12 research outputs found

    Factors affecting secure software development practices among developers- an investigation

    Get PDF
    An evidently dominate problem in the software development domain is that software security is not consistently addressed from the initial phase of software development which escalates security concerns, results in insecure software development. Several secure software development methodologies were introduced in literature and recommended to the industry but they are usually ignored by the developers and software practitioners. In this research paper, an extensive literature review is performed to find out factors influencing implementations of secure software development practices in industry. Secondly, based on Unified Theory of Acceptance and Use of Technology model 2 (UTAUT2) this study proposes a model to investigate the factors influencing adoption of secure software development practices among software developers

    Investigation of adoption behaviour for social commerce in the kindom of Saudi Arabia

    Get PDF
    Social media fundamentally has changed the consumer's decision process. There are many research studies from different context for understanding the importance of social media, regrettably, not until recently, its business impact and opportunities were not seriously addressed. This is what led the Information System (IS) research community to come up with a new discipline known as Social Commerce (s-commerce). Hence an alternative means businesses through online social interactions emerge. This has made the social networking platform drives consumers to participate in social commerce. It is necessary to identify the significant factors that affect its acceptance. Thus, this research aimed to empirically examine the factors that affect s-commerce acceptance in Saudi Arabia. The quantitative research methodology was chosen to test the formulated hypothesis by subjective assessment of attitudes, opinions, and behavior of the people of Saudi Arabia

    IDENTIFYING MOLECULAR FUNCTIONS OF DYNEIN MOTOR PROTEINS USING EXTREME GRADIENT BOOSTING ALGORITHM WITH MACHINE LEARNING

    Get PDF
    The majority of cytoplasmic proteins and vesicles move actively primarily to dynein motor proteins, which are the cause of muscle contraction. Moreover, identifying how dynein are used in cells will rely on structural knowledge. Cytoskeletal motor proteins have different molecular roles and structures, and they belong to three superfamilies of dynamin, actin and myosin. Loss of function of specific molecular motor proteins can be attributed to a number of human diseases, such as Charcot-Charcot-Dystrophy and kidney disease.  It is crucial to create a precise model to identify dynein motor proteins in order to aid scientists in understanding their molecular role and designing therapeutic targets based on their influence on human disease. Therefore, we develop an accurate and efficient computational methodology is highly desired, especially when using cutting-edge machine learning methods. In this article, we proposed a machine learning-based superfamily of cytoskeletal motor protein locations prediction method called extreme gradient boosting (XGBoost). We get the initial feature set All by extraction the protein features from the sequence and evolutionary data of the amino acid residues named BLOUSM62. Through our successful eXtreme gradient boosting (XGBoost), accuracy score 0.8676%, Precision score 0.8768%, Sensitivity score 0.760%, Specificity score 0.9752% and MCC score 0.7536%.  Our method has demonstrated substantial improvements in the performance of many of the evaluation parameters compared to other state-of-the-art methods. This study offers an effective model for the classification of dynein proteins and lays a foundation for further research to improve the efficiency of protein functional classification

    Use of security patterns for development of secure healthcare information system

    Get PDF
    Healthcare systems have recently received attention from industry related to the sensitive and confidential information stored in it. This information is shared among different physicians, surgeons and technicians in the distributed and heterogeneous environment. Bearing these security concerns in mind a model driven methodology of using security patterns for development of secure healthcare information systems is proposed. This methodology consists of an extension of Unified Modeling Language (UML) deployment diagram namely as Security Patterns Deployment Diagram (SPDD) and a tool that supports for extending the use of proposed diagram. The proposed method has been validated by performing a case study on Healthcare Information System

    Revised and extended social commerce technology adoption in e-business of Pakistan

    Get PDF
    Social commerce is a new perspective change in modern electronic business procedures bringing together individuals on social media sites and opens up another electronic social marketing channel to establish business. In developing countries like Pakistan, e-business can help organizations using social commerce and social marketing intelligently on particular social network sites to grasp their business clients while they are interacting with their online community on the social media sites. This study investigated consumers’ behavior towards adoption of social commerce and introduced a revised and extended social commerce technology model. The investigation proved the proposed model is valid by confirming loading factor, Kaiser-Mayer-Olkin (KMO), reliability analysis, and structural equation modeling approach for hypotheses tests. The study found Perceived Ease of Use (PEU), Perceived Usefulness (PU), Social Media Influence (SMI), and Risk (RI) have significant impact on social commerce adoption in e-business of Pakistan. More, Trust (TR) and Web experience (WXP) were insignificant that revealed the preventive behavior towards adoption of social commerce in e-business of Pakistan

    UBI-XGB: IDENTIFICATION OF UBIQUITIN PROTEINS USING MACHINE LEARNING MODEL

    Get PDF
    A recent line of research has focused on Ubiquitination, a pervasive and proteasome-mediated protein degradation that controls apoptosis and is crucial in the breakdown of proteins and the development of cell disorders, is a major factor.  The turnover of proteins and ubiquitination are two related processes. We predict ubiquitination sites; these attributes are lastly fed into the extreme gradient boosting (XGBoost) classifier. We develop reliable predictors computational tool using experimental identification of protein ubiquitination sites is typically labor- and time-intensive. First, we encoded protein sequence features into matrix data using Dipeptide Deviation from Expected Mean (DDE) features encoding techniques. We also proposed 2nd features extraction model named dipeptide composition (DPC) model. It is vital to develop reliable predictors since experimental identification of protein ubiquitination sites is typically labor- and time-intensive. In this paper, we proposed computational method as named Ubipro-XGBoost, a multi-view feature-based technique for predicting ubiquitination sites. Recent developments in proteomic technology have sparked renewed interest in the identification of ubiquitination sites in a number of human disorders, which have been studied experimentally and clinically.  When more experimentally verified ubiquitination sites appear, we developed a predictive algorithm that can locate lysine ubiquitination sites in large-scale proteome data. This paper introduces Ubipro-XGBoost, a machine learning method. Ubipro-XGBoost had an AUC (area under the Receiver Operating Characteristic curve) of 0.914% accuracy, 0.836% Sensitivity, 0.992% Specificity, and 0.839% MCC on a 5-fold cross validation based on DPC model, and 2nd 0.909% accuracy, 0.839% Sensitivity, 0.979% Specificity, and 0. 0.829% MCC on a 5-fold cross validation based on DDE model. The findings demonstrate that the suggested technique, Ubipro-XGBoost, outperforms conventional ubiquitination prediction methods and offers fresh advice for ubiquitination site identification

    Invite Internet Users to Honeynet Security to Improve VoIP Streaming Services

    Get PDF
    There are group of challenges in VoIP security, VoIP Quality and lots of peoples worked on it e.g., “IPSec security on VoIP”, “VoIP Honeypot architecture”, “cryptography techniques are used to safely transmit the information stream over the network” and many more. Security is a terminology which cannot be a perfect or 100%. For the time being we can be minimizing and protect to the threats but as the technology increases the new threats are also generating day by day. Researchers have applied different patterns, techniques and scenarios to prevent some specific threats and security frameworks for securing VoIP communication. But in this research, we want to analyze the quality of service after applying Honeynet security framework

    A tool for modeling software security requirements using security patterns

    Get PDF
    Security requirements of today’s software systems are increasing and becoming complex. Software industry has well recognized that security should be incorporated at earlier stages of the software development. It is not easy for the programmers and developers to incorporate security in the software without proper expertise in it. For that reason different security patterns were proposed by the security experts for implementation of security by non-security experts. A security pattern provides well proven solution for the existing security problem in a specific context provided by the security experts. Security patterns usually are in textual format due to which they are often neglected at the design level. Security patterns do not constitute an intuitive solution that can be used by software designers because they are not useful without a systematic way to apply them. Security patterns lack comprehensive structure that conveys essential information inherent to security engineering (SE). This research presentsmethodology for presenting secure software requirements using Security Patterns that is tailored to meetthe needs of secure system development. In order to maximize comprehensibility, well-known notations of Unified Modeling Language (UML) is used to represent structuraland behavioral aspects of design. Only 13% of the papers published till 2015 involve tooling support for security patterns. To encounter this limitation, a methodology which focuses on the providing solution provided by the security pattern in the form of standard UML notations. As the proposed method results in an extension of Deployment diagram, it is named as Security Patterns Deployment Diagram (SPDD). It represents the solution provided by security patterns in standard UML graphical notation, which includes the compulsory elements of security patterns that are context, problem, actors, relations and solution including where attacks will be fended off in the early design stage of the software system in a single view. SPDD is proposed along with security modeling tool called SPDD Editor for modeling security pattern solution using proposed methodology. Security patterns research uses UML for modeling regardless of security patterns to be dealt with. It could be because UML is the most widely accepted formalism for the analysis and design of software. Therefore, itis considered as security pattern modeling method. This extension of deployment diagram provides a suitable way to define semantics for each solution provided by security pattern and allowing developers to easily understand software security requirements and their implementations in detail. A Plug-in for SeaMonster security designing tool has been developed to support the designing of the proposed diagram using Eclipse Graphical Modeling Framework (GMF) and Eclipse Graphical Editor Framework (GEF). The validation of SPDD has been done with the Hospital Information System (HIS) and E-Commerce System case studies. An expert review was performed to verify the proposed methodology and proposed tool support. SPDD editor tool and both methods SPDD and Component based application (CBA) were also evaluated by three experts in the field. The expert review results showed positive results towards acceptance of SPDD method and tool. Experimental comparison with twenty participants was also performed to validate the effectiveness and to find out the better method in terms of designing solution provided by security patterns from the participant’s point of view. The CBA method was selected to compare with proposed SPDD method because of the fact that most of the programmers and developers usually known to component diagram and there is no need to teach them its application and they can easily perform the tasks related to CBA method and also security pattern modeling application using CBA is previously proposed in literature. The experimental results from participants showed that there is a significant difference in designing threats and mitigation using SPDD editor in two methods. The SPDD method is used to design more threats and mitigation as compared to CBA method. By using proposed methodology and SPDD editor tool it is easier for the non-security expert to incorporate security at earlier stages of software development. It provides the facility of designing the security requirements in the architecture at design stage with incorporating expert knowledge of the security experts provided by the security patterns

