SlideShare a Scribd company logo
TOP CITED 2
ARTICLES IN 2017
INTERNATIONAL JOURNAL OF
MANAGING INFORMATION
TECHNOLOGY (IJMIT)
ISSN: 0975-5586 (ONLINE); 0975-5926 (PRINT)
http://airccse.org/journal/ijmit/ijmit.html
AUTONOMIC FRAMEWORK FOR IT SECURITY GOVERNANCE
Sitalakshmi Venkatraman
School of Engineering, Construction and Design (IT), Melbourne Polytechnic, Australia
ABSTRACT
With the recent service enhancements over the Internet, organisations are confronted with a growing
magnitude of security intrusions and attacks. Current intrusion detection strategies have not been effective in
the long term, as new and obfuscated security attacks keep emerging evading the surveillance mechanisms.
With information technology (IT) playing a pivotal role in today’s organizational operations and value
creation, security regulatory bodies have identified this situation not solely as a technology issue, rather due
to the weakness of an organisation's risk management practices and IT governance. Hence, recent attention
has embarked on formulating proactive IT security governance for organisational sustenance. This paper
proposes an autonomic framework for IT security governance that postulates a selflearning adaptive
mechanism for an effective intrusion detection and risk management. Such a framework would facilitate
autonomic ways of integrating existing context-dependent knowledge with new observed behaviour patterns
gathered from network as well as host for detecting unknown security attacks effectively using mobile
agents. In addition, this paper provides a roadmap for autonomic IT security governance by applying the
proposed framework The roadmap employs a continuous improvement feedback loop. for achieving the
targeted quality of service (QoS) in an organisation.
KEYWORDS
IT Security Governance, Intrusion Detection, Autonomic Framework, Self-learning & Mobile Agents
FOR MORE DETAILS:
http://aircconline.com/ijmit/V9N3/9317ijmit01.pdf
VOLUME LINK: http://airccse.org/journal/ijmit/vol9.html
REFERENCES
[1] Lab K., (2015) “Kaspersky Security Bulletin,” Kaspersky Lab, Tech. Rep.
[2] Symantec, (2016) “Internet Security Threat Report: Trends for 2016,” Symantec, Tech. Rep. vol. 21, p. 81.
[3] McAfee Labs,“McAfee Labs Threats Report,” Intel Security, Tech. Rep., 03 2016.
[4] Microsoft, “Microsoft Security Intelligence Report,” Microsoft, Tech. Rep., 12 2015.
[5] HP Enterprise, “HPE Security Research Cyber Risk Report,” Hewlett Packard Enterprise, Tech. Rep., 2016.
[6] IBM X-Force, (2015) “IBM X-Force Threat Intelligence Report 2016,” IBM, Tech. Rep., 2016. [7]
Vasilomanolakis, E. Karuppayah, S. Mühlhäuser, M. and Fischer, M. “Taxonomy and Survey of Collaborative
Intrusion Detection,” ACM Computing Surveys, vol. 47, no. 4, pp. 55:1–55:33. [8] Sommer R. and Paxson V.,
(2010) “Outside the Closed World: On Using Machine Learning for Network Intrusion Detection,” in
Proceedings of the 2010 IEEE Symposium on Security and Privacy. IEEE Computer Society, pp. 305–316.
[9] Jang, J.-w. Yun, J. Mohaisen, A. Woo, J. and. Kim, H. K (2016) “Detecting and Classifying Method Based
on Similarity Matching of Android Malware Behavior with Profile,” SpringerPlus, vol. 5, no. 1, p. 1.
[10] Nguyen, A. Yosinski, J. and Clune, J. (2015) “Deep Neural Networks Are Easily Fooled: High Confidence
Predictions for Unrecognizable Images,” The IEEE Conference on Computer Vision and Pattern Recognition.
[11] Schmugar, C. (2007) "The future of cybercrime", Sage: Security Vision From McAfee Avert Labs, 1(2), 1
5.
[12] Faruki, P. Bhandari S., Laxmi, V. Gaur M., and Conti, M. (2016) “DroidAnalyst: Synergic App Framework
for Static and Dynamic App Analysis,” in Recent Advances in Computational Intelligence in Defense and
Security. Springer, pp. 519–552.
[13] Li, W.-X. Wang, J.-B. Mu, D.-J. and Yuan, Y. (2011) “Survey on Android Rootkit,” Microprocessors, vol.
32. no.2, pp. 68-72.
[14] Kim, S. Park, J. Lee K., You, I. and Yim K., (2012) “A Brief Survey on Rootkit Techniques in
Malicious Codes,” Journal of Internet Services and Information Security, vol. 2, no. 3/4, pp. 134–147.
[15] Lam, P. Wang L.-L., Ngan, H. Y. T. Yung, N. H. C. and Yeh, A. G.-O. (2015) “Outlier Detection In Large-
Scale Traffic Data By Naïve Bayes Method and Gaussian Mixture Model Method,” arXiv.
[16] Yang, J. Deng, T. and Sui, R. (2015) “An Adaptive Weighted One-Class SVM for Robust Outlier
Detection,” in Proceedings of the 2015 Chinese Intelligent Systems Conference. Springer, pp. 475– 484.
[17] Pereira, G.V. Luciano, E. M. Macadar, M. A. and Daniel, V.M. (2013) “Information technology
governance practices adoption through an institutional perspective: The perception of brazilian and american
CIOs,” 46th Hawaii International Conference on System Sciences, pp. 4446–4455.
[18] Turel O. and Bart, C. (2014) “Board-level IT governance and organizational performance,” Eur. J. Inf.
Syst., vol. 23, no. 2, pp. 223–239.
[19] Borth, M. A., and Bradley, R. V. (2009). "Unexplored Linkages between Corporate Governance and IT
Governance: An Evaluation and Call to Research Information Technology Governance and Service
Management: Frameworks and Adaptations" IGI Global. pp. 202-220.
[20] Buchwald, A. Urbach, N. and Ahlemann, F. (2014) “Business value through controlled IT: Toward an
integrated model of IT governance success and its impact,” J. Inf. Technol., vol. 29, no. 2, pp. 128– 147.
[21] Yu, S. Wang, G. and Zhou, W. (2015) “Modeling Malicious Activities in Cyber Space,” IEEE
Network, vol. 29, no. 6, pp. 83–87.
[22] IFAC (2004), "Enterprise Governance-Getting the Balance Right", PAIB Report to IFAC.
[23] Cumps, B., Viaene, S., & Dedene, G. (2012). "Linking the Strategic Importance of ICT with Investment in
Business-ICT Alignment: An Explorative Framework". In W. Van Grembergen & S. De Haes (Eds.), Business
Strategy and Applications in Enterprise IT Governance (pp. 37-55). Hershey, Pennsylvania, USA: IGI Global.
[24] De Haes S. and Van Grembergen, W. (2015) "Enterprise Governance of Information Technology", Cham:
Springer International Publishing.
[25] ITGI (2003), "Board briefing on IT governance", 2nd Edition, Information Systems Audit and Control
Foundation, 2003.
[26] Bartens, Y ., Schulte, F., & Vos, S. (2014). "E-Business IT Governance Revisited: An Attempt towards
Outlining a Novel Bi-directional Business/IT Alignment in COBIT5", Paper presented at the 47th
Hawaii
International Conference on System Sciences (HICSS), 2014.
[27] Chou, Y.-C., Chuang, H. H.-C., & Shao, B. B. M. (2014). "The impacts of information technology on total
factor productivity: A look at externalities and innovations". International Journal of Production
Economics, 158, 290-299.
[28] ISO/IEC 38500, (2015) "Information Technology - Governance of IT for the organization" ISO/IEC
38500:2015, 2nd Edition, ISO:Switzerland.
[29] OECD (2005) Corporate Governance. OECD glossary of statistical terms, Organisation for Economic Co
operation and Development (OECD),
[30] Stroud, R.E. (2012). "Introduction to COBIT 5" . ISACA.
[31] Kephart, J. and Chess, D. M. (2003) "The vision of autonomic computing", IEEE Computer, vol. 36, no. 1,
pp. 41-50.
[32] Ganek, A. G. and Corbi, T. A. (2003) "The Dawning of the Autonomic Computing Era". IBM Systems
Journal. vol. 42, no. 1, pp. 5-18.
[33] Dudley, G., Joshi, N., Ogle, D.M., Subramanian, B. and Topol, B.B. (2004) "Autonomic self-healing
systems in a cross-product IT environment", Proceedings of the International Conference on Autonomic
Computing), 312-313.
[34] Dobson, S. Sterritt, R. Nixon, P. and Hinchey. M. (2010) "Fulfilling the vision of autonomic computing".
Computer, vol. 43, pp. 35-41.
[35] Vidales, P., Baliosian, J., Serrat, J., Mapp,G., Stajano, F. and Hopper, A. (2005) "Autonomic System for
Mobility Support in 4G Networks". IEEE Journal on Selected Areas in Communications. vol. 23, no. 12, pp.
2288-2304.
[36] Sancho G., Villemur T. and Tazi S., (2010) “An Ontology-driven Approach for Collaborative Ubiquitous
Systems”, International Journal of Autonomic Computing (IJAC) InderScience Publishers Mai pp 263 – 279
.
[37] Cabri, G., Leonardi, L. and Zambonelli, F. (2002) "Engineering Mobile Agent Applications Via Context-
Dependent Coordination". IEEE Transactions on Software Engineering. vol. 28, no. 11, pp. 1040-1058.
[38] Russell, S.J.; Norvig, P. (2010). “Artificial intelligence: A modern approach” (3rd ed. ed.). Upper Saddle
River: Prentice Hall.
[39] Alizadeh, H. Khoshrou A., and Zúquete, A. (2015) “Traffic Classification and Verification using
Unsupervised Learning of Gaussian Mixture Models,” in International Workshop on Measurements &
Networking. IEEE.
