10 research outputs found

    Waterfall-ADDIE model: an integration of software development model and instructional systems design in developing a digital video learning application

    Get PDF
    To date, researchers are still debating the poor instructional design for certain developed learning applications or courseware in supporting the flexibility to the student. The instructional design is vital in ensuring that learners obtain effective and meaningful to them for a better subject understanding. However, ignoring the functionality and bugs issues in a courseware development should not be practiced. The courseware developer should acknowledge the importance of instructional design and system development model to meet the user and system requirements. Given the resemblances between software development and instructional design phases, researchers could integrate certain importance techniques in software development model’s phases into the ISD model to enhance the design solutions as well as the application technical parts. This paper highlights the integration of Waterfall model as the software development model with ADDIE model which is one of the established ISD models. The integration of Waterfall-ADDIE model was adopted to develop the digital video learning application for university students. A system testing and user acceptance testing were conducted to validate the courseware can meet the system and user requirements. This paper demonstrates all the phases involved in Waterfall model and ADDIE model are interrelated and practically being integrated to propose high-quality development of instructional design learning material

    Enhanced risk assessment equation for IPV6 deployment

    Get PDF
    Deploying IPv6 concomitant with the emerging technologies exposes the enterprise networks to the unforeseen threats as well as the existing threats.In mitigating the threats, calculating the risks value for each of the identified threats is vital. However, the existing equation for risk assessment is inappropriate to be applied in assessing the risks in IPv6 because of their limitation in asset determination.Therefore, this paper highlights the modification made in the existing risk assessment equation.The enhanced risk assessment equation is used to calculate the risk value for IPv6 deployment.The enhanced equation adapts three elements: confidentiality, integrity and availability in achieving security goals. The importance of having the enhanced equation is it enables the network administrator to calculate the potential risks for each of the potential IPv6 attack.Securing the enterprise networks is an iterative process that has no ended points. Hence, it is crucial to modify and adapt a proper equation when performing the risk assessment.In the future, more experiments will be conducted to test for feasibility of the equation

    Decision making process in keystroke dynamics

    Get PDF
    Computer system intrusion often happens nowadays. Various methods have been introduced to reduce and prevent these intrusions, however no method was 100% proven to be effective. Therefore, to improve the computer’s security, this writing will explain the application of KD in the application system. The effectiveness of KD could not guarantee one hundred percent to prevent the computer intrusion, but it can be used as a second level of security after the login page in the application system. The pattern and time taken while typing by an individual is the core for the second level of security check after the login page. This writing will elaborate and conclude past studies related to KD on the aspects of decisionmaking process. Various methods of processing KD data that have been used are listed and the results of the study are compared. The results of this writing are expected to help new researchers in the process of evaluating KD data

    Empowering the youth through online social enterprise income generation: a study in Malaysia and USA

    Get PDF
    As Malaysia’s economy becomes increasingly developed, the quality of its education improves along with income ranks. However, the issue of school dropouts is “a thorn in the flesh” that affects the rise in income and hence the quality of life in Malaysia.As such the dropouts need to be exposed to self-empowerment and systematic financial education in order to be independent and at the same time able to steer themselves away from the dangers of crime.Taking advantage of the current digital trend, most of the dropouts are familiar with the Information and Communication technology (ICT), the internet and mobile applications.This study recommends that for the next phase in their dealing with school dropouts, the Malaysian authorities should build a prototype of the business model of Social Enterprise that is successfully in operation in the United States. Nevertheless, some adaptation should be made in order to suit with the Malaysian context.In the final phase, the authorities could also work out spin-off businesses through provision of seed funds, including from interested private sectors, to these youths

    The Effects Of Segmenting And Computational Thinking In Digital Video Courseware On Knowledge Achievement, Self-Efficacy And Motivation Among Students With Different Thinking Styles

    Get PDF
    The lack of 21st-century skills of digital video knowledge and computational thinking (CT), as well as the inflexibility of a student to control the learning pace results in low-quality video being produced. Hence, the researcher aims to design, develop, and analyse the effects of integration between learner-paced predefined segment and CT algorithmic thinking in "Digital Video Courseware (DVC)" development on knowledge achievement, self-efficacy, and motivation in students with different thinking styles. This research used a quasi-experimental design using a 2 x 3 factorial. This study's variables include (i) two treatment modes, "DVC: Learner-paced predefined segment (DVC-LS)" and "DVC: System predefined segment (DVC-SS)"; (ii) knowledge achievement, self-efficacy, and motivation; and (iii) thinking style, which includes legislative, executive, and judicial. The undergraduate students from "Malaysian Technical University Network (MTUN)" university are categorised into two groups which are mode 1: DVC-LS and mode 2: DVC-SS. Descriptive and inferential statistics (ANOVA and ANCOVA) were used to analyse the experimental data. The researcher found significant main and interaction effects of the learner-paced predefined segment on all dependent variables. This research broadens students' understanding of both the multidisciplinary realms of CT and digital video production and enhances their digital video knowledge, and self-efficacy

    Bridging Mayer’s cognitive theory of multimedia learning and computational thinking in tackling the cognitive load issues among young digital natives : a conceptual framework

