Top Cited 2 Articles In 2017 International Journal Of Managing Information Technology (IJMIT)
Top Cited 2 Articles In 2017
International Journal Of Managing Information Technology (IJMIT)
Issn: 0975-5586 (Online); 0975-5926 (Print)
Autonomic Framework For It
Security Governance
Sitalakshmi
Venkatraman
School
of Engineering, Construction and Design (IT), Melbourne Polytechnic, Australia
Abstract
With the recent service enhancements over the Internet, organisations
are confronted with a growing magnitude of security intrusions and attacks.
Current intrusion detection strategies have not been effective in the long
term, as new and obfuscated security attacks keep emerging evading the
surveillance mechanisms. With information technology (IT) playing a pivotal
role in today’s organizational
operations and value creation, security
regulatory bodies have identified this situation not solely as a
technology issue, rather due to the weakness of an organisation's risk management
practices and IT governance. Hence, recent attention has embarked on
formulating proactive IT security governance for organisational sustenance.
This paper proposes an autonomic framework for IT security governance that
postulates a selflearning adaptive mechanism for an effective intrusion
detection and risk management. Such a framework would facilitate autonomic ways of integrating existing
context-dependent knowledge with new observed behaviour patterns gathered from
network as well as host for detecting unknown security attacks effectively
using mobile agents. In addition,
this paper provides a roadmap for autonomic IT security governance by applying
the proposed framework The roadmap employs a continuous improvement feedback
loop. for achieving the targeted quality of service
(QoS) in an organisation.
Keywords
IT
Security Governance, Intrusion Detection, Autonomic Framework, Self-learning
& Mobile Agents
For More Details: http://aircconline.com/ijmit/V9N3/9317ijmit01.pdf
Volume Link: http://airccse.org/journal/ijmit/vol9.html
References
[1] Lab K., (2015) “Kaspersky
Security Bulletin,” Kaspersky Lab, Tech. Rep.
[2] Symantec, (2016) “Internet Security Threat Report:
Trends for 2016,” Symantec, Tech. Rep. vol. 21, p. 81.
[3] McAfee Labs,“McAfee
Labs Threats Report,” Intel Security, Tech. Rep., 03 2016.
[4] Microsoft, “Microsoft
Security Intelligence Report,” Microsoft, Tech. Rep., 12 2015.
[5] HP Enterprise, “HPE
Security Research Cyber Risk Report,” Hewlett Packard Enterprise, Tech. Rep.,
2016.
[6] IBM X-Force, (2015) “IBM X-Force Threat Intelligence
Report 2016,” IBM, Tech. Rep., 2016. [7] Vasilomanolakis, E. Karuppayah,
S. Mühlhäuser, M. and Fischer, M. “Taxonomy and Survey of Collaborative
Intrusion Detection,” ACM Computing Surveys, vol. 47, no. 4, pp. 55:1–55:33. [8]
Sommer R. and Paxson V., (2010) “Outside the Closed World: On Using
Machine Learning for Network Intrusion Detection,” in Proceedings of the
2010 IEEE Symposium on Security and Privacy. IEEE Computer Society, pp.
305–316.
[9] Jang, J.-w. Yun, J.
Mohaisen, A. Woo, J. and. Kim, H. K (2016) “Detecting and Classifying Method
Based on Similarity Matching of Android Malware Behavior with Profile,”
SpringerPlus, vol. 5, no. 1, p. 1.
[10] Nguyen, A. Yosinski,
J. and Clune, J. (2015) “Deep Neural Networks Are Easily
Fooled: High Confidence Predictions for Unrecognizable Images,” The IEEE Conference on
Computer Vision and Pattern Recognition.
[11] Schmugar, C. (2007)
"The future of cybercrime", Sage: Security
Vision From McAfee Avert Labs, 1(2), 1 5.
[12] Faruki, P. Bhandari
S., Laxmi, V. Gaur M., and Conti, M. (2016) “DroidAnalyst:
Synergic App Framework for Static and Dynamic App Analysis,” in Recent
Advances in Computational Intelligence
in Defense and Security. Springer, pp. 519–552.
[13] Li, W.-X. Wang, J.-B.
Mu, D.-J. and Yuan, Y. (2011) “Survey on Android Rootkit,” Microprocessors,
vol. 32. no.2, pp. 68-72.
[14] Kim, S. Park, J. Lee
K., You, I. and Yim K., (2012) “A Brief
Survey on Rootkit Techniques in
Malicious
Codes,” Journal of Internet Services and Information Security, vol. 2, no.
3/4, pp. 134–147.
[15] Lam, P. Wang L.-L.,
Ngan, H. Y. T. Yung, N. H. C. and Yeh, A. G.-O. (2015) “Outlier Detection In Large-Scale
Traffic Data By Naïve Bayes Method and Gaussian Mixture Model Method,” arXiv.
[16] Yang, J. Deng, T. and
Sui, R. (2015) “An Adaptive Weighted One-Class SVM for Robust Outlier Detection,”
in Proceedings of the 2015 Chinese Intelligent Systems Conference. Springer,
pp. 475– 484.
[17] Pereira, G.V.
Luciano, E. M. Macadar, M. A. and Daniel, V.M. (2013) “Information technology governance
practices adoption through an institutional perspective: The perception of
brazilian and american CIOs,” 46th Hawaii International Conference on System
Sciences, pp. 4446–4455.
[18] Turel O. and Bart, C.
(2014) “Board-level IT governance and
organizational performance,” Eur. J. Inf. Syst., vol. 23, no. 2, pp. 223–239.
[19] Borth, M. A., and
Bradley, R. V. (2009). "Unexplored Linkages between Corporate Governance
and IT Governance: An Evaluation and Call to Research Information Technology
Governance and Service Management: Frameworks and Adaptations" IGI Global.
pp. 202-220.
[20] Buchwald, A. Urbach,
N. and Ahlemann, F. (2014) “Business value through controlled IT:
Toward an integrated model of IT governance success and its impact,” J. Inf. Technol., vol.
29, no. 2, pp. 128– 147.
Network, vol. 29, no. 6,
pp. 83–87.
[22] IFAC (2004),
"Enterprise Governance-Getting the Balance Right", PAIB Report to
IFAC.
[23] Cumps, B., Viaene,
S., & Dedene, G. (2012). "Linking the Strategic Importance of ICT with
Investment in Business-ICT Alignment: An Explorative Framework". In W. Van
Grembergen & S. De Haes (Eds.), Business Strategy and Applications in
Enterprise IT Governance (pp. 37-55). Hershey, Pennsylvania, USA: IGI Global.
[24] De Haes S. and Van
Grembergen, W. (2015) "Enterprise Governance of Information
Technology", Cham: Springer International Publishing.
[25] ITGI (2003), "Board briefing on IT governance", 2nd Edition,
Information Systems Audit and Control Foundation, 2003.
[26] Bartens, Y .,
Schulte, F., & Vos, S. (2014). "E-Business IT Governance Revisited:
An Attempt towards Outlining a Novel Bi-directional Business/IT Alignment in
COBIT5", Paper presented at the 47th Hawaii International Conference on
System Sciences (HICSS), 2014.
[27] Chou, Y.-C., Chuang,
H. H.-C., & Shao, B. B. M. (2014). "The impacts of information technology
on total factor productivity: A look at externalities and innovations". International
Journal of Production
Economics, 158, 290-299.
[28] ISO/IEC 38500, (2015)
"Information Technology - Governance
of IT for the organization" ISO/IEC 38500:2015, 2nd Edition,
ISO:Switzerland.
[29] OECD (2005) Corporate
Governance. OECD glossary of statistical terms, Organisation for Economic Co operation
and Development (OECD),
[30] Stroud, R.E. (2012).
"Introduction to COBIT 5" . ISACA.
[31] Kephart, J. and
Chess, D. M. (2003) "The vision of autonomic computing", IEEE Computer,
vol. 36, no. 1, pp. 41-50.
[32] Ganek, A. G. and
Corbi, T. A. (2003) "The Dawning of the Autonomic
Computing Era". IBM Systems Journal. vol. 42, no. 1, pp. 5-18.
[33] Dudley, G., Joshi, N.,
Ogle, D.M., Subramanian, B. and Topol, B.B. (2004) "Autonomic self-healing systems in a
cross-product IT environment", Proceedings of the International
Conference on Autonomic Computing), 312-313.
[34] Dobson, S. Sterritt,
R. Nixon, P. and Hinchey. M. (2010) "Fulfilling the vision of autonomic computing". Computer, vol. 43,
pp. 35-41.
[35] Vidales, P.,
Baliosian, J., Serrat, J., Mapp,G., Stajano, F. and Hopper, A. (2005) "Autonomic System for Mobility Support
in 4G Networks". IEEE Journal on Selected Areas in Communications.
vol. 23, no.
12, pp. 2288-2304.
[36] Sancho G., Villemur
T. and Tazi S., (2010) “An Ontology-driven Approach for Collaborative Ubiquitous
Systems”, International Journal of Autonomic Computing (IJAC) InderScience Publishers
Mai pp 263 – 279
.
[37] Cabri, G., Leonardi,
L. and Zambonelli, F. (2002) "Engineering Mobile Agent Applications
Via Context- Dependent Coordination". IEEE Transactions on Software
Engineering. vol. 28, no. 11, pp. 1040-1058.
[38] Russell, S.J.;
Norvig, P. (2010). “Artificial intelligence: A modern
approach” (3rd ed. ed.). Upper Saddle River: Prentice Hall.
[39] Alizadeh, H. Khoshrou
A., and Zúquete, A. (2015) “Traffic
Classification and Verification using
Unsupervised
Learning of Gaussian Mixture Models,” in International Workshop on
Measurements &
Networking. IEEE.
[40] Venkatraman, S.
(2010) "Self-Learning Framework for Intrusion Detection", Proceedings
of The 2010 International Congress on Computer Applications and Computational
Science (CACS 2010), 4- 6 December, Singapore, pp. 517-520
[41] Cui, T., Ye, H., Teo,
H. H., & Li, J. (2015) "Information technology and open
innovation: A strategic alignment perspective". Information &
Management, vol. 52, pp. 348-358.
[42] Yu, S. Guo, S.
andStojmenovic, I. (2015) “Fool Me if You Can: Mimicking Attacks
and Anti-Attacks in Cyberspace,” IEEE Transactions on Computers,
vol. 64, no. 1, pp. 139–151.
Classification
Of Questions And Learning Outcome Statements (Los) Into Bloom’s Taxonomy (Bt) By
Similarity Measurements Towards Extracting Of Learning Outcome From Learning
Material
Shadi Diab1 and Badie Sartawi2
1Information and Communication Technology Center,
Al-Quds Open University, Ramallah – Palestine
2Associate Professor of Computer Science,
Al-Quds University, Jerusalem - Palestine
Abstract
Bloom’s Taxonomy (BT) have been used to classify the objectives of
learning outcome by dividing the learning into three different domains; the
cognitive domain, the effective domain and the psychomotor domain. In this
paper, we are introducing a new approach to classify the questions and learning
outcome statements (LOS) into Blooms taxonomy (BT) and to verify BT verb lists,
which are being cited and used by academicians to write questions and (LOS). An
experiment was designed to investigate the semantic relationship between the
action verbs used in both questions and LOS to obtain more accurate classification
of the levels of BT. A sample of 775 different action verbs collected from
different universities allows us to measure an accurate and clear-cut cognitive
level for the action verb. It is worth mentioning that natural language
processing techniques were used to develop our rules as to induce the questions
into chunks in order to extract the action verbs. Our proposed solution was
able to classify the action verb into a precise level of the cognitive domain.
