p-Index From 2021 - 2026
6.333
P-Index
This Author published in this journals
All Journal KOMUNIKE: Jurnal Komunikasi Penyiaran Islam KEUNIS JIPI (Jurnal Ilmiah Penelitian dan Pembelajaran Informatika) Jurnal Ilmiah Dinamika Sosial Jurnal Ilmiah Manajemen dan Bisnis Jurnal Ilmiah Akuntansi dan Bisnis Open Access Indonesia Journal of Social Sciences Jurnal Analisis Hukum Journal of Education and Teaching Learning Open Access Indonesia Journal of Social Sciences TIERS Information Technology Journal Jurnal Ilmiah Telsinas Elektro, Sipil dan Teknik Informasi International Journal Software Engineering and Computer Science (IJSECS) Journal of Digital Learning and Distance Education International Journal on Advanced Technology, Engineering, and Information System (IJATEIS) Journal of Artificial Intelligence and Digital Business Room of Civil Society Development APLIKATIF: Journal of Research Trends in Social Sciences and Humanities Indonesian Journal of Multidisciplinary on Social and Technology International Journal of Multidisciplinary Approach Research and Science Journal of Education Method and Learning Strategy Educative: Jurnal Ilmiah Pendidikan Jurnal Ilmiah Multidisiplin Indonesia Jurnal Riset Multidisiplin dan Inovasi Teknologi Journal of Community Service and Society Empowerment Journal of Social Science Utilizing Technology Journal of Language Education International Journal of Integrated Science and Technology Journal of Advanced Computer Knowledge and Algorithms Journal of Social Science Utilizing Technology EDUTREND: Journal of Emerging Issues and Trends in Education Room of Civil Social Development Digitus : Journal of Computer Science Applications
Claim Missing Document
Check
Articles

Integrating Blockchain Technology for Secure E-Government Services: Opportunities and Challenges Hakimi, Musawer; Rahmani, Khoshal Rahman; Ezam, Zakirullah; Shahbazi, Hafizullah
Journal of Social Science Utilizing Technology Vol. 2 No. 3 (2024)
Publisher : Yayasan Pendidikan Islam Daarut Thufulah

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.70177/jssut.v2i3.1266

Abstract

Background. Blockchain technology offers tremendous promise for achieving higher levels of security, transparency, and efficiency in e?government service delivery. Governments around the world are actively pursuing the possibilities at stake, and understanding the opportunities and challenges becomes imperative for adoption. Purpose. This research will focus on how blockchain technology is incorporated into e-government services to increase security, economic benefits through integration with AI, improved activities on database performance by machine learning, ethical perspectives, and implications on future research. Method. A literature review was carried out mainly on databases including IEEE Xplore, ACM Digital Library, Scopus, Science Direct, Springer, and Google Scholar for papers dating from 2018 to 2024. Results. Key findings and insights were, therefore, extracted to give a full view of the envisaged blockchain role in government. Blockchain technology provides integrity, transparency, and decentralized governance to improve the security of e-government. Realization of economic impacts shall be seen through operational efficiency and cost savings, again through artificial intelligence in this integration. Conclusion. Machine learning algorithms bring optimality to database performance, enhancing scalability and responsiveness in large-scale applications of e-government. Essentially, ethics consider aspects of privacy, security, and public trust, which naturally would call for very strong regulatory frameworks and privacy-preserving mechanisms. Such integration of blockchain into e-government hence opens up a window of opportunity to change the operation, service delivery, and citizen engagement in the public sector. Such a study invites the implementation of R&D in recreating new adaptable regulatory frameworks, capacity building, and proactive public awareness campaigns. It also points out future research needs in the area of scalability solutions, interoperability, construction of privacy-preserving mechanisms, impact assessment, and successful governance models.
The Transformative Power of Information and Communication Technology in Empowering Women in Afghanistan Hakimi, Musawer; Quchi, Mohammad Mustafa; Hasas, Ansarullah; Fazil, Abdul Wajid
Journal of Social Science Utilizing Technology Vol. 2 No. 1 (2024)
Publisher : Yayasan Pendidikan Islam Daarut Thufulah