[40] Venkatraman, S. (2010) "Self-Learning Framework for Intrusion Detection", Proceedings of The 2010
International Congress on Computer Applications and Computational Science (CACS 2010), 4- 6 December,
Singapore, pp. 517-520
[41] Cui, T., Ye, H., Teo, H. H., & Li, J. (2015) "Information technology and open innovation: A strategic
alignment perspective". Information & Management, vol. 52, pp. 348-358.
[42] Yu, S. Guo, S. andStojmenovic, I. (2015) “Fool Me if You Can: Mimicking Attacks and Anti-Attacks in
Cyberspace,” IEEE Transactions on Computers, vol. 64, no. 1, pp. 139–151.
CLASSIFICATION OF QUESTIONS AND LEARNING OUTCOME STATEMENTS
(LOS) INTO BLOOM’S TAXONOMY (BT) BY SIMILARITY MEASUREMENTS
TOWARDS EXTRACTING OF LEARNING OUTCOME FROM LEARNING
MATERIAL
Shadi Diab1
and Badie Sartawi2
1
Information and Communication Technology Center, Al-Quds Open University, Ramallah –
Palestine
2
Associate Professor of Computer Science, Al-Quds University, Jerusalem - Palestine
ABSTRACT
Bloom’s Taxonomy (BT) have been used to classify the objectives of learning outcome by dividing the
learning into three different domains; the cognitive domain, the effective domain and the psychomotor
domain. In this paper, we are introducing a new approach to classify the questions and learning outcome
statements (LOS) into Blooms taxonomy (BT) and to verify BT verb lists, which are being cited and used by
academicians to write questions and (LOS). An experiment was designed to investigate the semantic
relationship between the action verbs used in both questions and LOS to obtain more accurate classification
of the levels of BT. A sample of 775 different action verbs collected from different universities allows us to
measure an accurate and clear-cut cognitive level for the action verb. It is worth mentioning that natural
language processing techniques were used to develop our rules as to induce the questions into chunks in
order to extract the action verbs. Our proposed solution was able to classify the action verb into a precise
level of the cognitive domain. We, on our side, have tested and evaluated our proposed solution using
confusion matrix. The results of evaluation tests yielded 97% for the macro average of precision and 90% for
F1. Thus, the outcome of the research suggests that it is crucial to analyse and verify the action verbs cited
and used by academicians to write LOS and classify their questions based on blooms taxonomy in order to
obtain a definite and more accurate classification..
KEYWORDS
Learning outcome; Natural Language Processing, Similarity Measurement; Questions Classification
FOR MORE DETAILS:
http://aircconline.com/ijmit/V9N2/9317ijmit01.pdf
VOLUME LINK: http://airccse.org/journal/ijmit/vol9.html
REFERENCES
[1] Declan Kennedy, Writing and using learning outcomes: a practical guide, Page 18, Cork:
University College Cork, 2006.
[2] EU, Publications Office, Using learning outcome, European Qualifications Framework Series:
Note 4, Luxembourg: ISBN 978-92-79-21085-3, 2011 Page, 2010.
[3] Totschnig, Michael, et al., "Repository services for outcome-based learning" 2010.
[4] Office Of Institutional Effectiveness, Assessment Workbook For Academic Programs, Richmond:
University Of Richmond, 2008.
[5] Advancing Academic Quality in Business Education Worldwide, Bloom’s Taxonomy of
Educational Objectives and Writing Intended Learning Outcomes Statements, Kansas: International
Assembly for Collegiate Business Education, 2016.
[6] M. D. Gall, "The Use of Questions in Teaching," American Educational Research Association,
vol. 40, no. 5, pp. 707-721, 1970.
[7] D. R. Krathwohl, A Revision of Bloom's Taxonomy:, College of Education, The Ohio State
University.
[8] Li and Roth, Learning Question Classifiers, Illinois USA: 19th International Conference on
Compuatational Linguistics (COLING) 2002.
[9] Wen-Chih Chang and Ming-Shun Chung, Automatic Applying Bloom's Taxonomy to Classify and
Analysis the cognition level of english questions items, Taiwan: IEEE, 2009.
[10] Sonal Jain and Jyoti Pareek, Automatic extraction of prerequisites and learning outcome from
learning material, India: Inderscience Enterprises Ltd., 2013.
[11] Syahidah Haris and Nazila Omar, A Rule-based Approach in Bloom’s Taxonomy Question
Classification through Natural Language, Malaysia, 2013.
[12] Syahidah sufi haris and nazlia omar, Bloom's Taxonomy Question Categorization Using Rules
And N-Gram Approach, Malaysia: Journal of Theoretical and Applied Information Technology, 2015.
[13] Payal Biswas et al, Question Classification Using Syntactic And Rule Based Approach, New
Delhi: International Conference on Advances in Computing, Communications and Informatics
(ICACCI), 2014.
[14] Dell Zhang et al, Question Classification using Support Vector Machines, Singapore: ACM 1-
58113- 646-3/03/0007, 2003.
[15] Jibin Fu, Two Level Question Classification Based on SVM and Question Semantic Similarity,
Beijing, China: International Conference on Electronic Computer Technology, 2009.
[16] Anwar Ali Yahya and Addin Osman, Automatic Classification Of Questions Into Bloom's
Cognitive Levels Using Support Vector Machines, Najran: Researchgate, 2011.
[17] K. J. et al, An automatic classifer for exam questions with wordnet and cosine, International
Journal of Emerging Technologies in Learning (iJET) 11(04):142 • April 2016.
[18] Lingling Meng et al, "A Review of Semantic Similarity Measures in WordNet," International
Journal of Hybrid Information Technology, vol. 6, no. 1, p. 1, 2013.
[19] Siddharth Patwardhan et al, "Using Measures of Semantic Relatedness for Word Sense
Disambiguation," Springer, p. 241–257, 2003.
[20] G. V. e. al, "Semantic Similarity Methods in WordNet and Their Application to Information
Retrieval on the Web," ACM New York, NY, USA ©2005, pp. 10-16, 2005.
[21] G. A. Miller, "WordNet - A Lexical Database for English," Communications of the ACM, vol.
38, no. 11, pp. 39-41, 2005. International Journal of Managing Information Technology (IJMIT)
Vol.9, No.2, May 2017 12
[22] C. C. a. R. Mihalcea, Measuring the Semantic Similarity of Texts, University of North Texas:
University of North Texas, 2005.
[23] Z. W. a. M. Palmer, "VERB SEMANTICS AND LEXICAL SELECTION," in In Proceedings of
the 32nd Annual Meeting of the Associations for Computational Linguistics, Las Cruces, New
Mexico,,1994.
[24] Virginia.ED, "Bloom's Taxonomy of Cognitive Skills with Action Verb List Source," University
of Verginia, 20 2 2017. [Online]. Available:
http://avillage.web.virginia.edu/iaas/assess/resources/verblist.pdf. [Accessed 20 2 2017].
[25] U. O. C. Florida, "Bloom's Taxonomy," University of Central Florida, 20 2 2017. [Online].
Available: http://www.fctl.ucf.edu/teachingandlearningresources/coursedesign/bloomstaxonomy/.
[Accessed 20 2 2017].
[26] M. S. University, "Bloom’s Taxonomy Action Verbs," Missouri State University, 20 2 2017.
[Online]. Available: https://www.missouristate.edu/assets/fctl/Blooms_Taxonomy_Action_Verbs.pdf.
[Accessed 20 2 2017].
[27] C. A. College, "Bloom's Taxonomy Verbs," Central Arizona College, 20 2 2017. [Online].
Available:
http://www.centralaz.edu/Documents/class/Bloom's%20Taxonomy%20Verbs%20Web.pdf.
[Accessed 20 2 2017].
[28] F. Kugelman, "http://www.bloomstaxonomy.org/," 6 2 2017. [Online]. Available:
http://www.bloomstaxonomy.org/BloomsTaxonomyquestions.pdf. [Accessed 06 02 2017].
[29] Zaanen et al, "Question classification by structure induction," in IJCAI'05 Proceedings of the 19th
international joint conference on Artificial intelligence, Edinburgh, Scotland , 2005.
[30] C. Adelman, The Language and Syntax of Learning Outcomes Statements, National Institute for
Learning Outcomes Assessment, 2015.
[31] The Center For Learning, Muskie Institute Center for Learning, University of Southern Maine
[Online]. Available: http://php.ipsiconnect.org/doc/VerbList.htm. [Accessed 27 2 2017].
[32] Fresnostate university, "Bloom’s Taxonomy Action Verbs," [Online]. Available:
http://www.fresnostate.edu/academics/oie/documents/assesments/Blooms%20Level.pdf. [Accessed 4
3 2017].
[33] K. Markham, "Simple guide to confusion matrix terminology," dataschool, [Online]. Available:
http://www.dataschool.io/simple-guide-to-confusion-matrix-terminology/. [Accessed 07 03 2017].
[34] E. K. A. E. L. Steven Bird, Natural Language Processing with Python, 2009: O’Reilly Media,
Inc., O’Reilly Media, Inc.
[35] R. Joshi, "How to evaluate the performance of a model in Azure ML and understanding
“Confusion Metrics”," exsilio.com, 9 Septemper 2016. [Online]. Available:
http://blog.exsilio.com/all/accuracyprecision-recall-f1-score-interpretation-of-performance-measures/.
[Accessed 2017 3 7].

