International Journal on Advanced Science, Engineering and Information Technology
Buyers and sellers in e-commerce market such as e-auction form a virtual community. They use the ... more Buyers and sellers in e-commerce market such as e-auction form a virtual community. They use the feedback system to rate each other following a completed transaction and these ratings are used to build their reputation in the virtual community. Existing reputation systems can often be easily manipulated by forming cohesive group in giving fake user feedbacks to increase their respective reputation. This practice is a clear violation of Islamic business ethics. In addition, there is currently no realtime support for reputation system and this causes users to be misinformed on the reputation of a seller. To improve the reputation system this study developed a trust framework based on business Islamic ethics. In this paper, a trust model which evaluates conformance to nine Islamic business ethical codes is proposed to calculate users' initial trust value based on their ethical behavior. The trust model proposed the Islamic business ethics algorithm which calculates the user compliance to Islamic business ethics (IBE) score based on trading partner's feedbacks. Because of feedback frauds can still occur, this study introduces a cohesive group algorithm to track users who collaborate to give false feedbacks. The cohesive group algorithm applied k-core algorithms which is capable of determining the strength of the relationship of every user in the cohesive group. The cohesive group algorithm also proposed a cohesive score to determine the feedback reliability of every user's transaction based on the user's k-core and the highest k-core. In the group user reputation (trust score) is measured by considering the feedback reliability status for all transactions. A reputation prototype system for e-auction was developed as the test bed to validate the trust model through simulation of the set of initial experiments, showing the feasibility and benefit of the model.
International Journal on Advanced Science, Engineering and Information Technology
The term "block" in Block-Based Software Development (BBSD) refers to a software component that h... more The term "block" in Block-Based Software Development (BBSD) refers to a software component that has the characteristics of reusable, composition, customizable and configurable. Based on the principles of component-based software development and end-user development, the objective of BBSD is to allow non-programmer known as end-user to build a new application by using a set of blocks by creating composite blocks, configuring and customizing for a specific application domain. In the current implementation, a Domain Initiator is responsible for identifying blocks' specifications, which will be uploaded to the block store repository. Block developers can contribute to developing blocks using the Java programming language. Blocks for a specific domain are bundled as a JAR file. These blocks will be stored in a block store. The block store is a software repository that provides a sharing mechanism for domain driven blocks specification, cataloging, archiving, and distribution. Before the blocks submitted to the block store can be distributed to end-users, they are required to undergo the process of block verification and evaluation to ensure that they conform to the requirement specification. The submitted blocks will also need to be approved by the domain initiator before they are made available to the end users. This paper proposes the block-based evaluation methodology as well as the software tool which helps domain initiator in the process of blocks verification and evaluation. The proposed methodology consists of three types of validation namely Automatic Validation Approach, JSR-303 or JSR-349 standard bean Validation Specification, and the manual testing. The proposed methodology itself was verified through a case study using a list of blocks submitted to the block store repository.
International Journal on Advanced Science, Engineering and Information Technology
Computer Science students are expected to acquire good programming skills. Both students and inst... more Computer Science students are expected to acquire good programming skills. Both students and instructors accept that learning programming for first-year college students is fairly difficult. To assist students to achieve this goal, instructors will have to adopt a suitable design for programming courses. This paper reports on the design of a Computer Programming course based on the integrated course design approach, which was conducted by a research group at Universiti Kebangsaan Malaysia from the Faculty of Information Science and Technology. The course is designed to provide relevant teaching and learning activities, feedback, and assessment that will ultimately support the learning goals of students. The design will provide opportunities for preparation time, meaningful feedback, and a competitive feel to the course. The effectiveness of this approach is then evaluated via an online survey that was administered to first-year undergraduate students. The results obtained from 162 first-year students showed that the students were able to improve the results of their the first-year program with the utilization of PC 2 , as it allowed them to obtain prompt feedback. The use of PC 2 also gives them a competitive atmosphere, which motivates them to perform better. The survey results also indicate that the students used their time to prepare for lab sessions via tutorials and self-learning.