    Get PDF
    In 2020, it is undeniable that the existence of digital natives in tertiary education is undeniable, especially in universities. They are part of a tech-savvy generation that led to technological progress that is always connected and linked based on their wishes and needs without any hesitation of time and place. They are basically using technology without guidance, but how far they can manage to handle the consequences of the technology usage and the problems that occur is always questionable. It is undeniable that a digital native must begin with at least a basic level of computer knowledge in order to manage their education and daily life. Learning about computer science not only helps students to create programs, applications or how to handle devices, but strengthens the practise of Computational Thinking (CT). CT refers to the capacity of learners to systematically tackle unstructured tasks focused on four computing concepts such as decomposition, abstraction, pattern recognition, and algorithmic thinking. The purpose of this paper is to study the relationship between CT and Mayer’s Cognitive Theory of Multimedia Learning (CTML) on the cognitive load of the learners. This research focuses on CT concepts that will be integrated with Mayer’s CTML in designing the learning material for young digital natives. Therefore, the researcher proposes a conceptual framework that aims to comprehend how to facilitate the cruciality of CT concepts in Mayer’s CTML when designing instructional learning. The proposed conceptual framework adds value in tackling the cognitive load among students, particularly in the context of the digital native generation. This paper provides several implications and highlights for further studies through a comprehensive and wide-ranging literature review

    I6-FPS: Automating the ICMPv6 Filtering Rules

    No full text
    Enterprises are required to utilize Internet Control Message Protocol version 6 (ICMPv6) when IPv6 is deployed. In IPv4, Internet Control Message Protocol (ICMP) is aggressively filtered by a network administrator while in IPv6, ICMPv6 messages cannot be aggressively filtered due to the function of ICMPv6 message. ICMPv6 security risks increase when ICMPv6 threats and vulnerabilities are exploited. Thus, it is very crucial for enterprises to address the issues. In practice, network researchers must review several resources to identify ICMPv6 related attacks occurring due to the exploitation of ICMPv6 vulnerabilities. Overlooking any of these issues will jeopardize the security of ICMPv6. While conducting the attack scenarios testing, IPv6-Filtering Prototype System (I6-FPS) was developed to overcome the deficiency and limited filtering tools that supported IPv6 filtering rules (ip6table). I6-FPS is used to automate and simplify the writing of ip6table and it was developed using PHP5 and Shell script languages. This research revealed that I6-FPS is significant in the initial phase of securing IPv6 deployment as well as focusing on the ICMPv6 filtering rules. The I6-FPS has the potential to be enhanced and developed over time by including more functions to that system in generating specific filtering ip6table rules

    Application of Grounded Theory in Determining Required Elements for IPv6 Risk Assessment Equation

    No full text
    The deployment of Internet Protocol version 6 (IPv6) has raised security concerns among the network administrators. Thus, in strengthening the network security, administrator requires an appropriate method to assess the possible risks that occur in their networks. Aware of the needs to calculate risk in IPv6 network, it is essential to an organization to have an equation that is flexible and consider the requirements of the network. However, the existing risk assessment equations do not consider the requirement of the network. Therefore, this paper presents the adaptation of grounded theory to search for elements that are needed to develop IPv6 risk assessment (IRA6) equation. The attack scenarios’ experiments; UDP Flooding, TCP Flooding and Multicast attacks were carried out in different network environment to show how the IPv6 risk assessment equation being used. The result shows that the IRA6 equation is more flexible to be used regardless the network sizes and easier to calculate the risk value compared to the existing risk assessment equations. Hence, network administrators can have a proper decision making and strategic planning for a robust network security

    Application of Grounded Theory in Determining Required Elements for IPv6 Risk Assessment Equation

    No full text
    The deployment of Internet Protocol version 6 (IPv6) has raised security concerns among the network administrators. Thus, in strengthening the network security, administrator requires an appropriate method to assess the possible risks that occur in their networks. Aware of the needs to calculate risk in IPv6 network, it is essential to an organization to have an equation that is flexible and consider the requirements of the network. However, the existing risk assessment equations do not consider the requirement of the network. Therefore, this paper presents the adaptation of grounded theory to search for elements that are needed to develop IPv6 risk assessment (IRA6) equation. The attack scenarios’ experiments; UDP Flooding, TCP Flooding and Multicast attacks were carried out in different network environment to show how the IPv6 risk assessment equation being used. The result shows that the IRA6 equation is more flexible to be used regardless the network sizes and easier to calculate the risk value compared to the existing risk assessment equations. Hence, network administrators can have a proper decision making and strategic planning for a robust network security

    Students’ perception in learning mathematics across gender and ethnicity

    No full text
    This study attempts to integrate students’ perceptions in mathematics knowledge in answering and explaining problems of mathematics learning that is presence in the classroom. The survey instrument used in this study called “Students’ Perception on Mathematics Survey“(SPMS). All the marks and data gathered were tabulated, summarized, and analyzed using the Statistical Package for Social Sciences (SPSS) version 18. ANOVA analysis was used to analyze the data gathered. The data analysis reveals that there is no relationship between perception in mathematics across gender and ethnicity. It is recommended that future research employs bigger sampling for generalization purposes. In this way, results from this study may help to improve teachers’ teaching methods in mathematics as well as to enhance students’ academic performance in mathematics
    corecore