More Related Content

What's hot

Cloudcomputingthesis
CloudcomputingthesisCloudcomputingthesis
Cloudcomputingthesis
Deepak Chiripal
 
A Survey of Building Robust Business Models in Pervasive Computing
A Survey of Building Robust Business Models in Pervasive ComputingA Survey of Building Robust Business Models in Pervasive Computing
A Survey of Building Robust Business Models in Pervasive Computing
Osama M. Khaled
 
rpaper
rpaperrpaper
rpaperimu409
 
International Journal on Web Service Computing (IJWSC)
International Journal on Web Service Computing (IJWSC)International Journal on Web Service Computing (IJWSC)
International Journal on Web Service Computing (IJWSC)
ijwscjournal
 
SECURETI: Advanced SDLC and Project Management Tool for TI (Philippines)
SECURETI: Advanced SDLC and Project Management Tool for TI (Philippines)SECURETI: Advanced SDLC and Project Management Tool for TI (Philippines)
SECURETI: Advanced SDLC and Project Management Tool for TI (Philippines)
AIRCC Publishing Corporation
 
Conceptualizations of it
Conceptualizations of itConceptualizations of it
Conceptualizations of itOsama Mansour
 
Artificial intelligence: Simulation of Intelligence
Artificial intelligence: Simulation of IntelligenceArtificial intelligence: Simulation of Intelligence
Artificial intelligence: Simulation of Intelligence
Abhishek Upadhyay
 
June 2020: Top Read Articles in Advanced Computing
June 2020: Top Read Articles in Advanced ComputingJune 2020: Top Read Articles in Advanced Computing
June 2020: Top Read Articles in Advanced Computing
acijjournal
 
Interpretive Structural Modeling of the Prospects of Ict Enabled Process Cont...
Interpretive Structural Modeling of the Prospects of Ict Enabled Process Cont...Interpretive Structural Modeling of the Prospects of Ict Enabled Process Cont...
Interpretive Structural Modeling of the Prospects of Ict Enabled Process Cont...
IOSR Journals
 
SMU MBA Solved Assignment MK0016
 SMU  MBA Solved Assignment MK0016 SMU  MBA Solved Assignment MK0016
SMU MBA Solved Assignment MK0016Revlon
 
Top Computer Science & Information Technology Articles of 2019
Top Computer Science & Information Technology Articles of 2019 Top Computer Science & Information Technology Articles of 2019
Top Computer Science & Information Technology Articles of 2019
AIRCC Publishing Corporation
 
Dynamic IT Values and Relationships: A Sociomaterial Perspective
Dynamic IT Values and Relationships: A Sociomaterial PerspectiveDynamic IT Values and Relationships: A Sociomaterial Perspective
Dynamic IT Values and Relationships: A Sociomaterial Perspective
Leon Dohmen
 
Open Data Analytical Model for Human Development Index to Support Government ...
Open Data Analytical Model for Human Development Index to Support Government ...Open Data Analytical Model for Human Development Index to Support Government ...
Open Data Analytical Model for Human Development Index to Support Government ...
Andry Alamsyah
 
Organizational and social impact of Artificial Intelligence
Organizational and social impact of Artificial IntelligenceOrganizational and social impact of Artificial Intelligence
Organizational and social impact of Artificial Intelligence
AJHSSR Journal
 
Responsible AI
Responsible AIResponsible AI
Responsible AI
Neo4j
 
A3 - Análise de ameaças - Threat analysis in goal oriented security requireme...
A3 - Análise de ameaças - Threat analysis in goal oriented security requireme...A3 - Análise de ameaças - Threat analysis in goal oriented security requireme...
A3 - Análise de ameaças - Threat analysis in goal oriented security requireme...
Spark Security
 
Ai open powermeetupmarch25th
Ai open powermeetupmarch25thAi open powermeetupmarch25th
Ai open powermeetupmarch25th
IBM
 
Investigating the Benefits of Using Information Systems in Saudi Arabia Const...
Investigating the Benefits of Using Information Systems in Saudi Arabia Const...Investigating the Benefits of Using Information Systems in Saudi Arabia Const...
Investigating the Benefits of Using Information Systems in Saudi Arabia Const...
IJERA Editor
 
Responsible AI
Responsible AIResponsible AI
Responsible AI
Neo4j
 

What's hot (20)

Cloudcomputingthesis
CloudcomputingthesisCloudcomputingthesis
Cloudcomputingthesis
 
A Survey of Building Robust Business Models in Pervasive Computing
A Survey of Building Robust Business Models in Pervasive ComputingA Survey of Building Robust Business Models in Pervasive Computing
A Survey of Building Robust Business Models in Pervasive Computing
 
rpaper
rpaperrpaper
rpaper
 
International Journal on Web Service Computing (IJWSC)
International Journal on Web Service Computing (IJWSC)International Journal on Web Service Computing (IJWSC)
International Journal on Web Service Computing (IJWSC)
 
SECURETI: Advanced SDLC and Project Management Tool for TI (Philippines)
SECURETI: Advanced SDLC and Project Management Tool for TI (Philippines)SECURETI: Advanced SDLC and Project Management Tool for TI (Philippines)
SECURETI: Advanced SDLC and Project Management Tool for TI (Philippines)
 
Conceptualizations of it
Conceptualizations of itConceptualizations of it
Conceptualizations of it
 
Artificial intelligence: Simulation of Intelligence
Artificial intelligence: Simulation of IntelligenceArtificial intelligence: Simulation of Intelligence
Artificial intelligence: Simulation of Intelligence
 
June 2020: Top Read Articles in Advanced Computing
June 2020: Top Read Articles in Advanced ComputingJune 2020: Top Read Articles in Advanced Computing
June 2020: Top Read Articles in Advanced Computing
 
Interpretive Structural Modeling of the Prospects of Ict Enabled Process Cont...
Interpretive Structural Modeling of the Prospects of Ict Enabled Process Cont...Interpretive Structural Modeling of the Prospects of Ict Enabled Process Cont...
Interpretive Structural Modeling of the Prospects of Ict Enabled Process Cont...
 
SMU MBA Solved Assignment MK0016
 SMU  MBA Solved Assignment MK0016 SMU  MBA Solved Assignment MK0016
SMU MBA Solved Assignment MK0016
 
Top Computer Science & Information Technology Articles of 2019
Top Computer Science & Information Technology Articles of 2019 Top Computer Science & Information Technology Articles of 2019
Top Computer Science & Information Technology Articles of 2019
 
Dynamic IT Values and Relationships: A Sociomaterial Perspective
Dynamic IT Values and Relationships: A Sociomaterial PerspectiveDynamic IT Values and Relationships: A Sociomaterial Perspective
Dynamic IT Values and Relationships: A Sociomaterial Perspective
 
Open Data Analytical Model for Human Development Index to Support Government ...
Open Data Analytical Model for Human Development Index to Support Government ...Open Data Analytical Model for Human Development Index to Support Government ...
Open Data Analytical Model for Human Development Index to Support Government ...
 
Organizational and social impact of Artificial Intelligence
Organizational and social impact of Artificial IntelligenceOrganizational and social impact of Artificial Intelligence
Organizational and social impact of Artificial Intelligence
 
Responsible AI
Responsible AIResponsible AI
Responsible AI
 
A3 - Análise de ameaças - Threat analysis in goal oriented security requireme...
A3 - Análise de ameaças - Threat analysis in goal oriented security requireme...A3 - Análise de ameaças - Threat analysis in goal oriented security requireme...
A3 - Análise de ameaças - Threat analysis in goal oriented security requireme...
 
Ai open powermeetupmarch25th
Ai open powermeetupmarch25thAi open powermeetupmarch25th
Ai open powermeetupmarch25th
 
Investigating the Benefits of Using Information Systems in Saudi Arabia Const...
Investigating the Benefits of Using Information Systems in Saudi Arabia Const...Investigating the Benefits of Using Information Systems in Saudi Arabia Const...
Investigating the Benefits of Using Information Systems in Saudi Arabia Const...
 
Publication
PublicationPublication
Publication
 
Responsible AI
Responsible AIResponsible AI
Responsible AI
 

Similar to TOP CITED 2 ARTICLES IN 2017 - INTERNATIONAL JOURNAL OF MANAGING INFORMATION TECHNOLOGY (IJMIT)

May 2021: Top 10 Read Articles in Network Security and Its Applications
May 2021: Top 10 Read Articles in Network Security and Its ApplicationsMay 2021: Top 10 Read Articles in Network Security and Its Applications
May 2021: Top 10 Read Articles in Network Security and Its Applications
IJNSA Journal
 
June 2021 - Top 10 Read Articles in Network Security and Its Applications
June 2021 - Top 10 Read Articles in Network Security and Its ApplicationsJune 2021 - Top 10 Read Articles in Network Security and Its Applications
June 2021 - Top 10 Read Articles in Network Security and Its Applications
IJNSA Journal
 
Most trending articles 2020 - International Journal of Network Security & Its...
Most trending articles 2020 - International Journal of Network Security & Its...Most trending articles 2020 - International Journal of Network Security & Its...
Most trending articles 2020 - International Journal of Network Security & Its...
IJNSA Journal
 
Top cited Network Security Articles- Part 1
Top cited Network Security  Articles- Part 1Top cited Network Security  Articles- Part 1
Top cited Network Security Articles- Part 1
IJNSA Journal
 
September 2021: Top 10 Read Articles in Network Security and Its Applications
September 2021: Top 10 Read Articles in Network Security and Its ApplicationsSeptember 2021: Top 10 Read Articles in Network Security and Its Applications
September 2021: Top 10 Read Articles in Network Security and Its Applications
IJNSA Journal
 