As mobile users face difficulties in completing some tasks due to the limitation of their mobile ... more As mobile users face difficulties in completing some tasks due to the limitation of their mobile devices, they need to offload the tasks to the fixed networks. On the other hand, the current computing environment consisting of interconnecte d heterogeneous computers, provides the required supply of computing and communication resources and services. Thereby creating an opportunity for trades to take
Problem statement: Despite various initiatives and programmes by the government to incorporate IC... more Problem statement: Despite various initiatives and programmes by the government to incorporate ICT in education, not much research has been done to evaluate the achievement of these initiatives and programmes, including ICT proficiency among students. This study fills in the gap of lack of current information pertaining to the Malaysian secondary school students' ICT competencies, knowledge on internet and attitudes toward computer technology. Approach: Data for this study has been gathered from a survey on 585 students in Sekolah Menengah Kebangsaan Tengku Temenggung Ahmad (SMKTTA) in the rural district of Kundang Ulu, Johore. The specific area has been selected by Universiti Kebangsaan Malaysia under one of its community service projects.The instrument used was a questionnaire comprised of demographic variables and three other sub-scales. The sub-scales are software and hardware usage; motivation for self study and ICT usage competency and Internet usage and safety awareness. Results: Results show that generally, students have moderately positive attitudes toward ICT, have low to moderate level of ICT competencies and have limited knowledge on internet. Conclusion: Findings from this study have implications to the approach of teaching and learning of ICT subjects, their evaluation and assessment and future initiative related to ICT education and infrastructure development towards creating a well-connected society. It is recommended that schools provide enough facilities for students' hands-on experiences. Teachers should incorporate productive computing activities in their teaching such as using spreadsheet, database and programming, besides purposive web searching. Rural internet centres should also be established. Evaluation, monitoring and maintainance of ICT programs is a must to ensure their effectiveness and efficiency. The utmost end result would be the emergence of more ICT proficient personnel who will contribute to the development of the country.
Proceedings of the 2011 International Conference on Electrical Engineering and Informatics, 2011
Abstract Block-based programming approach is a combination of component-based programming approac... more Abstract Block-based programming approach is a combination of component-based programming approach with end-user programming paradigm that considered being more advanced and easier to use in practice. The aim of this paper is to discuss the benefits that ...
2011 IEEE Symposium on Computers & Informatics, 2011
Abstract-Block-based programming approach is based on the principles and dynamics of combining co... more Abstract-Block-based programming approach is based on the principles and dynamics of combining component-based programming approach with end-user programming paradigm which is purported to be more advanced and easier to use in practice. We perform a state ...
Proceedings of the 2011 International Conference on Electrical Engineering and Informatics, 2011
... Rodziah Latih1, Ahmed Moosajee Patel2, Abdullah Mohd. Zin3, Tew Yiqi4, Siti Hafizah Muhammad5... more ... Rodziah Latih1, Ahmed Moosajee Patel2, Abdullah Mohd. Zin3, Tew Yiqi4, Siti Hafizah Muhammad5 ... One of EUP paradigms used in mashup tool to develop mashup is wiring paradigm where users wire together the selected modules or widgets that provided by the tool. ...
The purpose of this study is to present, introduce and explain the principles, concepts and techn... more The purpose of this study is to present, introduce and explain the principles, concepts and techniques of mashups through an analysis of mashup tools from End-user Development (EuD) software engineering perspectives, since it is a new programming paradigm. Problem statement: Although mashup tools supporting the creation of mashups rely heavily on data integration, they still require users to have reasonable programming skills, rather than simply enabling the integration of content in a template approach. Mashup tools also have their lifespan in a fast moving technology-driven world which requires meta-application handling. Some developers have discontinued their mashup tools but others are still available in the mashup space. It has been noted that there is a steady increase of new mashups on a daily basis with a concomitant increase of new Application Programming Interface (APIs) to support meta-mashup application EuD. Approach: Both qualitative and quantitative research methods have been utilized. After introducing the basic principles, concepts and techniques of mashups, we develop and present a categorization of mashups and mashup tools and summarize the ten most popular currently used mashup tools against seven indictors from end-user software engineering perspectives ranging from programming skill requirement, prompt suggestion of features use, operability, 'share-ability' and reuse, service, type and target user, in order to evaluate how these mashup tools support end-user development. To perform the evaluation and produce the final results, the selected indicators' features have been horizontally compared and comprehensively analyzed. Results: The philosophy of mashup is aimed at providing simple rapid program development by endusers with minimum programming skills. However, we observe that mashup tools typically follow four data processing styles: Webpage customization, wire paradigm, spreadsheet and programming by demonstration. These mashup tools are supposed to seamlessly and effortlessly assist end-users programming but this is not the case. Conclusion: From our research we concluded that some mashup tools are not really simple enough to handle and still require end-users to have a computer programming background to learn and understand its platform infrastructures and mechanisms. These might all change in the near future. There are some companies that are now involved with mashup development which provide huge opportunities to both individual and organizational customers. Mashup have now become a commercial opportunity rather than a simple way of integrating data from Web 2.0 platforms.