    Challenges and limitations in secure software development adoption - A qualitative analysis in Malaysian software industry prospect

    Get PDF
    Inclusion of security in software development from the initial design phase has not been consistently addressed by the software developers. As a result there is an abundance of software systems with weak security. The objective of this study is to find out factors influencing developer's intention to adopt secure software development practices. Methodology: This study is based on qualitative research methodology. Interviews were conducted from the professionals working at senior positions at Malaysian software development organization. All the interviews were first transcribed, as they were digitally recorded. Then transcribed data was analyzed in a way that all frequent words or repetitive concepts were highlighted, after which many similar or relevant concepts were grouped together and categorized as themes and sub themes. Findings: The data was analyzed using the thematic analysis method. The results revealed five main themes, whereas each main theme has sub-themes. These sub-themes are parameters to justify the main theme. Main themes were identified in the light of the interviewee's response. The main results include interviewee's demographic characteristics, and then the main themes identified include, Adoption of SSD practices, Influencing authorities, Motivating Factors, Attitude towards SSD, Hindrances / Issues towards SSD Adoption. Sub themes included: Security Culture, Change Management, Applications of SSD, Managers, Security Expert, Training, Incentives, Security Awareness, Performance Expectancy, Facilitating Conditions, Demographic Characteristics, Need to use SSD, No clear guidelines, Strict Project Timeline, Lack of Security knowledge. The overall interview results show that secure software development practices adoption level in most part of the software industry is not up to the satisfactory level. Novelty/Applications: This research explores the factors impeding the implementation of the best security practices, and barriers to secure software development practices adoption. This study can be used as guideline to be followed for the implementation of secure software development practices in software industry. Keywords: Secure software development adoption; organizational factors;software developer intention; security development; software security

    Acceptance of IoT learning among university students at Pakistan

    No full text
    The Internet of Things abbreviated as an IoT is considered the most recent innovative and fastest-developing field that is to be applied in all aspects of life, in particular higher education. It has sparked interest as well as challenges among academics; the current research will concentrate on acceptance and adoption of IoT in the higher educational institutions of Pakistan. IoT supports educators in environment of learning and can have an impact on how we interact, connect, and work. In this study, we will look at two different aspects. The first one is how to teach students, and secondly how IoT can be used in educational institutions to enhance learning. This study looks at the factors that affect acceptance of IoT and use in an academic setting in Pakistan's higher education institutions. The current research establishes foundation for a comprehensive framework based on trusted technology and social psychology models, such as the Use of Technology 2 and Unified Theory of Acceptance (UTAUT2). The method proposed in this study is network analysis method to observe users' actions in relation to several IoT applications in higher education. An in-depth analysis and consideration of key deliverables which have a major impact on the Internet of Things (IoT) adoption in Pakistani educational institutions of higher level, revealed that only a few applications are heavily used in comparison to all other applications. This research lays the groundwork for developed countries to grow adoption and IoT technologies use in higher education, which will support both students and faculty
    corecore