Top cited article in Software Engineering Research Field - IJSEA
Top cited article in Software Engineering Research Field - IJSEATop cited article in Software Engineering Research Field - IJSEA
Top cited article in Software Engineering Research Field - IJSEA
ijseajournal
 
July 2021 - Top 10 Read Articles in Network Security & Its Applications
July 2021 - Top 10 Read Articles in Network Security & Its ApplicationsJuly 2021 - Top 10 Read Articles in Network Security & Its Applications
July 2021 - Top 10 Read Articles in Network Security & Its Applications
IJNSA Journal
 
January 2021 - Top 10 Read Articles in Network Security & Its Applications
January 2021 - Top 10 Read Articles in Network Security & Its ApplicationsJanuary 2021 - Top 10 Read Articles in Network Security & Its Applications
January 2021 - Top 10 Read Articles in Network Security & Its Applications
IJNSA Journal
 
Most Downloaded article for an year in academia - International Journal of Ne...
Most Downloaded article for an year in academia - International Journal of Ne...Most Downloaded article for an year in academia - International Journal of Ne...
Most Downloaded article for an year in academia - International Journal of Ne...
IJNSA Journal
 
October 2020 - Top Read Articles in Network Security & Its Applications
October 2020 - Top Read Articles in Network Security & Its ApplicationsOctober 2020 - Top Read Articles in Network Security & Its Applications
October 2020 - Top Read Articles in Network Security & Its Applications
IJNSA Journal
 
March 2021: Top 10 Read Articles in Network Security and Its Applications
March 2021: Top 10 Read Articles in Network Security and Its ApplicationsMarch 2021: Top 10 Read Articles in Network Security and Its Applications
March 2021: Top 10 Read Articles in Network Security and Its Applications
IJNSA Journal
 
Top downloaded papers - International Journal of Managing Information Technol...
Top downloaded papers - International Journal of Managing Information Technol...Top downloaded papers - International Journal of Managing Information Technol...
Top downloaded papers - International Journal of Managing Information Technol...
IJMIT JOURNAL
 
Most cited articles in academia - International journal of network security &...
Most cited articles in academia - International journal of network security &...Most cited articles in academia - International journal of network security &...
Most cited articles in academia - International journal of network security &...
IJNSA Journal
 
Trends in datamining in 2020
Trends in datamining in 2020Trends in datamining in 2020
Trends in datamining in 2020
IJDKP
 
August 2022: Top 10 Read Articles in Network Security and Its Applications
August 2022: Top 10 Read Articles in Network Security and Its ApplicationsAugust 2022: Top 10 Read Articles in Network Security and Its Applications
August 2022: Top 10 Read Articles in Network Security and Its Applications
IJNSA Journal
 
July 2022 - Top 10 Read Articles in Network Security & Its Applications
July 2022 - Top 10 Read Articles in Network Security & Its ApplicationsJuly 2022 - Top 10 Read Articles in Network Security & Its Applications
July 2022 - Top 10 Read Articles in Network Security & Its Applications
IJNSA Journal
 
March 2024 - Top 10 Read Articles in Network Security & Its Applications
March 2024 - Top 10 Read Articles in Network Security & Its ApplicationsMarch 2024 - Top 10 Read Articles in Network Security & Its Applications
March 2024 - Top 10 Read Articles in Network Security & Its Applications
IJNSA Journal
 
December 2021: Top 10 Read Articles in Network Security and Its Applications
December 2021: Top 10 Read Articles in Network Security and Its ApplicationsDecember 2021: Top 10 Read Articles in Network Security and Its Applications
December 2021: Top 10 Read Articles in Network Security and Its Applications
IJNSA Journal
 
January 2024 - Top 10 Read Articles in Network Security & Its Applications
January 2024 - Top 10 Read Articles in Network Security & Its ApplicationsJanuary 2024 - Top 10 Read Articles in Network Security & Its Applications
January 2024 - Top 10 Read Articles in Network Security & Its Applications
IJNSA Journal
 
March 2022 - Top 10 Read Articles in Network Security and Its Applications
March 2022 - Top 10 Read Articles in Network Security and Its ApplicationsMarch 2022 - Top 10 Read Articles in Network Security and Its Applications
March 2022 - Top 10 Read Articles in Network Security and Its Applications
IJNSA Journal
 

Similar to TOP CITED 2 ARTICLES IN 2017 - INTERNATIONAL JOURNAL OF MANAGING INFORMATION TECHNOLOGY (IJMIT) (20)

May 2021: Top 10 Read Articles in Network Security and Its Applications
May 2021: Top 10 Read Articles in Network Security and Its ApplicationsMay 2021: Top 10 Read Articles in Network Security and Its Applications
May 2021: Top 10 Read Articles in Network Security and Its Applications
 
June 2021 - Top 10 Read Articles in Network Security and Its Applications
June 2021 - Top 10 Read Articles in Network Security and Its ApplicationsJune 2021 - Top 10 Read Articles in Network Security and Its Applications
June 2021 - Top 10 Read Articles in Network Security and Its Applications
 
Most trending articles 2020 - International Journal of Network Security & Its...
Most trending articles 2020 - International Journal of Network Security & Its...Most trending articles 2020 - International Journal of Network Security & Its...
Most trending articles 2020 - International Journal of Network Security & Its...
 
Top cited Network Security Articles- Part 1
Top cited Network Security  Articles- Part 1Top cited Network Security  Articles- Part 1
Top cited Network Security Articles- Part 1
 
September 2021: Top 10 Read Articles in Network Security and Its Applications
September 2021: Top 10 Read Articles in Network Security and Its ApplicationsSeptember 2021: Top 10 Read Articles in Network Security and Its Applications
September 2021: Top 10 Read Articles in Network Security and Its Applications
 
Top cited article in Software Engineering Research Field - IJSEA
Top cited article in Software Engineering Research Field - IJSEATop cited article in Software Engineering Research Field - IJSEA
Top cited article in Software Engineering Research Field - IJSEA
 
July 2021 - Top 10 Read Articles in Network Security & Its Applications
July 2021 - Top 10 Read Articles in Network Security & Its ApplicationsJuly 2021 - Top 10 Read Articles in Network Security & Its Applications
July 2021 - Top 10 Read Articles in Network Security & Its Applications
 
January 2021 - Top 10 Read Articles in Network Security & Its Applications
January 2021 - Top 10 Read Articles in Network Security & Its ApplicationsJanuary 2021 - Top 10 Read Articles in Network Security & Its Applications
January 2021 - Top 10 Read Articles in Network Security & Its Applications
 
Most Downloaded article for an year in academia - International Journal of Ne...
Most Downloaded article for an year in academia - International Journal of Ne...Most Downloaded article for an year in academia - International Journal of Ne...
Most Downloaded article for an year in academia - International Journal of Ne...
 
October 2020 - Top Read Articles in Network Security & Its Applications
October 2020 - Top Read Articles in Network Security & Its ApplicationsOctober 2020 - Top Read Articles in Network Security & Its Applications
October 2020 - Top Read Articles in Network Security & Its Applications
 
March 2021: Top 10 Read Articles in Network Security and Its Applications
March 2021: Top 10 Read Articles in Network Security and Its ApplicationsMarch 2021: Top 10 Read Articles in Network Security and Its Applications
March 2021: Top 10 Read Articles in Network Security and Its Applications
 
Top downloaded papers - International Journal of Managing Information Technol...
Top downloaded papers - International Journal of Managing Information Technol...Top downloaded papers - International Journal of Managing Information Technol...
Top downloaded papers - International Journal of Managing Information Technol...
 
Most cited articles in academia - International journal of network security &...
Most cited articles in academia - International journal of network security &...Most cited articles in academia - International journal of network security &...
Most cited articles in academia - International journal of network security &...
 
Trends in datamining in 2020
Trends in datamining in 2020Trends in datamining in 2020
Trends in datamining in 2020
 
August 2022: Top 10 Read Articles in Network Security and Its Applications
August 2022: Top 10 Read Articles in Network Security and Its ApplicationsAugust 2022: Top 10 Read Articles in Network Security and Its Applications
August 2022: Top 10 Read Articles in Network Security and Its Applications
 
July 2022 - Top 10 Read Articles in Network Security & Its Applications
July 2022 - Top 10 Read Articles in Network Security & Its ApplicationsJuly 2022 - Top 10 Read Articles in Network Security & Its Applications
July 2022 - Top 10 Read Articles in Network Security & Its Applications
 
March 2024 - Top 10 Read Articles in Network Security & Its Applications
March 2024 - Top 10 Read Articles in Network Security & Its ApplicationsMarch 2024 - Top 10 Read Articles in Network Security & Its Applications
March 2024 - Top 10 Read Articles in Network Security & Its Applications
 
December 2021: Top 10 Read Articles in Network Security and Its Applications
December 2021: Top 10 Read Articles in Network Security and Its ApplicationsDecember 2021: Top 10 Read Articles in Network Security and Its Applications
December 2021: Top 10 Read Articles in Network Security and Its Applications
 
January 2024 - Top 10 Read Articles in Network Security & Its Applications
January 2024 - Top 10 Read Articles in Network Security & Its ApplicationsJanuary 2024 - Top 10 Read Articles in Network Security & Its Applications
January 2024 - Top 10 Read Articles in Network Security & Its Applications
 
March 2022 - Top 10 Read Articles in Network Security and Its Applications
March 2022 - Top 10 Read Articles in Network Security and Its ApplicationsMarch 2022 - Top 10 Read Articles in Network Security and Its Applications
March 2022 - Top 10 Read Articles in Network Security and Its Applications
 

