Pub Date : 2023-06-07DOI: 10.31645/jisrc.23.21.1.9
Asif Raza, R. Faiz, Hafiz Syed Muhammad Muslim
Software testing is one activity for Software Quality Assurance (SQA). One way to test is through Black box test cases at design level. Since UML is a de-facto design language and is one of the most used design language now a day. Therefore, there is need to design black box test cases using UML behavioral diagrams. Object Constraint Language (OCL) is a formal language to write constraints on UML diagrams as it is unambiguous. Although test cases against robustness have been designed through OCL expressions but no test cases as yet have been designed against security specific authentication, access control and availability. Specification and testing of security specific authentication, access Control and availability through OCL. An experiment is performed with a hypothesis ‘if Security Specific Authentication, Access Control and Availability is specified through OCL in state diagram then Test cases can be designed’. We have specifiedsecurity in OCL then same OCL expressions are used to model security in UML state diagram. Furthermore, mutation testing is performed on OCL expressions. Then ECP is done using same extracted mutants. Security specific authentication, access control and availability is specified in OCL and then test cases are designed using a black box testing technique Equivalence Class Partitioning. Hypothesis results shows that one can design test cases through OCL. This thesis shows that Specification and Testing of Security specific authentication, access control and availability through OCL.
{"title":"Test Case Design Of Security Threats Through State Machine OCL","authors":"Asif Raza, R. Faiz, Hafiz Syed Muhammad Muslim","doi":"10.31645/jisrc.23.21.1.9","DOIUrl":"https://doi.org/10.31645/jisrc.23.21.1.9","url":null,"abstract":"Software testing is one activity for Software Quality Assurance (SQA). One way to test is through Black box test cases at design level. Since UML is a de-facto design language and is one of the most used design language now a day. Therefore, there is need to design black box test cases using UML behavioral diagrams. Object Constraint Language (OCL) is a formal language to write constraints on UML diagrams as it is unambiguous. Although test cases against robustness have been designed through OCL expressions but no test cases as yet have been designed against security specific authentication, access control and availability. Specification and testing of security specific authentication, access Control and availability through OCL. An experiment is performed with a hypothesis ‘if Security Specific Authentication, Access Control and Availability is specified through OCL in state diagram then Test cases can be designed’. We have specifiedsecurity in OCL then same OCL expressions are used to model security in UML state diagram. Furthermore, mutation testing is performed on OCL expressions. Then ECP is done using same extracted mutants. Security specific authentication, access control and availability is specified in OCL and then test cases are designed using a black box testing technique Equivalence Class Partitioning. