Top Cited 2 Articles In 2017 – IJMIT

Top Cited 2 Articles In 2017

International Journal Of Managing Information Technology (IJMIT)

Issn: 0975-5586 (Online); 0975-5926 (Print)

http://airccse.org/journal/ijmit/ijmit.html

Autonomic Framework For It Security Governance

Sitalakshmi Venkatraman

School of Engineering, Construction and Design (IT), Melbourne Polytechnic, Australia

Abstract

With the recent service enhancements over the Internet, organisations are confronted with a growing magnitude of security intrusions and attacks. Current intrusion detection strategies have not been effective in the long term, as new and obfuscated security attacks keep emerging evading the surveillance mechanisms. With information technology (IT) playing a pivotal role in today’s organizational operations and value creation, security  regulatory bodies have identified this situation not solely as a technology issue, rather due to the weakness of an organisation’s risk management practices and IT governance. Hence, recent attention has embarked on formulating proactive IT security governance for organisational sustenance. This paper proposes an autonomic framework for IT security governance that postulates a selflearning adaptive mechanism for an effective intrusion detection and risk management. Such a framework would facilitate autonomic ways of integrating existing context-dependent knowledge with new observed behaviour patterns gathered from network as well as host for detecting unknown security attacks effectively using mobile agents. In addition, this paper provides a roadmap for autonomic IT security governance by applying the proposed framework The roadmap employs a continuous improvement feedback loop. for achieving the targeted quality of service (QoS) in an organisation.

Keywords

IT Security Governance, Intrusion Detection, Autonomic Framework, Self-learning & Mobile Agents

For More Details: http://aircconline.com/ijmit/V9N3/9317ijmit01.pdf

Volume Link: http://airccse.org/journal/ijmit/vol9.html

References

[1] Lab K., (2015) “Kaspersky Security Bulletin,” Kaspersky Lab, Tech. Rep.

[2] Symantec, (2016) “Internet Security Threat Report: Trends for 2016,” Symantec, Tech. Rep. vol. 21, p. 81.

[3] McAfee Labs,“McAfee Labs Threats Report,” Intel Security, Tech. Rep., 03 2016.

[4] Microsoft, “Microsoft Security Intelligence Report,” Microsoft, Tech. Rep., 12 2015.

[5] HP Enterprise, “HPE Security Research Cyber Risk Report,” Hewlett Packard Enterprise, Tech. Rep., 2016.

[6] IBM X-Force, (2015) “IBM X-Force Threat Intelligence Report 2016,” IBM, Tech. Rep., 2016. [7] Vasilomanolakis, E. Karuppayah, S. Mühlhäuser, M. and Fischer, M. “Taxonomy and Survey of Collaborative Intrusion Detection,” ACM Computing Surveys, vol. 47, no. 4, pp. 55:1–55:33. [8] Sommer R. and Paxson V., (2010) “Outside the Closed World: On Using Machine Learning for Network Intrusion Detection,” in Proceedings of the 2010 IEEE Symposium on Security and Privacy. IEEE Computer Society, pp. 305–316.

[9] Jang, J.-w. Yun, J. Mohaisen, A. Woo, J. and. Kim, H. K (2016) “Detecting and Classifying Method Based on Similarity Matching of Android Malware Behavior with Profile,” SpringerPlus, vol. 5, no. 1, p. 1.

[10] Nguyen, A. Yosinski, J. and Clune, J. (2015) “Deep Neural Networks Are Easily Fooled: High Confidence Predictions for Unrecognizable Images,” The IEEE Conference on Computer Vision and Pattern Recognition.

[11] Schmugar, C. (2007) “The future of cybercrime“, Sage: Security Vision From McAfee Avert Labs, 1(2), 1 5.

[12] Faruki, P. Bhandari S., Laxmi, V. Gaur M., and Conti, M. (2016) “DroidAnalyst: Synergic App Framework for Static and Dynamic App Analysis,” in Recent Advances in Computational Intelligence in Defense and Security. Springer, pp. 519–552.

[13] Li, W.-X. Wang, J.-B. Mu, D.-J. and Yuan, Y. (2011) “Survey on Android Rootkit,” Microprocessors, vol. 32. no.2, pp. 68-72.

[14] Kim, S. Park, J. Lee K., You, I. and Yim K., (2012) “A Brief Survey on Rootkit Techniques in Malicious Codes,” Journal of Internet Services and Information Security, vol. 2, no. 3/4, pp. 134–147.

[15] Lam, P. Wang L.-L., Ngan, H. Y. T. Yung, N. H. C. and Yeh, A. G.-O. (2015) “Outlier Detection In Large-Scale Traffic Data By Naïve Bayes Method and Gaussian Mixture Model Method,” arXiv.

[16] Yang, J. Deng, T. and Sui, R. (2015) “An Adaptive Weighted One-Class SVM for Robust Outlier Detection,” in Proceedings of the 2015 Chinese Intelligent Systems Conference. Springer, pp. 475– 484.

[17] Pereira, G.V. Luciano, E. M. Macadar, M. A. and Daniel, V.M. (2013) “Information technology governance practices adoption through an institutional perspective: The perception of brazilian and american CIOs,” 46th Hawaii International Conference on System Sciences, pp. 4446–4455.

[18] Turel O. and Bart, C. (2014) “Board-level IT governance and organizational performance,” Eur. J. Inf. Syst., vol. 23, no. 2, pp. 223–239.

[19] Borth, M. A., and Bradley, R. V. (2009). “Unexplored Linkages between Corporate Governance and IT Governance: An Evaluation and Call to Research Information Technology Governance and Service Management: Frameworks and Adaptations” IGI Global. pp. 202-220.

[20] Buchwald, A. Urbach, N. and Ahlemann, F. (2014) “Business value through controlled IT: Toward an integrated model of IT governance success and its impact,” J. Inf. Technol., vol. 29, no. 2, pp. 128– 147.

[21] Yu, S. Wang, G. and Zhou, W. (2015) “Modeling Malicious Activities in Cyber Space,” IEEE Network, vol. 29, no. 6, pp. 83–87.

[22] IFAC (2004), “Enterprise Governance-Getting the Balance Right”, PAIB Report to IFAC.

[23] Cumps, B., Viaene, S., & Dedene, G. (2012). “Linking the Strategic Importance of ICT with Investment in Business-ICT Alignment: An Explorative Framework”. In W. Van Grembergen & S. De Haes (Eds.), Business Strategy and Applications in Enterprise IT Governance (pp. 37-55). Hershey, Pennsylvania, USA: IGI Global.

[24] De Haes S. and Van Grembergen, W. (2015) “Enterprise Governance of Information Technology“, Cham: Springer International Publishing.

[25] ITGI (2003), “Board briefing on IT governance“, 2nd Edition, Information Systems Audit and Control Foundation, 2003.

[26] Bartens, Y ., Schulte, F., & Vos, S. (2014). “E-Business IT Governance Revisited: An Attempt towards Outlining a Novel Bi-directional Business/IT Alignment in COBIT5“, Paper presented at the 47th Hawaii International Conference on System Sciences (HICSS), 2014.

[27] Chou, Y.-C., Chuang, H. H.-C., & Shao, B. B. M. (2014). “The impacts of information technology on total factor productivity: A look at externalities and innovations“. International Journal of Production Economics, 158, 290-299.

[28] ISO/IEC 38500, (2015) “Information Technology – Governance of IT for the organization” ISO/IEC 38500:2015, 2nd Edition, ISO:Switzerland.

[29] OECD (2005) Corporate Governance. OECD glossary of statistical terms, Organisation for Economic Co operation and Development (OECD)

[30] Stroud, R.E. (2012). “Introduction to COBIT 5” . ISACA.

[31] Kephart, J. and Chess, D. M. (2003) “The vision of autonomic computing“, IEEE Computer, vol. 36, no. 1, pp. 41-50.

[32] Ganek, A. G. and Corbi, T. A. (2003) “The Dawning of the Autonomic Computing Era“. IBM Systems Journal. vol. 42, no. 1, pp. 5-18.

[33] Dudley, G., Joshi, N., Ogle, D.M., Subramanian, B. and Topol, B.B. (2004) “Autonomic self-healing systems in a cross-product IT environment”, Proceedings of the International Conference on Autonomic Computing), 312-313.

[34] Dobson, S. Sterritt, R. Nixon, P. and Hinchey. M. (2010) “Fulfilling the vision of autonomic computing“. Computer, vol. 43, pp. 35-41.

[35] Vidales, P., Baliosian, J., Serrat, J., Mapp,G., Stajano, F. and Hopper, A. (2005) “Autonomic System for Mobility Support in 4G Networks“. IEEE Journal on Selected Areas in Communications. vol. 23, no. 12, pp. 2288-2304.

[36] Sancho G., Villemur T. and Tazi S., (2010) “An Ontology-driven Approach for Collaborative Ubiquitous Systems”, International Journal of Autonomic Computing (IJAC) InderScience Publishers Mai pp 263 – 279

[37] Cabri, G., Leonardi, L. and Zambonelli, F. (2002) “Engineering Mobile Agent Applications Via Context- Dependent Coordination“. IEEE Transactions on Software Engineering. vol. 28, no. 11, pp. 1040-1058.

[38] Russell, S.J.; Norvig, P. (2010). “Artificial intelligence: A modern approach” (3rd ed. ed.). Upper Saddle River: Prentice Hall.

