Forthcoming articles

 


International Journal of Digital Enterprise Technology

 

These articles have been peer-reviewed and accepted for publication in IJDET, but are pending final changes, are not yet published and may not appear here in their final order of publication until they are assigned to issues. Therefore, the content conforms to our standards but the presentation (e.g. typesetting and proof-reading) is not necessarily up to the Inderscience standard. Additionally, titles, authors, abstracts and keywords may change before publication. Articles will not be published until the final proofs are validated by their authors.

 

Forthcoming articles must be purchased for the purposes of research, teaching and private study only. These articles can be cited using the expression "in press". For example: Smith, J. (in press). Article Title. Journal Title.

 

Articles marked with this shopping trolley icon are available for purchase - click on the icon to send an email request to purchase.

 

Articles marked with this Open Access icon are freely available and openly accessible to all without any restriction except the ones stated in their respective CC licenses.

 

Register for our alerting service, which notifies you by email when new issues of IJDET are published online.

 

We also offer RSS feeds which provide timely updates of tables of contents, newly published articles and calls for papers.

 

International Journal of Digital Enterprise Technology (7 papers in press)

 

Regular Issues

 

  • Phishing Classification Models: Issues and Perspectives   Order a copy of this article
    by Hiba Zuhair, Ali Selamat 
    Abstract: The never-ending threats of phishing to the cyberspace motivate researchers to develop more proficient phishing classification models for the survival of cyber-security with safe web services. However, these models remain variable in their reaction and incompetent in their performance against novel phishes at the real-time of application. This is attributed to their partial or full deficiency of inductive factors including a rich set of decisive features, actively learned and adaptive machine learning based classification model. Upon this issue, our paper revisits the current machine learning-based phishing classification models and analyzes their performance qualitatively and quantitatively across three benchmarking data sets. Empirical results and observations emphasized the causality between the models limitations and their lack of inductive factors. Accordingly, future outlooks are recommended as a navigating taxonomy to serve the researchers at developing their upcoming achievements in both academia and industry.
    Keywords: novel phish; feature-based classification; active learning; adaptive classification model.

  • An experiment in blended learning: higher education without lectures?   Order a copy of this article
    by Kevin Jones, Ravi Sharma 
    Abstract: This paper chronicles a 10-year effort to introduce blended learning into a course on software engineering in a computer engineering programme at a leading technological university. In this environment, there was a longstanding tradition of technology-enabled teaching and learning. The infrastructure was state-of-the-art and stable. Hence both teachers and students were familiar with the idea of online (or computer mediated) courses. Despite this the longitudinal experiment did not proceed as could be expected. Technically, there were few problems; but the socio-technical context required the buy-in of administrators as well as behavioural changes from teachers and learners. The research conducted unearthed a host of such issues, challenges, and conundrums. Indeed, universities need to keep in mind that education is a changing journey, not a prescribed destination. A paradigm shift in instructional design is underway. Learners, teachers and administrators must reinvent themselves to harness the positive in this disruptive innovation that is labelled blended learning. Arguably an instance of the so-called flipped classroom, blended learning combines technology-mediated dissemination of content with face-to-face, and often peer, interactions in problem-based learning. The bad news is that blended learning does not lead to cheaper and better delivery outcomes. But the good news is that it make higher education more accessible and hence equitable.
    Keywords: educational technology; online learning; instructional design.

  • Application of Universal Remote Control of Non Smart Home Appliances for Smart Home Concepts   Order a copy of this article
    by Ondrej Krejcar, Jan Dvorak 
    Abstract: Smart Homes concept are widely used nowadays as well as many different standards and technologies exist which enable to remote control of almost every home appliances. In this paper we would like to address universal solution of remote control based on available widely used hardware solution which allow to connect not only current appliances from different producers, but also older appliances which support only the handling via a controller on the basis of infrared transfer. Finally these Non Smart Home Appliances are going to be integrated in whole Smart Environment and also be as smart as other new appliances. The part of the solution is the interface for the connection of the application to current Smart Home systems and an intelligent recognition and an automatization of users actions with controllers. The result of the implementation is a functional prototype with all required design (PCB) and implementation. User testing also confirm the amount of time saved by using such device instead of original Non Smart or not connected Smart ones.
    Keywords: Smart Home; Infrared; Remote Control; Automation; Mobile; Multimedia.

  • Systematic Literature Review and Taxonomy for DDoS Attack Detection and Prediction   Order a copy of this article
    by Ahmad Riza Ain Yusof, Nur Izura Udzir, Ali Selamat 
    Abstract: Distributed Denial of Service (DDoS) attack has been significantly discussed in the computer security domain, particularly due to the damaging effects it causes to organizations assets. However,it confront the challenge under massive growth of Internet user traffic and lightning speed of computer access.In this paper, we present a comprehensive systematic review and measurement analysis of the DDoS impact, including (a) DDoS definition, (b) types of DDoS attack, (c) various types of existing DDoS detecting techniques and (d) different kinds of DDoS attack prediction techniques. Furthermore, drawing upon this analysis, we discuss the advantages and the drawbacks of DDoS detection technique, to understand how technical community can response more effectively to such attacks in the future.
    Keywords: Distributed Denial of Services Attack (DDoS); intrusion detection system; DDoS attack prediction.