International Journal of Information Security and Privacy, 2000
Wiki is a social networking system that allows users to freely intermingle at different levels of... more Wiki is a social networking system that allows users to freely intermingle at different levels of communication such as collaborative learning, chatting and group communications. This is conceived to be the merriest goal. It is particularly vulnerable due to its features of open medium and lack of clear plan of defense. Social networking systems today are far more prone to abuse than before. For instance, personal data can be misused for virtual insulting, resulting in misuse of personal information for financial games or creating missive. Wiki is an example of social computing of collaborative learning, joint editing, brain storming and virtual socializing. All of these create a ripe environment for hacking, deception, abuse and misuse. Thus, wiki needs comprehensive security measures which include privacy, trust, security, audit and digital forensics to protect users and system resources. This paper focuses in identifying and exploring the needs of secure social computing and supporting information systems as places for interaction, data collection and manipulation for wikis. It does this by reviewing the literature and related works in proposing a safety measure framework for a secure and trustworthy medium together with privacy, audit and digital forensic investigative functions in wiki environments. These then can aid design and usage in social computing environments with the proviso to give comfort and confidence to users without worrying about abuse and cybercrime perpetrated activities.
End-user Programming for the web is currently of interest because Web 2.0 technologies have resul... more End-user Programming for the web is currently of interest because Web 2.0 technologies have resulted in a vast array of tools available for mashup making. This paper presents a Systematic Literature Review of EUP for web mashups. Its objective is to outline a comprehensive review and synthesis of the literature related to EUP for web mashups. A Systematic Literature Review was performed of peer reviewed published studies that focused on research in EUP for Web mashups. A review was conducted on 21 relevant articles, mostly recent (published between January 1 st 2000 and December 31 st 2012) and published in English. Five EUP approaches for web mashups were identified from the studies; browsing, programming by demonstration or example, spreadsheet, widget, data-flow and block-based approach. Other researches regarding EUP for web mashups were also identified, such as ubiquitous platform mashups, users' support functions, data extraction techniques, and process-oriented mashups.
International Journal on Advanced Science, Engineering and Information Technology
Buyers and sellers in e-commerce market such as e-auction form a virtual community. They use the ... more Buyers and sellers in e-commerce market such as e-auction form a virtual community. They use the feedback system to rate each other following a completed transaction and these ratings are used to build their reputation in the virtual community. Existing reputation systems can often be easily manipulated by forming cohesive group in giving fake user feedbacks to increase their respective reputation. This practice is a clear violation of Islamic business ethics. In addition, there is currently no realtime support for reputation system and this causes users to be misinformed on the reputation of a seller. To improve the reputation system this study developed a trust framework based on business Islamic ethics. In this paper, a trust model which evaluates conformance to nine Islamic business ethical codes is proposed to calculate users' initial trust value based on their ethical behavior. The trust model proposed the Islamic business ethics algorithm which calculates the user compliance to Islamic business ethics (IBE) score based on trading partner's feedbacks. Because of feedback frauds can still occur, this study introduces a cohesive group algorithm to track users who collaborate to give false feedbacks. The cohesive group algorithm applied k-core algorithms which is capable of determining the strength of the relationship of every user in the cohesive group. The cohesive group algorithm also proposed a cohesive score to determine the feedback reliability of every user's transaction based on the user's k-core and the highest k-core. In the group user reputation (trust score) is measured by considering the feedback reliability status for all transactions. A reputation prototype system for e-auction was developed as the test bed to validate the trust model through simulation of the set of initial experiments, showing the feasibility and benefit of the model.
International Journal on Advanced Science, Engineering and Information Technology
The term "block" in Block-Based Software Development (BBSD) refers to a software component that h... more The term "block" in Block-Based Software Development (BBSD) refers to a software component that has the characteristics of reusable, composition, customizable and configurable. Based on the principles of component-based software development and end-user development, the objective of BBSD is to allow non-programmer known as end-user to build a new application by using a set of blocks by creating composite blocks, configuring and customizing for a specific application domain. In the current implementation, a Domain Initiator is responsible for identifying blocks' specifications, which will be uploaded to the block store repository. Block developers can contribute to developing blocks using the Java programming language. Blocks for a specific domain are bundled as a JAR file. These blocks will be stored in a block store. The block store is a software repository that provides a sharing mechanism for domain driven blocks specification, cataloging, archiving, and distribution. Before the blocks submitted to the block store can be distributed to end-users, they are required to undergo the process of block verification and evaluation to ensure that they conform to the requirement specification. The submitted blocks will also need to be approved by the domain initiator before they are made available to the end users. This paper proposes the block-based evaluation methodology as well as the software tool which helps domain initiator in the process of blocks verification and evaluation. The proposed methodology consists of three types of validation namely Automatic Validation Approach, JSR-303 or JSR-349 standard bean Validation Specification, and the manual testing. The proposed methodology itself was verified through a case study using a list of blocks submitted to the block store repository.