[39] Alizadeh, H. Khoshrou A., and Zúquete, A. (2015) “Traffic Classification and Verification using Unsupervised Learning of Gaussian Mixture Models,” in International Workshop on Measurements & Networking. IEEE.

[40] Venkatraman, S. (2010) “Self-Learning Framework for Intrusion Detection”, Proceedings of The 2010 International Congress on Computer Applications and Computational Science (CACS 2010), 4- 6 December, Singapore, pp. 517-520

[41] Cui, T., Ye, H., Teo, H. H., & Li, J. (2015) “Information technology and open innovation: A strategic alignment perspective“. Information & Management, vol. 52, pp. 348-358.

[42] Yu, S. Guo, S. andStojmenovic, I. (2015) “Fool Me if You Can: Mimicking Attacks and Anti-Attacks in Cyberspace,” IEEE Transactions on Computers, vol. 64, no. 1, pp. 139–151.

 

Classification Of Questions And Learning Outcome Statements (Los) Into Bloom’s Taxonomy (Bt) By Similarity Measurements Towards Extracting Of Learning Outcome From Learning Material

Shadi Diab1 and Badie Sartawi2

1Information and Communication Technology Center, Al-Quds Open University, Ramallah – Palestine

2Associate Professor of Computer Science, Al-Quds University, Jerusalem – Palestine

Abstract

Bloom’s Taxonomy (BT) have been used to classify the objectives of learning outcome by dividing the learning into three different domains; the cognitive domain, the effective domain and the psychomotor domain. In this paper, we are introducing a new approach to classify the questions and learning outcome statements (LOS) into Blooms taxonomy (BT) and to verify BT verb lists, which are being cited and used by academicians to write questions and (LOS). An experiment was designed to investigate the semantic relationship between the action verbs used in both questions and LOS to obtain more accurate classification of the levels of BT. A sample of 775 different action verbs collected from different universities allows us to measure an accurate and clear-cut cognitive level for the action verb. It is worth mentioning that natural language processing techniques were used to develop our rules as to induce the questions into chunks in order to extract the action verbs. Our proposed solution was able to classify the action verb into a precise level of the cognitive domain. We, on our side, have tested and evaluated our proposed solution using confusion matrix. The results of evaluation tests yielded 97% for the macro average of precision and 90% for F1. Thus, the outcome of the research suggests that it is crucial to analyse and verify the action verbs cited and used by academicians to write LOS and classify their questions based on blooms taxonomy in order to obtain a definite and more accurate classification..

Keywords

Learning outcome; Natural Language Processing, Similarity Measurement; Questions Classification

For More Details: http://aircconline.com/ijmit/V9N2/9317ijmit01.pdf

Volume Link: http://airccse.org/journal/ijmit/vol9.html

References

[1] Declan Kennedy, Writing and using learning outcomes: a practical guide, Page 18, Cork: University College Cork, 2006.

[2] EU, Publications Office, Using learning outcome, European Qualifications Framework Series: Note 4, Luxembourg: ISBN 978-92-79-21085-3, 2011 Page, 2010.

[3] Totschnig, Michael, et al., “Repository services for outcome-based learning” 2010.

[4] Office Of Institutional Effectiveness, Assessment Workbook For Academic Programs, Richmond: University Of Richmond, 2008.

[5] Advancing Academic Quality in Business Education Worldwide, Bloom’s Taxonomy of Educational Objectives and Writing Intended Learning Outcomes Statements, Kansas: International Assembly for Collegiate Business Education, 2016.

[6] M. D. Gall, “The Use of Questions in Teaching,” American Educational Research Association, vol. 40, no. 5, pp. 707-721, 1970.

[7] D. R. Krathwohl, A Revision of Bloom’s Taxonomy:, College of Education, The Ohio State University.

[8] Li and Roth, Learning Question Classifiers, Illinois USA: 19th International Conference on Compuatational Linguistics (COLING) 2002.

[9] Wen-Chih Chang and Ming-Shun Chung, Automatic Applying Bloom’s Taxonomy to Classify and Analysis the cognition level of english questions items, Taiwan: IEEE, 2009.

[10] Sonal Jain and Jyoti Pareek, Automatic extraction of prerequisites and learning outcome from learning material, India: Inderscience Enterprises Ltd., 2013.

[11] Syahidah Haris and Nazila Omar, A Rule-based Approach in Bloom’s Taxonomy Question Classification through Natural Language, Malaysia, 2013.

[12] Syahidah sufi haris and nazlia omar, Bloom’s Taxonomy Question Categorization Using Rules And N-Gram Approach, Malaysia: Journal of Theoretical and Applied Information Technology, 2015.

