Department of General Education and Language
Permanent URI for this collection
Browse
Browsing Department of General Education and Language by Author "Baadel, Said"
Now showing 1 - 14 of 14
Results Per Page
Sort Options
Item Avoiding the Phishing Bait: The Need for Conventional Countermeasures for Mobile Users(Institute of Electrical and Electronics Engineers Inc., 2018-07-02) Baadel, Said; Thabtah, Fadi; Majeed, AsimItem A clustering approach for autistic trait classification(Taylor and Francis Ltd, 2020-07-02) Baadel, Said; Thabtah, Fadi; Lu, JoanMachine learning (ML) techniques can be utilized by physicians, clinicians, as well as other users, to discover Autism Spectrum Disorder (ASD) symptoms based on historical cases and controls to enhance autism screening efficiency and accuracy. The aim of this study is to improve the performance of detecting ASD traits by reducing data dimensionality and eliminating redundancy in the autism dataset. To achieve this, a new semi-supervised ML framework approach called Clustering-based Autistic Trait Classification (CATC) is proposed that uses a clustering technique and that validates classifiers using classification techniques. The proposed method identifies potential autism cases based on their similarity traits as opposed to a scoring function used by many ASD screening tools. Empirical results on different datasets involving children, adolescents, and adults were verified and compared to other common machine learning classification techniques. The results showed that CATC offers classifiers with higher predictive accuracy, sensitivity, and specificity rates than those of other intelligent classification approaches such as Artificial Neural Network (ANN), Random Forest, Random Trees, and Rule Induction. These classifiers are useful as they are exploited by diagnosticians and other stakeholders involved in ASD screening. © 2020 Taylor & Francis Group, LLC.Item Cybersecurity awareness: A critical analysis of education and law enforcement methods(Slovene Society Informatika, 2021) Baadel, Said; Thabtah, Fadi; Lu, JoanAccording to the international Anti-Phishing Work Group (APWG), phishing activities have abruptly risen over the last few years, and users are becoming more susceptible to online and mobile fraud. Machine Learning techniques have potential for building technical anti-phishing models, with a handful already implemented in the real time environment. However, majority of them have yet to be applied in a real time environment and require domain experts to interpret the results. This gives conventional techniques a vital role as supportive tools for a wider audience, especially novice users. This paper reviews in-depth, common, phishing countermeasures including legislation, law enforcement, hands-on training, and education among others. A complete prevention layer based on the aforementioned approaches is suggested to increase awareness and report phishing to different stakeholders, including organizations, novice users, researchers, and computer security experts. Therefore, these stakeholders can understand the upsides and downsides of the current conventional approaches and the ways forward for improving them. © 2021 Slovene Society Informatika. All rights reserved.Item Data analytics : intelligent anti-phishing techniques based on machine learning(World Scientific Publishing Co. Pte Ltd, 2019) Baadel, Said; Lu, JoanAccording to the international body Anti-Phishing Work Group (APWG), phishing activities have skyrocketed in the last few years and more online users are becoming susceptible to phishing attacks and scams. While many online users are vulnerable and naive to the phishing attacks, playing catch-up to the phishers' evolving strategies is not an option. Machine Learning techniques play a significant role in developing effective anti-phishing models. This paper looks at phishing as a classification problem and outlines some of the recent intelligent machine learning techniques (associative classifications, dynamic self-structuring neural network, dynamic rule-induction, etc.) in the literature that is used as anti-phishing models. The purpose of this review is to serve researchers, organisations' managers, computer security experts, lecturers, and students who are interested in understanding phishing and its corresponding intelligent solutions. This will equip individuals with knowledge and skills that may prevent phishing on a wider context within the community. © 2019 World Scientific Publishing Co.Item Exploratory study on the impact of game-based learning on student engagement(Institute of Electrical and Electronics Engineers Inc., 2015) Yousef, Dima; Baadel, Said; Makad, RamaMotivating students has always been the main concern of seasoned and new teachers. This is evident as they plan their lessons meticulously to ensure that their students are actively engaged in some form of activity or preparing for a task. The purpose of the paper is to examine the advantages, obstacles, and impact of using games on student engagement and involvement throughout the learning process. The findings will reveal that game-based learning has a profound and positive outcome on student level of motivation, comprehension, and retention of newly taught concepts. © 2014 IEEE.Item Facial recognition cane for the visually impaired(Springer Verlag, 2016) Majeed, Asim; Baadel, SaidThe modern era is accompanied by various traditional mobility aids which help visually impaired to stay independent and enabling them detecting the objects and scanning surroundings. The use of haptic touch, as well as ultrasound, is embedded in today’s smart canes which detect obstacles up to 3 m distance, GPS navigation, informs the user through Bluetooth and earpiece, and guide the visually impaired to direct from one location to another. The evolution of this technology has motivated the integration of inexpensive camera technology within the cane for facial recognition purposes. The concept of developing this intelligent smart cane which would detect obstacles from up to 10 m as well as recognises friends and family faces, was envisioned by students at Birmingham City University. The developments in this product and adopted technologies guide a visually impaired user to detect obstacles and to find an alternative route while at the same time try to recognize any family or friends within the vicinity. These have been reflected in this research paper along with the limitations and wider issues which may come up when adopting the high-tech advances. © Springer International Publishing AG 2016.Item Global triumph or exploitation of security and privacy concerns in E-learning systems(Springer Verlag, 