International Journal on Advanced Science, Engineering and Information Technology
Computer Science students are expected to acquire good programming skills. Both students and inst... more Computer Science students are expected to acquire good programming skills. Both students and instructors accept that learning programming for first-year college students is fairly difficult. To assist students to achieve this goal, instructors will have to adopt a suitable design for programming courses. This paper reports on the design of a Computer Programming course based on the integrated course design approach, which was conducted by a research group at Universiti Kebangsaan Malaysia from the Faculty of Information Science and Technology. The course is designed to provide relevant teaching and learning activities, feedback, and assessment that will ultimately support the learning goals of students. The design will provide opportunities for preparation time, meaningful feedback, and a competitive feel to the course. The effectiveness of this approach is then evaluated via an online survey that was administered to first-year undergraduate students. The results obtained from 162 first-year students showed that the students were able to improve the results of their the first-year program with the utilization of PC 2 , as it allowed them to obtain prompt feedback. The use of PC 2 also gives them a competitive atmosphere, which motivates them to perform better. The survey results also indicate that the students used their time to prepare for lab sessions via tutorials and self-learning.
As mobile users face difficulties in completing some tasks due to the limitation of their mobile ... more As mobile users face difficulties in completing some tasks due to the limitation of their mobile devices, they need to offload the tasks to the fixed networks. On the other hand, the current computing environment consisting of interconnecte d heterogeneous computers, provides the required supply of computing and communication resources and services. Thereby creating an opportunity for trades to take
Problem statement: Despite various initiatives and programmes by the government to incorporate IC... more Problem statement: Despite various initiatives and programmes by the government to incorporate ICT in education, not much research has been done to evaluate the achievement of these initiatives and programmes, including ICT proficiency among students. This study fills in the gap of lack of current information pertaining to the Malaysian secondary school students' ICT competencies, knowledge on internet and attitudes toward computer technology. Approach: Data for this study has been gathered from a survey on 585 students in Sekolah Menengah Kebangsaan Tengku Temenggung Ahmad (SMKTTA) in the rural district of Kundang Ulu, Johore. The specific area has been selected by Universiti Kebangsaan Malaysia under one of its community service projects.The instrument used was a questionnaire comprised of demographic variables and three other sub-scales. The sub-scales are software and hardware usage; motivation for self study and ICT usage competency and Internet usage and safety awareness. Results: Results show that generally, students have moderately positive attitudes toward ICT, have low to moderate level of ICT competencies and have limited knowledge on internet. Conclusion: Findings from this study have implications to the approach of teaching and learning of ICT subjects, their evaluation and assessment and future initiative related to ICT education and infrastructure development towards creating a well-connected society. It is recommended that schools provide enough facilities for students' hands-on experiences. Teachers should incorporate productive computing activities in their teaching such as using spreadsheet, database and programming, besides purposive web searching. Rural internet centres should also be established. Evaluation, monitoring and maintainance of ICT programs is a must to ensure their effectiveness and efficiency. The utmost end result would be the emergence of more ICT proficient personnel who will contribute to the development of the country.
Proceedings of the 2011 International Conference on Electrical Engineering and Informatics, 2011
Abstract Block-based programming approach is a combination of component-based programming approac... more Abstract Block-based programming approach is a combination of component-based programming approach with end-user programming paradigm that considered being more advanced and easier to use in practice. The aim of this paper is to discuss the benefits that ...
2011 IEEE Symposium on Computers & Informatics, 2011
Abstract-Block-based programming approach is based on the principles and dynamics of combining co... more Abstract-Block-based programming approach is based on the principles and dynamics of combining component-based programming approach with end-user programming paradigm which is purported to be more advanced and easier to use in practice. We perform a state ...