We, on our side, have tested and evaluated our proposed solution using
confusion matrix. The results of evaluation tests yielded 97% for the macro
average of precision and 90% for F1. Thus, the outcome of the research suggests
that it is crucial to analyse and verify the action verbs cited and used by
academicians to write LOS and classify their questions based on blooms taxonomy
in order to obtain a definite and more accurate classification..
Keywords
Learning outcome; Natural
Language Processing, Similarity Measurement; Questions Classification
For More Details: http://aircconline.com/ijmit/V9N2/9317ijmit01.pdf
Volume Link: http://airccse.org/journal/ijmit/vol9.html
References
[1] Declan
Kennedy, Writing and using learning outcomes: a practical guide, Page 18, Cork:
University College Cork, 2006.
[2] EU,
Publications Office, Using learning outcome, European Qualifications Framework
Series: Note 4, Luxembourg: ISBN 978-92-79-21085-3, 2011 Page, 2010.
[3] Totschnig,
Michael, et al., "Repository services for outcome-based learning"
2010.
[4] Office Of
Institutional Effectiveness, Assessment Workbook For Academic Programs,
Richmond:
University Of
Richmond, 2008.
[5] Advancing
Academic Quality in Business Education Worldwide, Bloom’s Taxonomy of Educational
Objectives and Writing Intended Learning Outcomes Statements, Kansas: International
Assembly for Collegiate Business Education, 2016.
[6] M. D. Gall,
"The Use of Questions in Teaching," American Educational Research
Association, vol. 40, no. 5, pp. 707-721, 1970.
[7] D. R.
Krathwohl, A Revision of Bloom's Taxonomy:, College of Education, The Ohio
State University.
[8] Li and Roth,
Learning Question Classifiers, Illinois USA: 19th International Conference on Compuatational
Linguistics (COLING) 2002.
[9] Wen-Chih
Chang and Ming-Shun Chung, Automatic Applying Bloom's Taxonomy to Classify and Analysis
the cognition level of english questions items, Taiwan: IEEE, 2009.
[10] Sonal Jain
and Jyoti Pareek, Automatic extraction of prerequisites and learning outcome
from learning material, India: Inderscience Enterprises Ltd., 2013.
[11] Syahidah
Haris and Nazila Omar, A Rule-based Approach in Bloom’s Taxonomy Question Classification
through Natural Language, Malaysia, 2013.
[12] Syahidah
sufi haris and nazlia omar, Bloom's Taxonomy Question Categorization Using
Rules And N-Gram Approach, Malaysia: Journal of Theoretical and Applied
Information Technology, 2015.
[13] Payal
Biswas et al, Question Classification Using Syntactic And Rule Based Approach,
New Delhi: International Conference on Advances in Computing, Communications
and Informatics (ICACCI), 2014.
[14] Dell Zhang
et al, Question Classification using Support Vector Machines, Singapore: ACM
1-58113- 646-3/03/0007, 2003.
[15] Jibin Fu,
Two Level Question Classification Based on SVM and Question Semantic
Similarity, Beijing, China: International Conference on Electronic Computer
Technology, 2009.
[16] Anwar Ali
Yahya and Addin Osman, Automatic Classification Of Questions Into Bloom's Cognitive
Levels Using Support Vector Machines, Najran: Researchgate, 2011.
[17] K. J. et
al, An automatic classifer for exam questions with wordnet and cosine, International
Journal of Emerging Technologies in Learning (iJET) 11(04):142 • April 2016.
[18] Lingling
Meng et al, "A Review of Semantic Similarity Measures in WordNet,"
International Journal of Hybrid Information Technology, vol. 6, no. 1, p. 1,
2013.