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.70177/jssut.v2i1.702

Abstract

Background. This research addresses the intersection of Information and Communication Technology (ICT) and women’s empowerment in Afghanistan, aligning with global initiatives and Sustainable Development Goals (SDGs). The study aims to provide nuanced insights into the multifaceted impact of ICT on financial independence, economic empowerment, and health outcomes among Afghan women. Purpose. The research employs a purposive sampling method, involving 170 participants from diverse regions in Afghanistan to ensure representation from areas with varying socio-economic and cultural characteristics. Through a mixed-methods approach, including structured surveys and qualitative analysis, the study seeks to understand the perceptions of ICT and its experiences with women’s empowerment. Method. Structured surveys cover demographics, ICT perceptions, and women’s empowerment experiences. Qualitative data undergo thematic analysis, while quantitative analysis utilizes statistical methods such as ANOVA, logistic regression, chi-square tests, binomial tests, and descriptive statistics. Results. The findings underscore a consensus among participants on the positive impact of ICT, particularly on financial independence, economic empowerment, and health outcomes. Associations between telemedicine, digital health, and improved women’s health are identified. Binomial tests highlight success in bridging the digital gender gap and enhancing awareness. Positive perceptions of social media, online communities, and digital advocacy in promoting gender equality are revealed through descriptive statistics. Conclusion. This study contributes novel insights by comprehensively examining the impact of ICT on women’s empowerment in Afghanistan, covering diverse dimensions such as financial independence, economic empowerment, and health outcomes. The robust mixed-methods approach yields unique findings that enrich the existing literature on ICT and women’s empowerment.
A Comprehensive Review of Cybersecurity Measures in the IoT Era Ahmady, Ezatullah; Mojadadi, Abdul Rahman; Hakimi, Musawer
Journal of Social Science Utilizing Technology Vol. 2 No. 1 (2024)
Publisher : Yayasan Pendidikan Islam Daarut Thufulah

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.70177/jssut.v2i1.722

Abstract

Background. This research presents a comprehensive review of cybersecurity measures in the Internet of Things (IoT) era. The primary focus is on elucidating the evolving landscape of IoT cybersecurity, with specific attention to the integration of Artificial Intelligence (AI), machine learning, and risk management. The study aims to identify key advancements, challenges, and opportunities in securing interconnected devices, offering valuable insights for researchers, policymakers, and industry professionals. Purpose. Employing a hybrid methodological design that combines elements from narrative synthesis and heuristic analysis, this study utilizes purposive and snowball sampling techniques to select diverse and pertinent sources. The integration of semantic analysis, leveraging natural language processing algorithms, enriches data interpretation. Collaborative intelligence from cybersecurity, machine learning, and IoT experts enhances the study's perspective. A proprietary algorithm, incorporating machine learning principles, enhances data collection efficiency. Method. The synthesis reveals a dynamic landscape marked by the symbiotic relationship between AI and IoT, fortifying defenses against cyber threats. Machine learning emerges as a potent ally, providing robust solutions for threat detection. The study identifies challenges in implementing cybersecurity measures in the IoT landscape, including data privacy, scalability, and regulatory compliance. Results. In conclusion, the review emphasizes the need for proactive and adaptive security strategies in the IoT era, highlighting the role of AI and collaborative interdisciplinary approaches. The study provides a roadmap for future research, policy formulation, and industry practices to fortify the security posture of the IoT ecosystem. Conclusion. This study has comprehensive review of IoT cybersecurity illuminates a dynamic landscape marked by the symbiotic relationship between Artificial Intelligence (AI) and the Internet of Things (IoT). The integration of AI signifies a paradigm shift towards proactive and adaptive security strategies, enhancing the resilience of IoT ecosystems against evolving cyber threats.
IMPROVING DIGITAL LEARNING: EVALUATING THE U LEARN LMS WITH THE SYSTEM USABILITY SCALE Sudestra, I Made Ardi; Agustini, Ni Wayan Eva; Gunawan, I Made Agus Oka; Indrawan, Gede; Hakimi, Musawer
JIPI (Jurnal Ilmiah Penelitian dan Pembelajaran Informatika) Vol 9, No 4 (2024)
Publisher : STKIP PGRI Tulungagung

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.29100/jipi.v9i4.6910

Abstract

The assessment of the usability of online learning systems is becoming more and more critical in order to ensure that users have the best possible experience. This study employed the System Usability Scale (SUS) to assess the usability of the learning management system at UNDIKNAS, using 68 students from various academic programs as participants. The employed methodology is administering a SUS questionnaire consisting of 10 items on a Likert scale from 1 to 5. The points are computed using the standard SUS methodology and multiplied by 2.5 to derive the final score. The analysis disclosed an average SUS score of 56.65, falling short of the academic usability benchmark 68. The score distribution visualization indicated that most respondents rated between 50 and 60, highlighting the need for system improvement. The SUS assessment of the learning management system at UNDIKNAS reveals that the system's usability necessitates improvement. Key recommendations include improving the user interface, optimizing navigation, and providing user guides to enhance the overall user experience
Revolutionizing Technology Education with Artificial Intelligence and Machine Learning: A Comprehensive Systematic Literature Review Hakimi, Musawer; Zarinkhail, Mohammad Shuaib; Ghafory, Hamayoon; Hamidi, Shir Ahmad
TIERS Information Technology Journal Vol. 5 No. 2 (2024)
Publisher : Universitas Pendidikan Nasional