Proceedings of the 2011 International Conference on Electrical Engineering and Informatics, 2011
... Rodziah Latih1, Ahmed Moosajee Patel2, Abdullah Mohd. Zin3, Tew Yiqi4, Siti Hafizah Muhammad5... more ... Rodziah Latih1, Ahmed Moosajee Patel2, Abdullah Mohd. Zin3, Tew Yiqi4, Siti Hafizah Muhammad5 ... One of EUP paradigms used in mashup tool to develop mashup is wiring paradigm where users wire together the selected modules or widgets that provided by the tool. ...
The purpose of this study is to present, introduce and explain the principles, concepts and techn... more The purpose of this study is to present, introduce and explain the principles, concepts and techniques of mashups through an analysis of mashup tools from End-user Development (EuD) software engineering perspectives, since it is a new programming paradigm. Problem statement: Although mashup tools supporting the creation of mashups rely heavily on data integration, they still require users to have reasonable programming skills, rather than simply enabling the integration of content in a template approach. Mashup tools also have their lifespan in a fast moving technology-driven world which requires meta-application handling. Some developers have discontinued their mashup tools but others are still available in the mashup space. It has been noted that there is a steady increase of new mashups on a daily basis with a concomitant increase of new Application Programming Interface (APIs) to support meta-mashup application EuD. Approach: Both qualitative and quantitative research methods have been utilized. After introducing the basic principles, concepts and techniques of mashups, we develop and present a categorization of mashups and mashup tools and summarize the ten most popular currently used mashup tools against seven indictors from end-user software engineering perspectives ranging from programming skill requirement, prompt suggestion of features use, operability, 'share-ability' and reuse, service, type and target user, in order to evaluate how these mashup tools support end-user development. To perform the evaluation and produce the final results, the selected indicators' features have been horizontally compared and comprehensively analyzed. Results: The philosophy of mashup is aimed at providing simple rapid program development by endusers with minimum programming skills. However, we observe that mashup tools typically follow four data processing styles: Webpage customization, wire paradigm, spreadsheet and programming by demonstration. These mashup tools are supposed to seamlessly and effortlessly assist end-users programming but this is not the case. Conclusion: From our research we concluded that some mashup tools are not really simple enough to handle and still require end-users to have a computer programming background to learn and understand its platform infrastructures and mechanisms. These might all change in the near future. There are some companies that are now involved with mashup development which provide huge opportunities to both individual and organizational customers. Mashup have now become a commercial opportunity rather than a simple way of integrating data from Web 2.0 platforms.
International Journal of Information Security and Privacy, 2000
Wiki is a social networking system that allows users to freely intermingle at different levels of... more Wiki is a social networking system that allows users to freely intermingle at different levels of communication such as collaborative learning, chatting and group communications. This is conceived to be the merriest goal. It is particularly vulnerable due to its features of open medium and lack of clear plan of defense. Social networking systems today are far more prone to abuse than before. For instance, personal data can be misused for virtual insulting, resulting in misuse of personal information for financial games or creating missive. Wiki is an example of social computing of collaborative learning, joint editing, brain storming and virtual socializing. All of these create a ripe environment for hacking, deception, abuse and misuse. Thus, wiki needs comprehensive security measures which include privacy, trust, security, audit and digital forensics to protect users and system resources. This paper focuses in identifying and exploring the needs of secure social computing and supporting information systems as places for interaction, data collection and manipulation for wikis. It does this by reviewing the literature and related works in proposing a safety measure framework for a secure and trustworthy medium together with privacy, audit and digital forensic investigative functions in wiki environments. These then can aid design and usage in social computing environments with the proviso to give comfort and confidence to users without worrying about abuse and cybercrime perpetrated activities.
End-user Programming for the web is currently of interest because Web 2.0 technologies have resul... more End-user Programming for the web is currently of interest because Web 2.0 technologies have resulted in a vast array of tools available for mashup making. This paper presents a Systematic Literature Review of EUP for web mashups. Its objective is to outline a comprehensive review and synthesis of the literature related to EUP for web mashups. A Systematic Literature Review was performed of peer reviewed published studies that focused on research in EUP for Web mashups. A review was conducted on 21 relevant articles, mostly recent (published between January 1 st 2000 and December 31 st 2012) and published in English. Five EUP approaches for web mashups were identified from the studies; browsing, programming by demonstration or example, spreadsheet, widget, data-flow and block-based approach. Other researches regarding EUP for web mashups were also identified, such as ubiquitous platform mashups, users' support functions, data extraction techniques, and process-oriented mashups.
Uploads
Papers by R. Latih