Osman, Mohd Hafeez
Unknown Affiliation

Published : 3 Documents Claim Missing Document
Claim Missing Document
Check
Articles

Found 3 Documents
Search

Issues in Chinese Requirements Specifications: Insights from Survey Data and Static Analysis Jiaying, He; Yap, Ng Keng; Osman, Mohd Hafeez; Hassan, Sa’adah
JOIV : International Journal on Informatics Visualization Vol 8, No 4 (2024)
Publisher : Society of Visual Informatics

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62527/joiv.8.4.3667

Abstract

Requirements engineering is crucial for software project success. Issues like requirements ambiguity, inconsistency, and unverifiability contribute to unclear, conflicting, or untestable specifications, which can undermine the effectiveness and success of a software project. These issues have been identified as factors contributing to software project failure. However, there’s limited research on the current state of these issues in China. The research objectives of this study are to address the most commonly used methods for expressing Chinese software requirements and uncover issues related to ambiguity, inconsistency, and unverifiability, which can be solved by using artificial intelligence techniques to investigate possible solutions to these problems. An online survey of 422 software professionals in China identifies key issues in Chinese software requirement expressions that AI techniques can address. The study examines various expression methods, tools for enhancing clarity, and challenges specific to Chinese requirements. Findings reveal that ambiguity, inconsistency, and unverifiability significantly impact project success. While natural language specification and prototyping improve clarity, they may increase the time required for requirements engineering. Effective communication is typically achieved through natural language, prototyping, storyboarding, and pseudo-coding, whereas decision tables and block diagrams are less commonly used and linked to problematic requirements. Using tables, prototype diagrams, and natural language descriptions helps mitigate these issues, though it may extend engineering time. The study suggests strategies to improve the efficiency and quality of requirements expression and highlights the need to develop Chinese boilerplates and refining tools to enhance clarity in the future.
Application of Artificial Intelligence in Detecting SQL Injection Attacks Augustine, Nwabudike; Md. Sultan, Abu Bakar; Osman, Mohd Hafeez; Sharif, Khaironi Yatim
JOIV : International Journal on Informatics Visualization Vol 8, No 4 (2024)
Publisher : Society of Visual Informatics

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62527/joiv.8.4.3631

Abstract

SQL injection attacks rank among the most significant threats to data security. While AI and machine learning have advanced considerably, their application in cybersecurity remains relatively undeveloped. This work mainly aims to solve the IT-related challenge of insufficient knowledge bases and tools for security practitioners to monitor and mitigate SQL Injection attacks with AI/ML techniques. The study uses a mixed-methods approach to evaluate how well different AI and ML algorithms identify SQL injection attacks by combining algorithmic evaluation with empirical investigation. Datasets of well-known SQL injection attack patterns and AI/ML models intended for cybersecurity anomaly detection are among the resources underexplored; these findings show the potential for boosting detection capabilities by deploying ML and AI-based security solutions; specific algorithms have demonstrated success rates of up to 80% in detecting SQL injections. Despite this promising performance, around 75% of survey participants acknowledged a decrease in harmful content, with a similar number highlighting increased efficiency in their roles as security researchers or incident responders. Nevertheless, the tool’s adoption among cybersecurity professionals remains under 30%. This underscores a gap between the capabilities these technologies offer and their current level of adoption among professionals. This will help lay the groundwork for future work in identifying the best solutions and providing potential approaches to incorporating AI/ML into cybersecurity frameworks. The implications of this study indicate that adopting robust defenses against SQL injection and other cyber threats could increase many folds if we continue to research and implement AI ML. technologies.
A Review on Classifying and Prioritizing User Review-Based Software Requirements Salleh, Amran; Said, Mar Yah; Osman, Mohd Hafeez; Hassan, Sa’adah
JOIV : International Journal on Informatics Visualization Vol 8, No 3-2 (2024): IT for Global Goals: Building a Sustainable Tomorrow
Publisher : Society of Visual Informatics

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62527/joiv.8.3-2.3450

Abstract

User reviews are a valuable source of feedback for software developers, as they contain user requirements, opinions, and expectations regarding app usage, including dislikes, feature requests, and reporting bugs. However, extracting and analyzing user requirements from user reviews is ineffective due to the large volume, unstructured nature, and varying quality of the reviews. Therefore, further research is not just necessary but crucial to effectively explore methods to gather informative and meaningful user feedback. This study aims to investigate, analyze, and summarize the methods of requirement classification and prioritization techniques derived from user reviews. This review revealed that leveraging opinion mining, sentiment analysis, natural language processing, or any stacking technique can significantly enhance the extraction and classification processes. Additionally, an updated matrix taxonomy has been developed based on a combination of definitions from various studies to classify user reviews into four main categories: information seeking, feature request, problem discovery, and information giving. Furthermore, we identified Naive Bayes, SVM, and Neural Networks algorithms as dependable and suitable for requirement classification and prioritization tasks. The study also introduced a new 4-tuple pattern for efficient requirement prioritization, which included elicitation technique, requirement classification, additional factors, and higher range priority value. This study highlights the need for better tools to handle complex user reviews. Investigating the potential of emerging machine learning models and algorithms to improve classification and prioritization accuracy is crucial. Additionally, further research should explore automated classification to enhance efficiency.