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.38043/tiers.v6i2.5640

Abstract

Machine learning and artificial intelligence in education will help to personalize the student learning process, reduce the time wastage in imploding administration systems, and innovate teaching methods. The article reports the findings of a study on the effects of these technologies on the educational systems of application, benefits, and challenges and looks forward to the implications. This has been realized through a systematic review of peer-reviewed journal articles, government reports, and policy documents published between 2021 and 2024. Results show great benefits, including enhanced personalized learning experiences and administrative efficiencies, but also highlight several challenges, such as equitable access, data privacy, and the need for professional development of educators. Rather, this research outlines the imperatives that there is a need to address challenges for the realization of the potential of AI and ML in education. The paper makes recommendations for key stakeholders and points out areas for possible future research to guide sustainable and ethical integration into educational systems. Further research should be done to understand whether these technologies affect student outcomes in the long term and are applicable with the same efficacy in other cultural and socioeconomic contexts.
Experimental Comparison of Encryption Algorithms On Smart Devices Frugh, Qurban Ali; Naseri, Mohammad Fahim; Hakimi, Musawer
TIERS Information Technology Journal Vol. 5 No. 2 (2024)
Publisher : Universitas Pendidikan Nasional

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.38043/tiers.v5i2.6039

Abstract

Now, the technological environments rely on a large number of users and devices interconnected in such a way as to be able to share information and exchange resources. For such reasons, security becomes of prime importance inside these networks. Especially, encryption algorithms widely used in smart metering systems form the very backbone of ensuring security. It is unique according to every single parameter: the level of security achieved, speed, operational complexity, length, and type of key used. A comparison of performance and throughput for the most used encryption algorithms, such as AES-128, AES-192, RC4, Blowfish, and ECDSA, is presented here. Such devices, for instance, smart meters, usually represent very resource-constrained computational capability, memory, and data transfer. For these reasons, the experiments investigate performance impacts of using different encryption algorithms on a smart meter environment in a scaled setup. Experiments were run on a laptop device and then downscaled according to the limitation characteristics of the smart meter target device. As for the scaling, it has been performed concerning key factors: CPU of the smart meter, RAM, and cache memory. Execution times of the encryption and decryption processes were measured, as well as the throughput of messages for various file sizes. Quantitative key results obtained included: RC4 with a throughput of 25.37 Kbytes/sec, whereas AES-128 has 4.87 Kbytes/sec, while in ECDSA-256 the performance is much lower: its verification throughput amounts to 0.0023 Kbytes/sec. The results showed significant variations in performance, speed, and throughput between these algorithms. Even considering small smart devices, the encryption and decryption processes yielded efficient throughputs. These findings underscore the importance of choosing the right encryption algorithm for smart meters, balancing both security requirements and resource limitations to ensure optimal performance.
Human factors in cybersecurity: an in depth analysis of user centric studies Hakimi, Musawer; Mohammad Mustafa Quchi; Abdul Wajid Fazil
Jurnal Ilmiah Multidisiplin Indonesia (JIM-ID) Vol. 3 No. 01 (2024): Jurnal Ilmiah Multidisiplin Indonesia (JIM-ID), January
Publisher : Sean Institute