2016) Majeed, Asim; Baadel, Said; Haq, Anwar UlThis paper identifies the causes of privacy concerns which emerged when an educational institution launched an automated proctoring technology to examine E-Learners. In the modern era of information, privacy is an integral concern due to its fluid, dynamic and complex nature. In certain situations where it is very difficult to understand the privacy concerns, privacy is often misunderstood by the interactive systems designers. The qualitative data in this research was collected using content analysis approach from 120 online bloggers and useful insights were found; those that pertained to the privacy concerns for E-Learners. The findings revealed both practical and theoretical implications for both the institutions offering online courses and organization designing tools for proctoring. © Springer International Publishing AG 2016.Item Internet of everything (IoE) exploiting organisational inside threats : global network of smart devices (GNSD)(Institute of Electrical and Electronics Engineers Inc., 2016) Majeed, Asim; Haq, Anwar Ul; Jamal, Arshad; Bhana, Rehan; Banigo, Funke; Baadel, SaidVarious disruptive technologies have evolved a paradigm for setting up the Internet-of-Everything (IoE) and continuous evolution of technologies has demanded those devices to communicate and exchange information with each other. The marketing research company Gartner has surveyed and estimated that around 30 billion devices would be interconnected and exchanging information by 2020. The IoE is accompanied by several substantial opportunities in all fields of life, ranging from the energy sector to the healthcare industry. The trail of IoE development has opened new doors of attack vectors. The evolution in the plethora of ubiquitous devices has raised several insider threats, thus generating concerns of security and privacy within enterprises who have framed the use of smart devices through IoE. This paper discusses a different perspective of security and privacy issues in IoE by considering insiders bringing personal smart devices to use within the enterprise. The central theme of this research is to identify the challenges and explore the extent of security and privacy issues a global network of smart devices could exacerbate within the enterprise. © 2016 IEEE.Item Managerial Recruitment Issues in China: The Expatriate Factor(Springer Science and Business Media B.V., 2017) Kabene, Stefane; Baadel, SaidItem MCOKE: Multi-Cluster Overlapping K-Means Extension Algorithm(World Academy of Science, Engineering and Technology, 2015) Baadel, Said; Thabtah, Fadi; Lu, JoanClustering involves the partitioning of n objects into k clusters. Many clustering algorithms use hard-partitioning techniques where each object is assigned to one cluster. In this paper we propose an overlapping algorithm MCOKE which allows objects to belong to one or more clusters. The algorithm is different from fuzzy clustering techniques because objects that overlap are assigned a membership value of 1 (one) as opposed to a fuzzy membership degree. The algorithm is also different from other overlapping algorithms that require a similarity threshold be defined a priori which can be difficult to determine by novice users.Item Semantics of intelligent learning environment (ILE) : Cesim simulation(Association for Computing Machinery, 2017) Majeed, Asim; Baadel, Said; Williams, Mike LloydIn the past few decades, learning through simulation and games has evolved in response to a continuous demand for new methods of teaching learners - thus helping academics to deliver their courses effectively. This research paper aims to identify the impact(s) of simulation-based virtual learning environment on postgraduate studentslearning abilities. To achieve the learning objectives; positive relations between simulations and students learning are gathered based on the systematic review of the literature. A successful use of simulations depends on four factors: the role of the instructor, integration in the course, the courses technical specifications and, the practical exposure as an integrative dynamic virtual learning environment. We utilized a quantitative methodology to compile data from online bloggers and analysed the content. The findings in this paper reveal that students from all groups, disaggregated by gender and ethnicity, showed significant learning gains after playing these challenging simulation games. We also present some recommendations that can help alleviate some of the constraints experienced by institutions of higher education that integrate simulations into classrooms. © 2017 ACM.Item Technology adoption and diffusion in the gulf : some challenges(Association for Computing Machinery, 2017) Baadel, Said; Majeed, Asim; Kabene, StefaneIn today's technologically advanced world, it is crucial that instructors continuously stay up to date with the ever changing uses of technology in the classroom. Technologies transform the way instructors conduct their lectures and present course material, thereby fundamentally altering the way students learn. It is essential that some challenges such as training needs, funding, and dealing with perceptions are addressed and aligned with one another in order to facilitate technology adoption in institutions of higher education. These challenges are discussed in this paper in the context of gulf countries. © 2017 ACM.Item Weathering the Storm: Financial Variable as a Key Influence to Entrepreneurial Venture Survival Over Time in Canada(Springer Science and Business Media B.V., 2017) Baadel, Said; Kabene, StefaneItem Work-life conflict costs: a Canadian perspective(Inderscience Enterprises Ltd., 2020) Baadel, Said; Kabene, Stefane; Majeed, AsimWith current trends showing increased work hours, dual-earner households, and less time spent with family, it is evident that there is a work-life conflict. It is important for human resource managers in Canada to adapt to this changing trend by implementing new policies and programs. Our goal was to discover if there was a correlation between the work-life conflict and absenteeism. Our research study demonstrated that there is no significant correlation between hours worked and time spent with family, but there is a positive significant relationship between time spent working and absenteeism. Our study also indicates a positive correlation between time spent with family and absenteeism. Canadian companies can ease the implications of work-life conflict by adopting some work-life best practices. These practices include reduced work hours and flexible schedules that are already prevalent in European countries. Copyright © 2020 Inderscience Enterprises Ltd.