software Engineering. vol. 28, no. 11, pp. 1040-1058. [38] Russell, S.J.; Norvig, P. (2010). “Artificial intelligence: A modern approach” (3rd ed. ed.). Upper Saddle River: Prentice Hall. [39] Alizadeh, H. Khoshrou A., and Zúquete, A. (2015) “Traffic Classification and Verification using Unsupervised Learning of Gaussian Mixture Models,” in International Workshop on Measurements & Networking. IEEE. [40] Venkatraman, S. (2010) "Self-Learning Framework for Intrusion Detection", Proceedings of The 2010 International Congress on Computer Applications and Computational Science (CACS 2010), 4- 6 December, Singapore, pp. 517-520 [41] Cui, T., Ye, H., Teo, H. H., & Li, J. (2015) "Information technology and open innovation: A strategic alignment perspective". Information & Management, vol. 52, pp. 348-358. [42] Yu, S. Guo, S. andStojmenovic, I. (2015) “Fool Me if You Can: Mimicking Attacks and Anti-Attacks in Cyberspace,” IEEE Transactions on Computers, vol. 64, no. 1, pp. 139–151.
  • 6. CLASSIFICATION OF QUESTIONS AND LEARNING OUTCOME STATEMENTS (LOS) INTO BLOOM’S TAXONOMY (BT) BY SIMILARITY MEASUREMENTS TOWARDS EXTRACTING OF LEARNING OUTCOME FROM LEARNING MATERIAL Shadi Diab1 and Badie Sartawi2 1 Information and Communication Technology Center, Al-Quds Open University, Ramallah – Palestine 2 Associate Professor of Computer Science, Al-Quds University, Jerusalem - Palestine ABSTRACT Bloom’s Taxonomy (BT) have been used to classify the objectives of learning outcome by dividing the learning into three different domains; the cognitive domain, the effective domain and the psychomotor domain. In this paper, we are introducing a new approach to classify the questions and learning outcome statements (LOS) into Blooms taxonomy (BT) and to verify BT verb lists, which are being cited and used by academicians to write questions and (LOS). An experiment was designed to investigate the semantic relationship between the action verbs used in both questions and LOS to obtain more accurate classification of the levels of BT. A sample of 775 different action verbs collected from different universities allows us to measure an accurate and clear-cut cognitive level for the action verb. It is worth mentioning that natural language processing techniques were used to develop our rules as to induce the questions into chunks in order to extract the action verbs. Our proposed solution was able to classify the action verb into a precise level of the cognitive domain. We, on our side, have tested and evaluated our proposed solution using confusion matrix. The results of evaluation tests yielded 97% for the macro average of precision and 90% for F1. Thus, the outcome of the research suggests that it is crucial to analyse and verify the action verbs cited and used by academicians to write LOS and classify their questions based on blooms taxonomy in order to obtain a definite and more accurate classification.. KEYWORDS Learning outcome; Natural Language Processing, Similarity Measurement; Questions Classification FOR MORE DETAILS: http://aircconline.com/ijmit/V9N2/9317ijmit01.pdf VOLUME LINK: http://airccse.org/journal/ijmit/vol9.html
  • 7. REFERENCES [1] Declan Kennedy, Writing and using learning outcomes: a practical guide, Page 18, Cork: University College Cork, 2006. [2] EU, Publications Office, Using learning outcome, European Qualifications Framework Series: Note 4, Luxembourg: ISBN 978-92-79-21085-3, 2011 Page, 2010. [3] Totschnig, Michael, et al., "Repository services for outcome-based learning" 2010. [4] Office Of Institutional Effectiveness, Assessment Workbook For Academic Programs, Richmond: University Of Richmond, 2008. [5] Advancing Academic Quality in Business Education Worldwide, Bloom’s Taxonomy of Educational Objectives and Writing Intended Learning Outcomes Statements, Kansas: International Assembly for Collegiate Business Education, 2016. [6] M. D. Gall, "The Use of Questions in Teaching," American Educational Research Association, vol. 40, no. 5, pp. 707-721, 1970. [7] D. R. Krathwohl, A Revision of Bloom's Taxonomy:, College of Education, The Ohio State University. [8] Li and Roth, Learning Question Classifiers, Illinois USA: 19th International Conference on Compuatational Linguistics (COLING) 2002. [9] Wen-Chih Chang and Ming-Shun Chung, Automatic Applying Bloom's Taxonomy to Classify and Analysis the cognition level of english questions items, Taiwan: IEEE, 2009. [10] Sonal Jain and Jyoti Pareek, Automatic extraction of prerequisites and learning outcome from learning material, India: Inderscience Enterprises Ltd., 2013. [11] Syahidah Haris and Nazila Omar, A Rule-based Approach in Bloom’s Taxonomy Question Classification through Natural Language, Malaysia, 2013. [12] Syahidah sufi haris and nazlia omar, Bloom's Taxonomy Question Categorization Using Rules And N-Gram Approach, Malaysia: Journal of Theoretical and Applied Information Technology, 2015. [13] Payal Biswas et al, Question Classification Using Syntactic And Rule Based Approach, New Delhi: International Conference on Advances in Computing, Communications and Informatics (ICACCI), 2014. [14] Dell Zhang et al, Question Classification using Support Vector Machines, Singapore: ACM 1- 58113- 646-3/03/0007, 2003. [15] Jibin Fu, Two Level Question Classification Based on SVM and Question Semantic Similarity, Beijing, China: International Conference on Electronic Computer Technology, 2009.
