Browsing by Author "Aborujilah, Abdulaziz"
Now showing 1 - 5 of 5
Results Per Page
Sort Options
Item Open Access Blockchain-based adoption framework for authentic land registry system in Malaysia(Universitas Ahmad Dahlan, 2021-12-01) Aborujilah, Abdulaziz; Mohd Yatim, Muhammad Naqib bin; Al-Othmani, AbdulaleemLand registration systems are very essential for property ownership management. The exited land registry systems are less efficient and time-consuming and expose to human errors. By using blockchain technology, most of the principles of good governance in land administration such as transparency and efficiency can be fulfilled. However, there is a lack of experience in developing blockchain-based land registry systems. This paper proposes a blockchain-based adoption framework for land registry management in Malaysia. It elaborates more on developing a prototype that fulfills the main functions of current land registration by using smart contract functionalities. Also, this paper illustrates the main challenges of adopting this technology such as expertise shortage of software developers, implementation difficulties due to scalability of the land transactions, data sharing with different types of blockchain and lack of security attacks resistance. Therefore, there is a need to form an agreed-upon blockchain development platform that meet such constraints.Item Embargo CIA-based Analysis for E-Learning Systems Threats and Countermeasures in Malaysian Higher Education: Review Paper(IEEE, 2023-02-08) Aborujilah, Abdulaziz; Adamu, Jibril; Mokhtar, Shamsul Anuar; Al-Othmani, Abdulaleem; Al-alwi, Elham Yahya; Al-Hidabi, Dawood Abdulmalek YahyaIn Malaysia, the early days of e-learning implementations can be traced back to the late 1990s. However, the development and use of such systems are fraught with security issues, concerns about the security of personal data, and content-related security flaws, confidentiality, integrity, availability, authentication, and deliberate attacks are the list of security issues that are identified in the e-learning systems. More attention has been given to course creation and delivery and technology adoption. However, user privacy and security in the context of e-learning security have not been studied well. In this paper, an in-depth review has been conducted regarding security threats and their remedies to the e-learning systems, which consequently lead Malaysia's higher education to take precautionary measures to facilitate learners with a secure learning environment.Item Embargo Comparative Study of SMOTE and Bootstrapping Performance Based on Predication Methods(Springer, 2021-05-06) Aborujilah, Abdulaziz; Nassr, Rasheed Mohammad; Al-Hadhrami, Tawfik; Husen, Mohd Nizam; Ali, Nor Azlina; Al-Othmani, Abdulaleem; Hamdi, MustaphaRecently, there has been a renewed interest in smart health systems that aim to deliver high quality healthcare services. Prediction methods are very essential to support these systems. They mainly rely on datasets with assumptions that match the reality. However, one of the greatest challenges to prediction methods is to have datasets which are normally distributed. This paper presents an experimental work to implement SMOTE (Synthetic Minority Oversampling Technique) and bootstrapping methods to normalize datasets. It also measured the impact of both methods in the performance of different prediction methods such as Support vector machine (SVM), Naive Bayes, and neural network(NN) The results showed that bootstrapping with native bays yielded better prediction performance as compared to other prediction methods with SMOTE.Item Embargo Conceptual Model for Automating GDPR Compliance Verification Using Natural Language Approach(IEEE, 2022-12-28) Aborujilah, Abdulaziz; Al-Othmani, Abdulaleem; Awang Long, Zalizah; Hussien, Nur Syahela; Abdul Ghani, DahlanMost mobile apps require regular access to sensitive personal information. Regulators are increasingly demanding mobile app makers disclose privacy policies that detail what users’ data is gathered and used. Compliance with data privacy and protection regulations must be monitored to reduce legal penalties that may come from unexpected data breaches. Checking and verifying The General Data Protection Regulation (GDPR) Compliance is quite a challenging issue. In this paper, we propose, an extension to be added to the automated GDPR compliance verification tool. This extension shows how the questions about the compliance of mobile applications might be answered based on GDPR standards. The implementation phases of the extension are explained. It includes query processing, document retrieval, passage retrieval, and answer extraction. This paper provides mobile application developers with a better technique of how to monitor users' compliance with mobile application privacy policies.Item Embargo Exploring Critical Challenges and Factors Influencing E-Learning Systems Security During COVID-19 Pandemic(IEEE, 2022-12-28) Aborujilah, Abdulaziz; Al-Alawi, Elham Yahya; Al-Hidabi, Dawood Abdulmalek; Al-Othmani, AbdulaleemThe COVID-19 pandemic swiftly forced the closure of higher education institutions across the world. As a result, all educational institutions have made a considerable move toward e-learning. E-learning systems suffer from confidentiality, integrity, and availability-related security threats. Hence, understanding this problem from various perspectives that include technology, human behavior, management, and policies, as well as implementing policies and standards will assist in finding the most influencing factors that can help in protecting e-learning information systems from potential security threats. In this research, a review has been conducted to analyze and assess 55 states of the art articles on e-learning security and to identify countermeasures to strengthen e-learning information systems. The study contributes to our understanding of how to strengthen the e-learning information systems security by answering the following questions: What are the factors that have an impact on the e-learning systems vulnerability during the COVID-19 pandemic? What are the most important technology, management, and environment-based factors that need to be considered for protecting e-learning systems from potential security attacks?. The results of this study will enable decision and policymakers at higher education institutions to better understand the essential elements of adopting an e-learning system. Knowing these factors will help the designers and developers of e-learning systems adopt secure software design and development methodologies to reduce the likelihood that such vulnerabilities and it contributes to enhancing the system's security resilience against potential attacks. In addition, university management will be more knowledgeable about how to instruct their staff and students on best practices for using e-learning web applications.