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.58471/esaprom.v3i01.3832

Abstract

This study delves into the intricate intersection of human behavior, cognition, and technology within the cybersecurity domain, aiming to enhance our understanding of the human-centric challenges influencing the effectiveness of cybersecurity measures. The primary objective is to unravel the nuanced landscape where human errors persist as a significant contributing factor to security breaches, emphasizing the need for a holistic comprehension of human factors. The study recognizes the evolving nature of work, with an increasing number of individuals operating from home, and the consequential challenges in managing human factors in the digital era. The blurring lines between private and public lives, coupled with the rise of social credit systems, necessitate a thorough examination of key elements intersecting with cybersecurity Employing a systematic literature review, this research methodically identifies, filters, and analyzes pertinent literature concerning human-centric factors in cybersecurity. The systematic approach involves the formulation of specific research questions guiding the study, strategic search plans targeting reputable databases, and meticulous study selection processes based on predefined criteria The study unfolds through a series of interconnected research questions, addressing the impact of human factors on operational efficiency, challenges in the adoption of human-centric approaches, and the ways in which human factors influence strategic decision-making in cybersecurity. The results shed light on the substantial contribution of understanding user behavior and cognitive processes to the development of tailored cybersecurity strategies. Challenges, such as security fatigue and the scarcity of psychology-based professionals, are addressed, advocating for human factors engineering and strategic initiatives to enhance education and training programs. In conclusion, embracing a human-centric paradigm emerges as imperative for organizations striving to fortify their defenses against dynamic and sophisticated cyber threats. Integrating technology with a profound understanding of human factors becomes the cornerstone for shaping a resilient and adaptive cybersecurity future.
Metaverse Security Challenges and Solutions: A Comprehensive Analysis of Contemporary Technologies Rahimi, Nasrallah; Hakimi, Musawer; Rahmani, Khoshal; Rastagari, Mohammad Aziz; Danish, Jawad; Shahbazi, Hafizullah
INTERNATIONAL JOURNAL ON ADVANCED TECHNOLOGY, ENGINEERING, AND INFORMATION SYSTEM Vol. 4 No. 1 (2025): FEBRUARY
Publisher : Transpublika Publisher

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.55047/ijateis.v4i1.1674

Abstract

The metaverse, the virtual world integrating augmented reality, virtual reality, and other digital technologies, poses tremendous opportunities and challenges regarding security, privacy, and governance. With digital worlds such as the metaverse beginning to take place, user-generated content and user interaction are proving to be more and more a daunting task. In this paper, the metaverse security challenge is discussed and some proposals and recommendations are formulated. This study used a mixed-methods approach and surveyed data from 85 students, lecturers, and technical professionals who were interested in information technology. Quantitative data were captured through structured questionnaires and surveys, and processed in SPSS, and qualitative data were elicited through thematic analysis. The results suggest strong support for the metaverse, yet raise concerns for technical limitations, privacy issues and environmental impacts. Technical problems like hardware requirements and system lag were discovered by 50% of the respondents to be significant barriers, 12% mentioned privacy and security concerns as barriers, and 7% reported other types of barriers such as access issues. Most respondents were concerned that the metaverse was not very safe but reported areas for improvement. The study advises stricter regulation, better legislation on data privacy, and a better reporting mechanism to combat online abuse. Therefore, the work adds to a new metaverse security literature and provides applied policy, governance, and space-building lessons. With the expansion and further development of the metaverse, future research will be required to deconstruct these dimensions more extensively.
E-Learning Adoption in Afghanistan Universities (2019-2024): A Systematic Review of Implementation, Challenges, and Future Direction Musawi, Sayed Zabihullah; Hakimi, Musawer; Nasrat, Abdulfatah; Rahmani, Khoshal Rahman; Khaliqyar, Khudai Qul; Fazil, Abdul Wajid
INTERNATIONAL JOURNAL ON ADVANCED TECHNOLOGY, ENGINEERING, AND INFORMATION SYSTEM Vol. 4 No. 1 (2025): FEBRUARY
Publisher : Transpublika Publisher

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.55047/ijateis.v4i1.1678

Abstract

E-learning is an approach that delivers education using digital means, wherein students access classes and resources over web-enabled devices. The study examines the integration of e-learning within Afghanistan's higher education system through a subjective research study by reviewing available literature published between 2019 and 2024 and extracted from databases such as IEEE, Springer, Science Direct, Research Gate, and Scopus. The results highlight several infrastructure barriers considered critical, which include a lack of ICT skills among both teachers and students, unstable internet access, unstable power supply situations, and a dependence on the traditional model of teaching. In addition, socio-political instability and inconsistent policies have further acted as impediments to the mass-level acceptance of e-learning.  Despite these challenges, e-learning offers opportunities for flexibility, access to different resources, and the integration of innovative teaching techniques. Cloud-based tools have proven beneficial during interruptions such as the COVID-19 pandemic, which helped in continuing education with minor interruptions. E-learning encourages independent learning and improves digital literacy, but at the same time, teachers face challenges in engaging students and supporting skill development. The disparity in internet access between the urban and rural areas aggravates the problem even further, whereby cities have more access as compared to the countryside. The study further notes that the present-day government strategies are limited in addressing e-learning, as they do not have a coherent policy framework and suffer from lack of infrastructural support. Investments in technology and teacher training are an urgent need to improve e-learning in Afghanistan.
Integrating IoT in Healthcare Systems: A Socio-Technical Approach to Improving Healthcare Delivery in Afghanistan Jawad Danish; Abdul Wahid Samadzai; Hakimi, Musawer; Mohammad Aziz Rastagari
APLIKATIF: Journal of Research Trends in Social Sciences and Humanities Vol. 4 No. 1 (2025): APLIKATIF: Journal of Research Trends in Social Sciences and Humanities
Publisher : Lembaga Junal dan Publikasi, Universitas Muhammadiyah Buton