  • 8. [16] Anwar Ali Yahya and Addin Osman, Automatic Classification Of Questions Into Bloom's Cognitive Levels Using Support Vector Machines, Najran: Researchgate, 2011. [17] K. J. et al, An automatic classifer for exam questions with wordnet and cosine, International Journal of Emerging Technologies in Learning (iJET) 11(04):142 • April 2016. [18] Lingling Meng et al, "A Review of Semantic Similarity Measures in WordNet," International Journal of Hybrid Information Technology, vol. 6, no. 1, p. 1, 2013. [19] Siddharth Patwardhan et al, "Using Measures of Semantic Relatedness for Word Sense Disambiguation," Springer, p. 241–257, 2003. [20] G. V. e. al, "Semantic Similarity Methods in WordNet and Their Application to Information Retrieval on the Web," ACM New York, NY, USA ©2005, pp. 10-16, 2005. [21] G. A. Miller, "WordNet - A Lexical Database for English," Communications of the ACM, vol. 38, no. 11, pp. 39-41, 2005. International Journal of Managing Information Technology (IJMIT) Vol.9, No.2, May 2017 12 [22] C. C. a. R. Mihalcea, Measuring the Semantic Similarity of Texts, University of North Texas: University of North Texas, 2005. [23] Z. W. a. M. Palmer, "VERB SEMANTICS AND LEXICAL SELECTION," in In Proceedings of the 32nd Annual Meeting of the Associations for Computational Linguistics, Las Cruces, New Mexico,,1994. [24] Virginia.ED, "Bloom's Taxonomy of Cognitive Skills with Action Verb List Source," University of Verginia, 20 2 2017. [Online]. Available: http://avillage.web.virginia.edu/iaas/assess/resources/verblist.pdf. [Accessed 20 2 2017]. [25] U. O. C. Florida, "Bloom's Taxonomy," University of Central Florida, 20 2 2017. [Online]. Available: http://www.fctl.ucf.edu/teachingandlearningresources/coursedesign/bloomstaxonomy/. [Accessed 20 2 2017]. [26] M. S. University, "Bloom’s Taxonomy Action Verbs," Missouri State University, 20 2 2017. [Online]. Available: https://www.missouristate.edu/assets/fctl/Blooms_Taxonomy_Action_Verbs.pdf. [Accessed 20 2 2017]. [27] C. A. College, "Bloom's Taxonomy Verbs," Central Arizona College, 20 2 2017. [Online]. Available: http://www.centralaz.edu/Documents/class/Bloom's%20Taxonomy%20Verbs%20Web.pdf. [Accessed 20 2 2017]. [28] F. Kugelman, "http://www.bloomstaxonomy.org/," 6 2 2017. [Online]. Available: http://www.bloomstaxonomy.org/BloomsTaxonomyquestions.pdf. [Accessed 06 02 2017]. [29] Zaanen et al, "Question classification by structure induction," in IJCAI'05 Proceedings of the 19th international joint conference on Artificial intelligence, Edinburgh, Scotland , 2005.
  • 9. [30] C. Adelman, The Language and Syntax of Learning Outcomes Statements, National Institute for Learning Outcomes Assessment, 2015. [31] The Center For Learning, Muskie Institute Center for Learning, University of Southern Maine [Online]. Available: http://php.ipsiconnect.org/doc/VerbList.htm. [Accessed 27 2 2017]. [32] Fresnostate university, "Bloom’s Taxonomy Action Verbs," [Online]. Available: http://www.fresnostate.edu/academics/oie/documents/assesments/Blooms%20Level.pdf. [Accessed 4 3 2017]. [33] K. Markham, "Simple guide to confusion matrix terminology," dataschool, [Online]. Available: http://www.dataschool.io/simple-guide-to-confusion-matrix-terminology/. [Accessed 07 03 2017]. [34] E. K. A. E. L. Steven Bird, Natural Language Processing with Python, 2009: O’Reilly Media, Inc., O’Reilly Media, Inc. [35] R. Joshi, "How to evaluate the performance of a model in Azure ML and understanding “Confusion Metrics”," exsilio.com, 9 Septemper 2016. [Online]. Available: http://blog.exsilio.com/all/accuracyprecision-recall-f1-score-interpretation-of-performance-measures/. [Accessed 2017 3 7].