More from IJMIT JOURNAL

MULTIMODAL COURSE DESIGN AND IMPLEMENTATION USING LEML AND LMS FOR INSTRUCTIO...
MULTIMODAL COURSE DESIGN AND IMPLEMENTATION USING LEML AND LMS FOR INSTRUCTIO...MULTIMODAL COURSE DESIGN AND IMPLEMENTATION USING LEML AND LMS FOR INSTRUCTIO...
MULTIMODAL COURSE DESIGN AND IMPLEMENTATION USING LEML AND LMS FOR INSTRUCTIO...
IJMIT JOURNAL
 
Novel R&D Capabilities as a Response to ESG Risks-Lessons From Amazon’s Fusio...
Novel R&D Capabilities as a Response to ESG Risks-Lessons From Amazon’s Fusio...Novel R&D Capabilities as a Response to ESG Risks-Lessons From Amazon’s Fusio...
Novel R&D Capabilities as a Response to ESG Risks-Lessons From Amazon’s Fusio...
IJMIT JOURNAL
 
International Journal of Managing Information Technology (IJMIT) ** WJCI Indexed
International Journal of Managing Information Technology (IJMIT) ** WJCI IndexedInternational Journal of Managing Information Technology (IJMIT) ** WJCI Indexed
International Journal of Managing Information Technology (IJMIT) ** WJCI Indexed
IJMIT JOURNAL
 
International Journal of Managing Information Technology (IJMIT) ** WJCI Indexed
International Journal of Managing Information Technology (IJMIT) ** WJCI IndexedInternational Journal of Managing Information Technology (IJMIT) ** WJCI Indexed
International Journal of Managing Information Technology (IJMIT) ** WJCI Indexed
IJMIT JOURNAL
 
NOVEL R & D CAPABILITIES AS A RESPONSE TO ESG RISKS- LESSONS FROM AMAZON’S FU...
NOVEL R & D CAPABILITIES AS A RESPONSE TO ESG RISKS- LESSONS FROM AMAZON’S FU...NOVEL R & D CAPABILITIES AS A RESPONSE TO ESG RISKS- LESSONS FROM AMAZON’S FU...
NOVEL R & D CAPABILITIES AS A RESPONSE TO ESG RISKS- LESSONS FROM AMAZON’S FU...
IJMIT JOURNAL
 
A REVIEW OF STOCK TREND PREDICTION WITH COMBINATION OF EFFECTIVE MULTI TECHNI...
A REVIEW OF STOCK TREND PREDICTION WITH COMBINATION OF EFFECTIVE MULTI TECHNI...A REVIEW OF STOCK TREND PREDICTION WITH COMBINATION OF EFFECTIVE MULTI TECHNI...
A REVIEW OF STOCK TREND PREDICTION WITH COMBINATION OF EFFECTIVE MULTI TECHNI...
IJMIT JOURNAL
 
INTRUSION DETECTION SYSTEM USING CUSTOMIZED RULES FOR SNORT
INTRUSION DETECTION SYSTEM USING CUSTOMIZED RULES FOR SNORTINTRUSION DETECTION SYSTEM USING CUSTOMIZED RULES FOR SNORT
INTRUSION DETECTION SYSTEM USING CUSTOMIZED RULES FOR SNORT
IJMIT JOURNAL
 
15223ijmit02.pdf
15223ijmit02.pdf15223ijmit02.pdf
15223ijmit02.pdf
IJMIT JOURNAL
 
MEDIATING AND MODERATING FACTORS AFFECTING READINESS TO IOT APPLICATIONS: THE...
MEDIATING AND MODERATING FACTORS AFFECTING READINESS TO IOT APPLICATIONS: THE...MEDIATING AND MODERATING FACTORS AFFECTING READINESS TO IOT APPLICATIONS: THE...
MEDIATING AND MODERATING FACTORS AFFECTING READINESS TO IOT APPLICATIONS: THE...
IJMIT JOURNAL
 
EFFECTIVELY CONNECT ACQUIRED TECHNOLOGY TO INNOVATION OVER A LONG PERIOD
EFFECTIVELY CONNECT ACQUIRED TECHNOLOGY TO INNOVATION OVER A LONG PERIODEFFECTIVELY CONNECT ACQUIRED TECHNOLOGY TO INNOVATION OVER A LONG PERIOD
EFFECTIVELY CONNECT ACQUIRED TECHNOLOGY TO INNOVATION OVER A LONG PERIOD
IJMIT JOURNAL
 
International Journal of Managing Information Technology (IJMIT) ** WJCI Indexed
International Journal of Managing Information Technology (IJMIT) ** WJCI IndexedInternational Journal of Managing Information Technology (IJMIT) ** WJCI Indexed
International Journal of Managing Information Technology (IJMIT) ** WJCI Indexed
IJMIT JOURNAL
 
4th International Conference on Cloud, Big Data and IoT (CBIoT 2023)
4th International Conference on Cloud, Big Data and IoT (CBIoT 2023)4th International Conference on Cloud, Big Data and IoT (CBIoT 2023)
4th International Conference on Cloud, Big Data and IoT (CBIoT 2023)
IJMIT JOURNAL
 
TRANSFORMING SERVICE OPERATIONS WITH AI: A CASE FOR BUSINESS VALUE
TRANSFORMING SERVICE OPERATIONS WITH AI: A CASE FOR BUSINESS VALUETRANSFORMING SERVICE OPERATIONS WITH AI: A CASE FOR BUSINESS VALUE
TRANSFORMING SERVICE OPERATIONS WITH AI: A CASE FOR BUSINESS VALUE
IJMIT JOURNAL
 
DESIGNING A FRAMEWORK FOR ENHANCING THE ONLINE KNOWLEDGE-SHARING BEHAVIOR OF ...
DESIGNING A FRAMEWORK FOR ENHANCING THE ONLINE KNOWLEDGE-SHARING BEHAVIOR OF ...DESIGNING A FRAMEWORK FOR ENHANCING THE ONLINE KNOWLEDGE-SHARING BEHAVIOR OF ...
DESIGNING A FRAMEWORK FOR ENHANCING THE ONLINE KNOWLEDGE-SHARING BEHAVIOR OF ...
IJMIT JOURNAL
 
BUILDING RELIABLE CLOUD SYSTEMS THROUGH CHAOS ENGINEERING
BUILDING RELIABLE CLOUD SYSTEMS THROUGH CHAOS ENGINEERINGBUILDING RELIABLE CLOUD SYSTEMS THROUGH CHAOS ENGINEERING
BUILDING RELIABLE CLOUD SYSTEMS THROUGH CHAOS ENGINEERING
IJMIT JOURNAL
 
A REVIEW OF STOCK TREND PREDICTION WITH COMBINATION OF EFFECTIVE MULTI TECHNI...
A REVIEW OF STOCK TREND PREDICTION WITH COMBINATION OF EFFECTIVE MULTI TECHNI...A REVIEW OF STOCK TREND PREDICTION WITH COMBINATION OF EFFECTIVE MULTI TECHNI...
A REVIEW OF STOCK TREND PREDICTION WITH COMBINATION OF EFFECTIVE MULTI TECHNI...
IJMIT JOURNAL
 
NETWORK MEDIA ATTENTION AND GREEN TECHNOLOGY INNOVATION
NETWORK MEDIA ATTENTION AND GREEN TECHNOLOGY INNOVATIONNETWORK MEDIA ATTENTION AND GREEN TECHNOLOGY INNOVATION
NETWORK MEDIA ATTENTION AND GREEN TECHNOLOGY INNOVATION
IJMIT JOURNAL
 
INCLUSIVE ENTREPRENEURSHIP IN HANDLING COMPETING INSTITUTIONAL LOGICS FOR DHI...
INCLUSIVE ENTREPRENEURSHIP IN HANDLING COMPETING INSTITUTIONAL LOGICS FOR DHI...INCLUSIVE ENTREPRENEURSHIP IN HANDLING COMPETING INSTITUTIONAL LOGICS FOR DHI...
INCLUSIVE ENTREPRENEURSHIP IN HANDLING COMPETING INSTITUTIONAL LOGICS FOR DHI...
IJMIT JOURNAL
 
DEEP LEARNING APPROACH FOR EVENT MONITORING SYSTEM
DEEP LEARNING APPROACH FOR EVENT MONITORING SYSTEMDEEP LEARNING APPROACH FOR EVENT MONITORING SYSTEM
DEEP LEARNING APPROACH FOR EVENT MONITORING SYSTEM
IJMIT JOURNAL
 
MULTIMODAL COURSE DESIGN AND IMPLEMENTATION USING LEML AND LMS FOR INSTRUCTIO...
MULTIMODAL COURSE DESIGN AND IMPLEMENTATION USING LEML AND LMS FOR INSTRUCTIO...MULTIMODAL COURSE DESIGN AND IMPLEMENTATION USING LEML AND LMS FOR INSTRUCTIO...
MULTIMODAL COURSE DESIGN AND IMPLEMENTATION USING LEML AND LMS FOR INSTRUCTIO...
IJMIT JOURNAL
 

More from IJMIT JOURNAL (20)

MULTIMODAL COURSE DESIGN AND IMPLEMENTATION USING LEML AND LMS FOR INSTRUCTIO...
MULTIMODAL COURSE DESIGN AND IMPLEMENTATION USING LEML AND LMS FOR INSTRUCTIO...MULTIMODAL COURSE DESIGN AND IMPLEMENTATION USING LEML AND LMS FOR INSTRUCTIO...
MULTIMODAL COURSE DESIGN AND IMPLEMENTATION USING LEML AND LMS FOR INSTRUCTIO...
 