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.59110/aplikatif.v4i1.566

Abstract

The integration with the Internet of Things (IoT) technology with health systems shows a strong potential to re¬invent at least the developed areas of Afghanistan. The study is focused on the perceptions, challenges and willingness of the stakeholders to identify the potential benefits, barriers and strategies to implement IoT-based Health monitoring systems. So, this study uses a mixed-method research approach. A cross-sectional web-based survey was conducted, with 150 possible participants (stakeholders), including healthcare professionals and computer scientists. The survey confirmed acquainting individuals with IoT, their perceived benefits of IoT, possible challenges and willingness of the participants to adopt IoT in the context mentioned above. Main data analyses included descriptive statistics, crosstabs and regression analysis results using the SPSS data processing software. The findings demonstrated that 73.33% of the respondents assumed IoT to improve health monitoring and about 80% showed willingness to adopt IoT. According to this study, the major challenges mentioned by respondents are lack of infrastructure, data security issues, and costs involved. It was identified that In the regression analysis (R²=0.82), benefit, familiarity, and awareness of IoT technology positively influenced willingness to adopt. Integration was supported by younger and better-educated people. As a result, we will consider gap closing the infrastructure, strengthening data security and raising awareness through direct educational campaigns as a priority area for ensuring the success of IoT adoption. The results of the study highlight aspects which may come handy for the policymakers and health care practitioners to facilitate its adoption in a cost-effective and culture-sensitive manner to address the health particularities of the developing nations.
Co-Authors Abdul Wahid Samadzai Abdul Wajid Fazil Abidullah, Adel Adhi, Nurseto Afifi, Sara Agustini, Ni Wayan Eva Ahmadi, Lima Ahmady, Ezatullah Akrami, Fazila Akrami, Khatera Akrami, Mursal Amir Kror Shahidzay Amiri, Frishta Amiri, Ghulam Ali Aslamzai, Sebghatullah Azimy, Abdul Shakoor Barge Gul Khalili Behnaz Rahimi Danish, Jawad Daudzai, Mehriya Enayat, Wahidullah Ezam, Zakirullah Farid, Ahmad Salman Fazil, Abdul Wajid Fazila AKRAMI Frishta Amiri Frugh, Qurban Ali Gede Indrawan Ghafory, Hamayoon Ghiasi, Zaynab Hakimi, Faiz Mohammad Hakimi, Nargis Hakimi, Samer Hakimi, Shohib Halimi, Yalda Hamidi, Shir Ahmad Hasas, Ansarullah Hejran, Muska Himmat, Bilal Hussaini, Mohammad Fawad I Made Agus Oka Gunawan I Wayan Aditya Suranata Jawad Danish Katebzadah, Shairagha Khaliqyar, Khudai Qul Khani, Atefeh Mohammad Khatera AKRAMI Kohistani, Ahmad Jamy Maliha AHRARI Marpaung, Rosanna Mirwali Azizi Mohammad Aziz Rastagari Mohammad Mustafa Quchi Mohammadi, Farida Gul Mojadadi, Abdul Rahman Mursal AKRAMI Musaka Hejran Musawi, Sayed Zabihullah Naderi, Zuhoruddin Nadry, Zabihullah Najieb, Khairullah Naseri, Mohammad Fahim Nasrat, Abdulfatah Pangaribuan, Jontra Jusat Popal, Zekrullah Puspaningrum, Lintang Diah Qarizada, Abdulkhaliq Qasemi, Parisa Quchi, Mohammad Mustafa Quraishi, Tamana Quraishi, Tamann Quraishi, Tamanna Rahimi, Behnaz Rahimi, Nasrallah Rahmani, Khoshal Rahmani, Khoshal Rahman Rajaee, Sayed Mohammad Kazim Rastagari, Mohammad Aziz Rosyadi, Arfian Dwiki Sahnosh, Faqeed Ahmad Sajid, Saidamin Samadzai, Abdul Wahid Sediqi, Mateeullah Shahbazi, Hafizullah Shahidzay, Amir Kror Sirat, Abdul Wali Sudestra, I Made Ardi Sujacka Retno Tarashtwal, Omid Ulusi, Helena Wadeed, Wali Mohammad Zahid, Nabila Zarinkhail, Mohammad Shuaib Zarinkhail, Shuaib