  • Analyzing Malware Log Files for Internet Investigation Using Hadoop Platform   Order a copy of this article
    by Saiful Adli Ismail 
    Abstract: On the Internet, malicious software (malware) is one of the most serious threats to system security. Major complex issues and problems on any software systems are frequently caused by malware. Malware can infect any computer software that has connection to Internet infrastructure. There are many types of malware and some of the popular malwares are botnet, trojans, viruses, spyware and adware. Internet users with lesser knowledge on the malware threats are susceptible to this issue. To protect and prevent the computer and Internet users from exposing themselves towards malware attacks, identifying the attacks through investigating malware log file is an essential step to curb this threat. The log file exposes crucial information in identifying the malware, such as algorithm and functional characteristic, the network interaction between the source and the destination, and type of malware. By nature, the log file size is humongous and requires the investigation process to be executed on faster and stable platform such as big data environment. In this study, the authors had adopted Hadoop, an open source software framework to process and extract the information from the malware log files that obtains from universitys security equipment. The Python program was used for data transformation then analysed the information in Hadoop simulation environment. The analysis includes assessing reduction of log files size, performance of execution time and data visualisation using Microsoft Power BI (Business Intelligence). As the results of the analysis, 50% and 60% from the two (2) original malware log files size were significantly reduced respectively, while the total execution time would not increase linearly with the size of the data in Hadoop simulation environment. The information will be used for further prevention and protection from malware threats in universitys network.
    Keywords: Internet security; Types of Malware; Malware log files; Big Data environment; Hadoop environment; Log file processing; Log files in Hadoop.

  • An orchestration framework for monitoring and analysis of container based logs and systems   Order a copy of this article
    by Rajendar Kandan, Fairus Khalid Mohammad, Bukhary Ikhwan Ismail, Ehsan Mostajeran Goortani, Hishamadie Ahmad, Mohd Nizam Mohd Mydin, Hong Ong Hoe 
    Abstract: Container technology provides a rapid way of running applications and hence draws it attention to recent times. Container applications are smaller in size and much flexible in management compared to traditional virtual machines. Since containers are non-persistence, the complexity of application logs also increases when more number of container instances deployed across a cluster of hosts. Even with wide range of log management tools available for containers, it requires a combination of few tools for providing a complete logging solution. Thus, it requires a framework which could orchestrate and identify the status of each integrated tools for providing smooth functioning across the entire log system. In this paper, we discussed about the implementation of our orchestration framework, configuration details for communication across log systems and case study.
    Keywords: Log management; container; orchestration.

  • A Comparison of Halal Inspection Process between Federal and State Halal Certification Body in Malaysia   Order a copy of this article
    by Mohd Zabiedy Mohd Sulaiman, Nurulhuda Noordin, Nor Laila Md Noor, Ahmad Iqbal Hakim Suhaimi, Wan Abdul Rahim Wan Mohd Isa 
    Abstract: The rising demand for halal certified products and services is due to the rapid growth of the worlds Muslims population. Halal certification has become an important system for the award of the halal status to product and services. The halal certification systems need to follow the sharia or the Islamic law diligently to ensure that products and services to be certified are in compliance with Islamic law. Halal inspection is the key component that details out the sharia compliance and failure to do so is detrimental to the compliance. As the worldwide demand for halal certified products and services grows, there is a pressing need to have efficient and effective halal certification systems to serve the worldwide Muslim community through several certification bodies. Halal inspection poses a challenge as the different sects of Muslims may have different interpretations of halal inspection and resources needed to perform halal inspection in countries where Muslims are minorities may be limited. To understand the situation further, it is important to identify issues of halal inspection among different Halal Certification Bodies. Malaysia is a leading halal certification provider and exemplifies the situation where halal certification is administered by different organizational bodies as halal certification is awarded by both federal and state level Islamic bodies. A study on the issues and problems of federal and state level halal certification practices can help gain an understanding of the situation. The aim of halal inspection study is to investigate the issues and differences in the practices of halal inspection between the federal and state Halal Certification Body in Malaysia. This study employs a qualitative approach using interviews with halal certification experts. The findings identify several problems in halal inspection between both levels that may influence the halal certification efficiency. The outcome will be helpful in the search for an improved technique to utilize information technology to empower the existing certification systems.
    Keywords: Halal Inspection; Halal Certification; Halal Industry; Halal Certification Body; Halal Authority; Information Technology; Malaysia.