Phang, Eaqerzilla
Unknown Affiliation

Published : 2 Documents Claim Missing Document
Claim Missing Document
Check
Articles

Found 2 Documents
Search

Secure Agent-Oriented Modelling with Web-based Security Application Development Limpan, Macklin Ak; Wai Shiang, Cheah; Phang, Eaqerzilla; bin Khairuddin, Muhammad Asyraf; bt Jali, Nurfauza
JOIV : International Journal on Informatics Visualization Vol 8, No 1 (2024)
Publisher : Society of Visual Informatics

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62527/joiv.8.1.2180

Abstract

Nowadays, privacy and security have become challenges in developing web-based applications. For example, e-commerce applications are threatened with security issues like scammers, SQL injection attacks, bots, DDOs, Server Security, and Phishing. Although various security requirement methodologies are introduced, it has been reported that security consideration is consistently ignored or treated as the lowest priority during the application development process. Hence, the application is being violated by various security attacks. This paper introduces an alternative methodology to secure a web-based application through an Agent-Oriented Modelling extension. The secure AOM starts with Context and Asset Identification. The models involved in this phase are the Goal Model and Secure Tropos model. The second phase is the Determination of Security Objective. The model that will be used is Secure Tropos. The third phase is Risk Analysis and Assessment. The model that will be used is Secure Tropos. The fourth phase is Risk Treatment. In this phase, there is no model, but we use the suggestion from Secure Tropos: to eliminate risk, transfer risk, retain risk, and reduce risk. The fifth phase is Security Requirements Definition. The models that will be used are the scenario model, interaction model, and knowledge model. The last phase is Control Selection and Implementation. The model that will be used is the Behavior Model. We conducted a reliability analysis to analyze the participants' understanding of Secure AOM. From the reliability test, we can conclude that Secure AOM can become the alternative methodology, as the percentage that agrees that Secure AOM can protect users against making errors and mistakes is 80.9%, and 71.9% agree that SAOM can help to prevent users from specifying incorrect model elements and the relation between the model. This result means that over 50% of the participants agree that Secure AOM can be an alternative methodology that supports security risk management.
Value-based modeling and simulation for sustainable ICT4D Omotola, Akindoyo Oluwatosinloba; Waishiang, Cheah; Khairuddin, Muhammad Asyraf bin; Jalil, Nurfauza binti; Phang, Eaqerzilla
JOIV : International Journal on Informatics Visualization Vol 7, No 2 (2023)
Publisher : Society of Visual Informatics

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30630/joiv.7.2.1314

Abstract

ICT4D is an acronym for information and communication technologies for development. This acronym represents the many initiatives that are now being carried out in underdeveloped countries all around the globe. These technology-oriented initiatives aim to promote the growth and prosperity of the regions they serve. People from the local community often volunteer their time to serve as program managers when NGOs or governments give funding. The term "sustainability" describes an information and communications technology's capacity to carry out a development project even after the initial funding has run out. The e3value technique will be broken down in this article so that we may better understand how it works. Using various tools for value-based modeling, this method is utilized to create an e-Business model. However, one of the main problems with e-business technologies is that they often get insufficient data to be effective. This study aims to examine the procedures that must be followed to learn more about an e-Business concept and mold it into a form that would allow for its implementation in a technologically and commercially practical manner. In order to gather information on the Long Lamai community's economic activities, a survey is being used in this research. The net value sheet for each of their businesses is then stimulated utilizing the data using E3 value. Initial findings indicate that 5 out of 13 enterprises' net incomes are negative, and each of those five businesses has its roots in a local enterprise. However, the figure does not consider labor costs, taxes, or long-term investments made with government money. We continued the stimulation with sensitivity analysis and scenario-based analysis, which results in total revenue of 1,410,000 for the five enterprises in the fourth year after accounting for taxes and fees in the sensitivity analysis. This opens the door for further research into how discrepancies in wealth and income may arise in the simulation of an economy due to the right use of ICT for long-term development and prosperity. Profitability sheets may be created if certain business model assumptions are specified, such as the monetary value of the commodities produced, distributed, and consumed. These may be used to decide if the project can become profitable for all parties concerned.