Novel R&D Capabilities as a Response to ESG Risks-Lessons From Amazon’s Fusio...
Novel R&D Capabilities as a Response to ESG Risks-Lessons From Amazon’s Fusio...Novel R&D Capabilities as a Response to ESG Risks-Lessons From Amazon’s Fusio...
Novel R&D Capabilities as a Response to ESG Risks-Lessons From Amazon’s Fusio...
 
International Journal of Managing Information Technology (IJMIT) ** WJCI Indexed
International Journal of Managing Information Technology (IJMIT) ** WJCI IndexedInternational Journal of Managing Information Technology (IJMIT) ** WJCI Indexed
International Journal of Managing Information Technology (IJMIT) ** WJCI Indexed
 
International Journal of Managing Information Technology (IJMIT) ** WJCI Indexed
International Journal of Managing Information Technology (IJMIT) ** WJCI IndexedInternational Journal of Managing Information Technology (IJMIT) ** WJCI Indexed
International Journal of Managing Information Technology (IJMIT) ** WJCI Indexed
 
NOVEL R & D CAPABILITIES AS A RESPONSE TO ESG RISKS- LESSONS FROM AMAZON’S FU...
NOVEL R & D CAPABILITIES AS A RESPONSE TO ESG RISKS- LESSONS FROM AMAZON’S FU...NOVEL R & D CAPABILITIES AS A RESPONSE TO ESG RISKS- LESSONS FROM AMAZON’S FU...
NOVEL R & D CAPABILITIES AS A RESPONSE TO ESG RISKS- LESSONS FROM AMAZON’S FU...
 
A REVIEW OF STOCK TREND PREDICTION WITH COMBINATION OF EFFECTIVE MULTI TECHNI...
A REVIEW OF STOCK TREND PREDICTION WITH COMBINATION OF EFFECTIVE MULTI TECHNI...A REVIEW OF STOCK TREND PREDICTION WITH COMBINATION OF EFFECTIVE MULTI TECHNI...
A REVIEW OF STOCK TREND PREDICTION WITH COMBINATION OF EFFECTIVE MULTI TECHNI...
 
INTRUSION DETECTION SYSTEM USING CUSTOMIZED RULES FOR SNORT
INTRUSION DETECTION SYSTEM USING CUSTOMIZED RULES FOR SNORTINTRUSION DETECTION SYSTEM USING CUSTOMIZED RULES FOR SNORT
INTRUSION DETECTION SYSTEM USING CUSTOMIZED RULES FOR SNORT
 
15223ijmit02.pdf
15223ijmit02.pdf15223ijmit02.pdf
15223ijmit02.pdf
 
MEDIATING AND MODERATING FACTORS AFFECTING READINESS TO IOT APPLICATIONS: THE...
MEDIATING AND MODERATING FACTORS AFFECTING READINESS TO IOT APPLICATIONS: THE...MEDIATING AND MODERATING FACTORS AFFECTING READINESS TO IOT APPLICATIONS: THE...
MEDIATING AND MODERATING FACTORS AFFECTING READINESS TO IOT APPLICATIONS: THE...
 
EFFECTIVELY CONNECT ACQUIRED TECHNOLOGY TO INNOVATION OVER A LONG PERIOD
EFFECTIVELY CONNECT ACQUIRED TECHNOLOGY TO INNOVATION OVER A LONG PERIODEFFECTIVELY CONNECT ACQUIRED TECHNOLOGY TO INNOVATION OVER A LONG PERIOD
EFFECTIVELY CONNECT ACQUIRED TECHNOLOGY TO INNOVATION OVER A LONG PERIOD
 
International Journal of Managing Information Technology (IJMIT) ** WJCI Indexed
International Journal of Managing Information Technology (IJMIT) ** WJCI IndexedInternational Journal of Managing Information Technology (IJMIT) ** WJCI Indexed
International Journal of Managing Information Technology (IJMIT) ** WJCI Indexed
 
4th International Conference on Cloud, Big Data and IoT (CBIoT 2023)
4th International Conference on Cloud, Big Data and IoT (CBIoT 2023)4th International Conference on Cloud, Big Data and IoT (CBIoT 2023)
4th International Conference on Cloud, Big Data and IoT (CBIoT 2023)
 
TRANSFORMING SERVICE OPERATIONS WITH AI: A CASE FOR BUSINESS VALUE
TRANSFORMING SERVICE OPERATIONS WITH AI: A CASE FOR BUSINESS VALUETRANSFORMING SERVICE OPERATIONS WITH AI: A CASE FOR BUSINESS VALUE
TRANSFORMING SERVICE OPERATIONS WITH AI: A CASE FOR BUSINESS VALUE
 
DESIGNING A FRAMEWORK FOR ENHANCING THE ONLINE KNOWLEDGE-SHARING BEHAVIOR OF ...
DESIGNING A FRAMEWORK FOR ENHANCING THE ONLINE KNOWLEDGE-SHARING BEHAVIOR OF ...DESIGNING A FRAMEWORK FOR ENHANCING THE ONLINE KNOWLEDGE-SHARING BEHAVIOR OF ...
DESIGNING A FRAMEWORK FOR ENHANCING THE ONLINE KNOWLEDGE-SHARING BEHAVIOR OF ...
 
BUILDING RELIABLE CLOUD SYSTEMS THROUGH CHAOS ENGINEERING
BUILDING RELIABLE CLOUD SYSTEMS THROUGH CHAOS ENGINEERINGBUILDING RELIABLE CLOUD SYSTEMS THROUGH CHAOS ENGINEERING
BUILDING RELIABLE CLOUD SYSTEMS THROUGH CHAOS ENGINEERING
 
A REVIEW OF STOCK TREND PREDICTION WITH COMBINATION OF EFFECTIVE MULTI TECHNI...
A REVIEW OF STOCK TREND PREDICTION WITH COMBINATION OF EFFECTIVE MULTI TECHNI...A REVIEW OF STOCK TREND PREDICTION WITH COMBINATION OF EFFECTIVE MULTI TECHNI...
A REVIEW OF STOCK TREND PREDICTION WITH COMBINATION OF EFFECTIVE MULTI TECHNI...
 
NETWORK MEDIA ATTENTION AND GREEN TECHNOLOGY INNOVATION
NETWORK MEDIA ATTENTION AND GREEN TECHNOLOGY INNOVATIONNETWORK MEDIA ATTENTION AND GREEN TECHNOLOGY INNOVATION
NETWORK MEDIA ATTENTION AND GREEN TECHNOLOGY INNOVATION
 
INCLUSIVE ENTREPRENEURSHIP IN HANDLING COMPETING INSTITUTIONAL LOGICS FOR DHI...
INCLUSIVE ENTREPRENEURSHIP IN HANDLING COMPETING INSTITUTIONAL LOGICS FOR DHI...INCLUSIVE ENTREPRENEURSHIP IN HANDLING COMPETING INSTITUTIONAL LOGICS FOR DHI...
INCLUSIVE ENTREPRENEURSHIP IN HANDLING COMPETING INSTITUTIONAL LOGICS FOR DHI...
 
DEEP LEARNING APPROACH FOR EVENT MONITORING SYSTEM
DEEP LEARNING APPROACH FOR EVENT MONITORING SYSTEMDEEP LEARNING APPROACH FOR EVENT MONITORING SYSTEM
DEEP LEARNING APPROACH FOR EVENT MONITORING SYSTEM
 
MULTIMODAL COURSE DESIGN AND IMPLEMENTATION USING LEML AND LMS FOR INSTRUCTIO...
MULTIMODAL COURSE DESIGN AND IMPLEMENTATION USING LEML AND LMS FOR INSTRUCTIO...MULTIMODAL COURSE DESIGN AND IMPLEMENTATION USING LEML AND LMS FOR INSTRUCTIO...
MULTIMODAL COURSE DESIGN AND IMPLEMENTATION USING LEML AND LMS FOR INSTRUCTIO...
 

Recently uploaded

Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
Jisc
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
Pavel ( NSTU)
 
Chapter -12, Antibiotics (One Page Notes).pdf
Chapter -12, Antibiotics (One Page Notes).pdfChapter -12, Antibiotics (One Page Notes).pdf
Chapter -12, Antibiotics (One Page Notes).pdf
Kartik Tiwari
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Atul Kumar Singh
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
JosvitaDsouza2
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
SACHIN R KONDAGURI
 
Normal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of LabourNormal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of Labour
Wasim Ak
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
Vikramjit Singh
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
Scholarhat
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
Peter Windle
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
Celine George
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
Jisc
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
TechSoup
 
Group Presentation 2 Economics.Ariana Buscigliopptx
Group Presentation 2 Economics.Ariana BuscigliopptxGroup Presentation 2 Economics.Ariana Buscigliopptx
Group Presentation 2 Economics.Ariana Buscigliopptx
ArianaBusciglio
 
Digital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion DesignsDigital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion Designs
chanes7
 
Best Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDABest Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDA
deeptiverma2406
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
Peter Windle
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
camakaiclarkmusic
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
Tamralipta Mahavidyalaya
 

Recently uploaded (20)

Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 
Chapter -12, Antibiotics (One Page Notes).pdf
Chapter -12, Antibiotics (One Page Notes).pdfChapter -12, Antibiotics (One Page Notes).pdf
Chapter -12, Antibiotics (One Page Notes).pdf
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
 
Normal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of LabourNormal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of Labour
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
 
Group Presentation 2 Economics.Ariana Buscigliopptx
Group Presentation 2 Economics.Ariana BuscigliopptxGroup Presentation 2 Economics.Ariana Buscigliopptx
Group Presentation 2 Economics.Ariana Buscigliopptx
 