[19] Siddharth
Patwardhan et al, "Using Measures of Semantic Relatedness for Word Sense Disambiguation,"
Springer, p. 241–257, 2003.
[20] G. V. e.
al, "Semantic Similarity Methods in WordNet and Their Application to
Information Retrieval on the Web," ACM New York, NY, USA ©2005, pp. 10-16,
2005.
[21] G. A. Miller,
"WordNet - A Lexical Database for English," Communications of the
ACM, vol. 38, no. 11, pp. 39-41, 2005.
International Journal of Managing Information Technology (IJMIT) Vol.9,
No.2, May 2017 12
[22] C. C. a. R.
Mihalcea, Measuring the Semantic Similarity of Texts, University of North
Texas:
University of
North Texas, 2005.
[23] Z. W. a. M.
Palmer, "VERB SEMANTICS AND LEXICAL SELECTION," in In Proceedings of
the 32nd Annual Meeting of the Associations for Computational Linguistics, Las
Cruces, New Mexico,,1994.
[24]
Virginia.ED, "Bloom's Taxonomy of Cognitive Skills with Action Verb List
Source," University of Verginia, 20 2 2017. [Online]. Available: http://avillage.web.virginia.edu/iaas/assess/resources/verblist.pdf.
[Accessed 20 2 2017].
[25] U. O. C.
Florida, "Bloom's Taxonomy," University of Central Florida, 20 2
2017. [Online]. Available: http://www.fctl.ucf.edu/teachingandlearningresources/coursedesign/bloomstaxonomy/.
[Accessed 20 2 2017].
[26] M. S.
University, "Bloom’s Taxonomy Action Verbs," Missouri State
University, 20 2 2017. [Online]. Available: https://www.missouristate.edu/assets/fctl/Blooms_Taxonomy_Action_Verbs.pdf.
[Accessed 20 2 2017].
[27] C. A.
College, "Bloom's Taxonomy Verbs," Central Arizona College, 20 2
2017. [Online]. Available: http://www.centralaz.edu/Documents/class/Bloom's%20Taxonomy%20Verbs%20Web.pdf.
[Accessed 20 2
2017].
[28] F.
Kugelman, "http://www.bloomstaxonomy.org/," 6 2 2017. [Online].
Available: http://www.bloomstaxonomy.org/BloomsTaxonomyquestions.pdf.
[Accessed 06 02 2017].
[29] Zaanen et
al, "Question classification by structure induction," in IJCAI'05
Proceedings of the 19th international joint conference on Artificial
intelligence, Edinburgh, Scotland , 2005.
[30] C. Adelman,
The Language and Syntax of Learning Outcomes Statements, National Institute for
Learning Outcomes Assessment, 2015.
[31] The Center
For Learning, Muskie Institute Center for Learning, University of Southern
Maine [Online]. Available: http://php.ipsiconnect.org/doc/VerbList.htm.
[Accessed 27 2 2017].
[32] Fresnostate
university, "Bloom’s Taxonomy Action Verbs," [Online]. Available: http://www.fresnostate.edu/academics/oie/documents/assesments/Blooms%20Level.pdf.
[Accessed 4 3 2017].
[33] K. Markham,
"Simple guide to confusion matrix terminology," dataschool, [Online].
Available: http://www.dataschool.io/simple-guide-to-confusion-matrix-terminology/.
[Accessed 07 03 2017].
[34] E. K. A. E.
L. Steven Bird, Natural Language Processing with Python, 2009: O’Reilly Media,
Inc., O’Reilly Media, Inc.
[35] R. Joshi,
"How to evaluate the performance of a model in Azure ML and understanding
“Confusion Metrics”," exsilio.com, 9 Septemper 2016. [Online]. Available: http://blog.exsilio.com/all/accuracyprecision-recall-f1-score-interpretation-of-performance-measures/.
[Accessed 2017 3 7].
Comments
Post a Comment