[13] Payal Biswas et al, Question Classification Using Syntactic And Rule Based Approach, New Delhi: International Conference on Advances in Computing, Communications and Informatics (ICACCI), 2014.

[14] Dell Zhang et al, Question Classification using Support Vector Machines, Singapore: ACM 1-58113- 646-3/03/0007, 2003.

[15] Jibin Fu, Two Level Question Classification Based on SVM and Question Semantic Similarity, Beijing, China: International Conference on Electronic Computer Technology, 2009.

[16] Anwar Ali Yahya and Addin Osman, Automatic Classification Of Questions Into Bloom’s Cognitive Levels Using Support Vector Machines, Najran: Researchgate, 2011.

[17] K. J. et al, An automatic classifer for exam questions with wordnet and cosine, International Journal of Emerging Technologies in Learning (iJET) 11(04):142 • April 2016

[18] Lingling Meng et al, “A Review of Semantic Similarity Measures in WordNet,” International Journal of Hybrid Information Technology, vol. 6, no. 1, p. 1, 2013.

[19] Siddharth Patwardhan et al, “Using Measures of Semantic Relatedness for Word Sense Disambiguation,” Springer, p. 241–257, 2003.

[20] G. V. e. al, “Semantic Similarity Methods in WordNet and Their Application to Information Retrieval on the Web,” ACM New York, NY, USA ©2005, pp. 10-16, 2005.

[21] G. A. Miller, “WordNet – A Lexical Database for English,” Communications of the ACM, vol. 38, no. 11, pp. 39-41, 2005.  International Journal of Managing Information Technology (IJMIT) Vol.9, No.2, May 2017 12

[22] C. C. a. R. Mihalcea, Measuring the Semantic Similarity of Texts, University of North Texas: University of North Texas, 2005.

[23] Z. W. a. M. Palmer, “VERB SEMANTICS AND LEXICAL SELECTION,” in In Proceedings of the 32nd Annual Meeting of the Associations for Computational Linguistics, Las Cruces, New Mexico,,1994.

[24] Virginia.ED, “Bloom’s Taxonomy of Cognitive Skills with Action Verb List Source,” University of Verginia, 20 2 2017. [Online]. Available: http://avillage.web.virginia.edu/iaas/assess/resources/verblist.pdf. [Accessed 20 2 2017].

[25] U. O. C. Florida, “Bloom’s Taxonomy,” University of Central Florida, 20 2 2017. [Online]. Available: http://www.fctl.ucf.edu/teachingandlearningresources/coursedesign/bloomstaxonomy/. [Accessed 20 2 2017].

[26] M. S. University, “Bloom’s Taxonomy Action Verbs,” Missouri State University, 20 2 2017. [Online]. Available: https://www.missouristate.edu/assets/fctl/Blooms_Taxonomy_Action_Verbs.pdf. [Accessed 20 2 2017].

[27] C. A. College, “Bloom’s Taxonomy Verbs,” Central Arizona College, 20 2 2017. [Online]. Available: http://www.centralaz.edu/Documents/class/Bloom’s%20Taxonomy%20Verbs%20Web.pdf.[Accessed 20 2 2017].

[28] F. Kugelman, “http://www.bloomstaxonomy.org/,” 6 2 2017. [Online]. Available: http://www.bloomstaxonomy.org/BloomsTaxonomyquestions.pdf. [Accessed 06 02 2017].

[29] Zaanen et al, “Question classification by structure induction,” in IJCAI’05 Proceedings of the 19th international joint conference on Artificial intelligence, Edinburgh, Scotland , 2005.

[30] C. Adelman, The Language and Syntax of Learning Outcomes Statements, National Institute for Learning Outcomes Assessment, 2015.

[31] The Center For Learning, Muskie Institute Center for Learning, University of Southern Maine [Online]. Available: http://php.ipsiconnect.org/doc/VerbList.htm. [Accessed 27 2 2017].

[32] Fresnostate university, “Bloom’s Taxonomy Action Verbs,” [Online]. Available: http://www.fresnostate.edu/academics/oie/documents/assesments/Blooms%20Level.pdf. [Accessed 4 3 2017].

[33] K. Markham, “Simple guide to confusion matrix terminology,” dataschool, [Online]. Available: http://www.dataschool.io/simple-guide-to-confusion-matrix-terminology/. [Accessed 07 03 2017].

[34] E. K. A. E. L. Steven Bird, Natural Language Processing with Python, 2009: O’Reilly Media, Inc., O’Reilly Media, Inc.

[35] R. Joshi, “How to evaluate the performance of a model in Azure ML and understanding “Confusion Metrics”,” exsilio.com, 9 Septemper 2016. [Online]. Available: http://blog.exsilio.com/all/accuracyprecision-recall-f1-score-interpretation-of-performance-measures/. [Accessed 2017 3 7].

Advertisement