Digital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion DesignsDigital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion Designs
 
Best Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDABest Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDA
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
 

TOP CITED 2 ARTICLES IN 2017 - INTERNATIONAL JOURNAL OF MANAGING INFORMATION TECHNOLOGY (IJMIT)

  • 1. TOP CITED 2 ARTICLES IN 2017 INTERNATIONAL JOURNAL OF MANAGING INFORMATION TECHNOLOGY (IJMIT) ISSN: 0975-5586 (ONLINE); 0975-5926 (PRINT) http://airccse.org/journal/ijmit/ijmit.html
  • 2. AUTONOMIC FRAMEWORK FOR IT SECURITY GOVERNANCE Sitalakshmi Venkatraman School of Engineering, Construction and Design (IT), Melbourne Polytechnic, Australia ABSTRACT With the recent service enhancements over the Internet, organisations are confronted with a growing magnitude of security intrusions and attacks. Current intrusion detection strategies have not been effective in the long term, as new and obfuscated security attacks keep emerging evading the surveillance mechanisms. With information technology (IT) playing a pivotal role in today’s organizational operations and value creation, security regulatory bodies have identified this situation not solely as a technology issue, rather due to the weakness of an organisation's risk management practices and IT governance. Hence, recent attention has embarked on formulating proactive IT security governance for organisational sustenance. This paper proposes an autonomic framework for IT security governance that postulates a selflearning adaptive mechanism for an effective intrusion detection and risk management. Such a framework would facilitate autonomic ways of integrating existing context-dependent knowledge with new observed behaviour patterns gathered from network as well as host for detecting unknown security attacks effectively using mobile agents. In addition, this paper provides a roadmap for autonomic IT security governance by applying the proposed framework The roadmap employs a continuous improvement feedback loop. for achieving the targeted quality of service (QoS) in an organisation. KEYWORDS IT Security Governance, Intrusion Detection, Autonomic Framework, Self-learning & Mobile Agents FOR MORE DETAILS: http://aircconline.com/ijmit/V9N3/9317ijmit01.pdf VOLUME LINK: http://airccse.org/journal/ijmit/vol9.html
  • 3. REFERENCES [1] Lab K., (2015) “Kaspersky Security Bulletin,” Kaspersky Lab, Tech. Rep. [2] Symantec, (2016) “Internet Security Threat Report: Trends for 2016,” Symantec, Tech. Rep. vol. 21, p. 81. [3] McAfee Labs,“McAfee Labs Threats Report,” Intel Security, Tech. Rep., 03 2016. [4] Microsoft, “Microsoft Security Intelligence Report,” Microsoft, Tech. Rep., 12 2015. [5] HP Enterprise, “HPE Security Research Cyber Risk Report,” Hewlett Packard Enterprise, Tech. Rep., 2016. [6] IBM X-Force, (2015) “IBM X-Force Threat Intelligence Report 2016,” IBM, Tech. Rep., 2016. [7] Vasilomanolakis, E. Karuppayah, S. Mühlhäuser, M. and Fischer, M. “Taxonomy and Survey of Collaborative Intrusion Detection,” ACM Computing Surveys, vol. 47, no. 4, pp. 55:1–55:33. [8] Sommer R. and Paxson V., (2010) “Outside the Closed World: On Using Machine Learning for Network Intrusion Detection,” in Proceedings of the 2010 IEEE Symposium on Security and Privacy. IEEE Computer Society, pp. 305–316. [9] Jang, J.-w. Yun, J. Mohaisen, A. Woo, J. and. Kim, H. K (2016) “Detecting and Classifying Method Based on Similarity Matching of Android Malware Behavior with Profile,” SpringerPlus, vol. 5, no. 1, p. 1. [10] Nguyen, A. Yosinski, J. and Clune, J. (2015) “Deep Neural Networks Are Easily Fooled: High Confidence Predictions for Unrecognizable Images,” The IEEE Conference on Computer Vision and Pattern Recognition. [11] Schmugar, C. (2007) "The future of cybercrime", Sage: Security Vision From McAfee Avert Labs, 1(2), 1 5. [12] Faruki, P. Bhandari S., Laxmi, V. Gaur M., and Conti, M. (2016) “DroidAnalyst: Synergic App Framework for Static and Dynamic App Analysis,” in Recent Advances in Computational Intelligence in Defense and Security. Springer, pp. 519–552. [13] Li, W.-X. Wang, J.-B. Mu, D.-J. and Yuan, Y. (2011) “Survey on Android Rootkit,” Microprocessors, vol. 32. no.2, pp. 68-72. [14] Kim, S. Park, J. Lee K., You, I. and Yim K., (2012) “A Brief Survey on Rootkit Techniques in Malicious Codes,” Journal of Internet Services and Information Security, vol. 2, no. 3/4, pp. 134–147. [15] Lam, P. Wang L.-L., Ngan, H. Y. T. Yung, N. H. C. and Yeh, A. G.-O. (2015) “Outlier Detection In Large- Scale Traffic Data By Naïve Bayes Method and Gaussian Mixture Model Method,” arXiv. [16] Yang, J. Deng, T. and Sui, R. (2015) “An Adaptive Weighted One-Class SVM for Robust Outlier Detection,” in Proceedings of the 2015 Chinese Intelligent Systems Conference. Springer, pp. 475– 484.
  • 4. [17] Pereira, G.V. Luciano, E. M. Macadar, M. A. and Daniel, V.M. (2013) “Information technology governance practices adoption through an institutional perspective: The perception of brazilian and american CIOs,” 46th Hawaii International Conference on System Sciences, pp. 4446–4455. [18] Turel O. and Bart, C. (2014) “Board-level IT governance and organizational performance,” Eur. J. Inf. Syst., vol. 23, no. 2, pp. 223–239. [19] Borth, M. A., and Bradley, R. V. (2009). "Unexplored Linkages between Corporate Governance and IT Governance: An Evaluation and Call to Research Information Technology Governance and Service Management: Frameworks and Adaptations" IGI Global. pp. 202-220. [20] Buchwald, A. Urbach, N. and Ahlemann, F. (2014) “Business value through controlled IT: Toward an integrated model of IT governance success and its impact,” J. Inf. Technol., vol. 29, no. 2, pp. 128– 147. [21] Yu, S. Wang, G. and Zhou, W. (2015) “Modeling Malicious Activities in Cyber Space,” IEEE Network, vol. 29, no. 6, pp. 83–87. [22] IFAC (2004), "Enterprise Governance-Getting the Balance Right", PAIB Report to IFAC. [23] Cumps, B., Viaene, S., & Dedene, G. (2012). "Linking the Strategic Importance of ICT with Investment in Business-ICT Alignment: An Explorative Framework". In W. Van Grembergen & S. De Haes (Eds.), Business Strategy and Applications in Enterprise IT Governance (pp. 37-55). Hershey, Pennsylvania, USA: IGI Global. [24] De Haes S. and Van Grembergen, W. (2015) "Enterprise Governance of Information Technology", Cham: Springer International Publishing. [25] ITGI (2003), "Board briefing on IT governance", 2nd Edition, Information Systems Audit and Control Foundation, 2003. [26] Bartens, Y ., Schulte, F., & Vos, S. (2014). "E-Business IT Governance Revisited: An Attempt towards Outlining a Novel Bi-directional Business/IT Alignment in COBIT5", Paper presented at the 47th Hawaii International Conference on System Sciences (HICSS), 2014. [27] Chou, Y.-C., Chuang, H. H.-C., & Shao, B. B. M. (2014). "The impacts of information technology on total factor productivity: A look at externalities and innovations". International Journal of Production Economics, 158, 290-299. [28] ISO/IEC 38500, (2015) "Information Technology - Governance of IT for the organization" ISO/IEC 38500:2015, 2nd Edition, ISO:Switzerland. [29] OECD (2005) Corporate Governance. OECD glossary of statistical terms, Organisation for Economic Co operation and Development (OECD),
  • 5. [30] Stroud, R.E. (2012). "Introduction to COBIT 5" . ISACA. [31] Kephart, J. and Chess, D. M. (2003) "The vision of autonomic computing", IEEE Computer, vol. 36, no. 1, pp. 41-50. [32] Ganek, A. G. and Corbi, T. A. (2003) "The Dawning of the Autonomic Computing Era". IBM Systems Journal. vol. 42, no. 1, pp. 5-18. [33] Dudley, G., Joshi, N., Ogle, D.M., Subramanian, B. and Topol, B.B. (2004) "Autonomic self-healing systems in a cross-product IT environment", Proceedings of the International Conference on Autonomic Computing), 312-313. [34] Dobson, S. Sterritt, R. Nixon, P. and Hinchey. M. (2010) "Fulfilling the vision of autonomic computing". Computer, vol. 43, pp. 35-41. [35] Vidales, P., Baliosian, J., Serrat, J., Mapp,G., Stajano, F. and Hopper, A. (2005) "Autonomic System for Mobility Support in 4G Networks". IEEE Journal on Selected Areas in Communications. vol. 23, no. 12, pp. 2288-2304. [36] Sancho G., Villemur T. and Tazi S., (2010) “An Ontology-driven Approach for Collaborative Ubiquitous Systems”, International Journal of Autonomic Computing (IJAC) InderScience Publishers Mai pp 263 – 279 . [37] Cabri, G., Leonardi, L. and Zambonelli, F. (2002) "Engineering Mobile Agent Applications Via Context- Dependent Coordination". IEEE Transactions on Software Engineering. vol. 28, no. 11, pp. 1040-1058. [38] Russell, S.J.; Norvig, P. (2010). “Artificial intelligence: A modern approach” (3rd ed. ed.). Upper Saddle River: Prentice Hall. [39] Alizadeh, H. Khoshrou A., and Zúquete, A. (2015) “Traffic Classification and Verification using Unsupervised Learning of Gaussian Mixture Models,” in International Workshop on Measurements & Networking. IEEE. [40] Venkatraman, S. (2010) "Self-Learning Framework for Intrusion Detection", Proceedings of The 2010 International Congress on Computer Applications and Computational Science (CACS 2010), 4- 6 December, Singapore, pp. 517-520 [41] Cui, T., Ye, H., Teo, H. H., & Li, J. (2015) "Information technology and open innovation: A strategic alignment perspective". Information & Management, vol. 52, pp. 348-358. [42] Yu, S. Guo, S. andStojmenovic, I. (2015) “Fool Me if You Can: Mimicking Attacks and Anti-Attacks in Cyberspace,” IEEE Transactions on Computers, vol. 64, no. 1, pp. 139–151.
  • 6. CLASSIFICATION OF QUESTIONS AND LEARNING OUTCOME STATEMENTS (LOS) INTO BLOOM’S TAXONOMY (BT) BY SIMILARITY MEASUREMENTS TOWARDS EXTRACTING OF LEARNING OUTCOME FROM LEARNING MATERIAL Shadi Diab1 and Badie Sartawi2 1 Information and Communication Technology Center, Al-Quds Open University, Ramallah – Palestine 2 Associate Professor of Computer Science, Al-Quds University, Jerusalem - Palestine ABSTRACT Bloom’s Taxonomy (BT) have been used to classify the objectives of learning outcome by dividing the learning into three different domains; the cognitive domain, the effective domain and the psychomotor domain. In this paper, we are introducing a new approach to classify the questions and learning outcome statements (LOS) into Blooms taxonomy (BT) and to verify BT verb lists, which are being cited and used by academicians to write questions and (LOS). An experiment was designed to investigate the semantic relationship between the action verbs used in both questions and LOS to obtain more accurate classification of the levels of BT. A sample of 775 different action verbs collected from different universities allows us to measure an accurate and clear-cut cognitive level for the action verb. It is worth mentioning that natural language processing techniques were used to develop our rules as to induce the questions into chunks in order to extract the action verbs. Our proposed solution was able to classify the action verb into a precise level of the cognitive domain. We, on our side, have tested and evaluated our proposed solution using confusion matrix. The results of evaluation tests yielded 97% for the macro average of precision and 90% for F1. Thus, the outcome of the research suggests that it is crucial to analyse and verify the action verbs cited and used by academicians to write LOS and classify their questions based on blooms taxonomy in order to obtain a definite and more accurate classification.. KEYWORDS Learning outcome; Natural Language Processing, Similarity Measurement; Questions Classification FOR MORE DETAILS: http://aircconline.com/ijmit/V9N2/9317ijmit01.pdf VOLUME LINK: http://airccse.org/journal/ijmit/vol9.html
  • 7. REFERENCES [1] Declan Kennedy, Writing and using learning outcomes: a practical guide, Page 18, Cork: University College Cork, 2006. [2] EU, Publications Office, Using learning outcome, European Qualifications Framework Series: Note 4, Luxembourg: ISBN 978-92-79-21085-3, 2011 Page, 2010. [3] Totschnig, Michael, et al., "Repository services for outcome-based learning" 2010. [4] Office Of Institutional Effectiveness, Assessment Workbook For Academic Programs, Richmond: University Of Richmond, 2008. [5] Advancing Academic Quality in Business Education Worldwide, Bloom’s Taxonomy of Educational Objectives and Writing Intended Learning Outcomes Statements, Kansas: International Assembly for Collegiate Business Education, 2016. [6] M. D. Gall, "The Use of Questions in Teaching," American Educational Research Association, vol. 40, no. 5, pp. 707-721, 1970. [7] D. R. Krathwohl, A Revision of Bloom's Taxonomy:, College of Education, The Ohio State University. [8] Li and Roth, Learning Question Classifiers, Illinois USA: 19th International Conference on Compuatational Linguistics (COLING) 2002. [9] Wen-Chih Chang and Ming-Shun Chung, Automatic Applying Bloom's Taxonomy to Classify and Analysis the cognition level of english questions items, Taiwan: IEEE, 2009. [10] Sonal Jain and Jyoti Pareek, Automatic extraction of prerequisites and learning outcome from learning material, India: Inderscience Enterprises Ltd., 2013. [11] Syahidah Haris and Nazila Omar, A Rule-based Approach in Bloom’s Taxonomy Question Classification through Natural Language, Malaysia, 2013. [12] Syahidah sufi haris and nazlia omar, Bloom's Taxonomy Question Categorization Using Rules And N-Gram Approach, Malaysia: Journal of Theoretical and Applied Information Technology, 2015. [13] Payal Biswas et al, Question Classification Using Syntactic And Rule Based Approach, New Delhi: International Conference on Advances in Computing, Communications and Informatics (ICACCI), 2014. [14] Dell Zhang et al, Question Classification using Support Vector Machines, Singapore: ACM 1- 58113- 646-3/03/0007, 2003. [15] Jibin Fu, Two Level Question Classification Based on SVM and Question Semantic Similarity, Beijing, China: International Conference on Electronic Computer Technology, 2009.
  • 8. [16] Anwar Ali Yahya and Addin Osman, Automatic Classification Of Questions Into Bloom's Cognitive Levels Using Support Vector Machines, Najran: Researchgate, 2011. [17] K. J. et al, An automatic classifer for exam questions with wordnet and cosine, International Journal of Emerging Technologies in Learning (iJET) 11(04):142 • April 2016. [18] Lingling Meng et al, "A Review of Semantic Similarity Measures in WordNet," International Journal of Hybrid Information Technology, vol. 6, no. 1, p. 1, 2013. [19] Siddharth Patwardhan et al, "Using Measures of Semantic Relatedness for Word Sense Disambiguation," Springer, p. 241–257, 2003. [20] G. V. e. al, "Semantic Similarity Methods in WordNet and Their Application to Information Retrieval on the Web," ACM New York, NY, USA ©2005, pp. 10-16, 2005. [21] G. A. Miller, "WordNet - A Lexical Database for English," Communications of the ACM, vol. 38, no. 11, pp. 39-41, 2005. International Journal of Managing Information Technology (IJMIT) Vol.9, No.2, May 2017 12 [22] C. C. a. R. Mihalcea, Measuring the Semantic Similarity of Texts, University of North Texas: University of North Texas, 2005. [23] Z. W. a. M. Palmer, "VERB SEMANTICS AND LEXICAL SELECTION," in In Proceedings of the 32nd Annual Meeting of the Associations for Computational Linguistics, Las Cruces, New Mexico,,1994. [24] Virginia.ED, "Bloom's Taxonomy of Cognitive Skills with Action Verb List Source," University of Verginia, 20 2 2017. [Online]. Available: http://avillage.web.virginia.edu/iaas/assess/resources/verblist.pdf. [Accessed 20 2 2017]. [25] U. O. C. Florida, "Bloom's Taxonomy," University of Central Florida, 20 2 2017. [Online]. Available: http://www.fctl.ucf.edu/teachingandlearningresources/coursedesign/bloomstaxonomy/. [Accessed 20 2 2017]. [26] M. S. University, "Bloom’s Taxonomy Action Verbs," Missouri State University, 20 2 2017. [Online]. Available: https://www.missouristate.edu/assets/fctl/Blooms_Taxonomy_Action_Verbs.pdf. [Accessed 20 2 2017]. [27] C. A. College, "Bloom's Taxonomy Verbs," Central Arizona College, 20 2 2017. [Online]. Available: http://www.centralaz.edu/Documents/class/Bloom's%20Taxonomy%20Verbs%20Web.pdf. [Accessed 20 2 2017]. [28] F. Kugelman, "http://www.bloomstaxonomy.org/," 6 2 2017. [Online]. Available: http://www.bloomstaxonomy.org/BloomsTaxonomyquestions.pdf. [Accessed 06 02 2017]. [29] Zaanen et al, "Question classification by structure induction," in IJCAI'05 Proceedings of the 19th international joint conference on Artificial intelligence, Edinburgh, Scotland , 2005.
  • 9. [30] C. Adelman, The Language and Syntax of Learning Outcomes Statements, National Institute for Learning Outcomes Assessment, 2015. [31] The Center For Learning, Muskie Institute Center for Learning, University of Southern Maine [Online]. Available: http://php.ipsiconnect.org/doc/VerbList.htm. [Accessed 27 2 2017]. [32] Fresnostate university, "Bloom’s Taxonomy Action Verbs," [Online]. Available: http://www.fresnostate.edu/academics/oie/documents/assesments/Blooms%20Level.pdf. [Accessed 4 3 2017]. [33] K. Markham, "Simple guide to confusion matrix terminology," dataschool, [Online]. Available: http://www.dataschool.io/simple-guide-to-confusion-matrix-terminology/. [Accessed 07 03 2017]. [34] E. K. A. E. L. Steven Bird, Natural Language Processing with Python, 2009: O’Reilly Media, Inc., O’Reilly Media, Inc. [35] R. Joshi, "How to evaluate the performance of a model in Azure ML and understanding “Confusion Metrics”," exsilio.com, 9 Septemper 2016. [Online]. Available: http://blog.exsilio.com/all/accuracyprecision-recall-f1-score-interpretation-of-performance-measures/. [Accessed 2017 3 7].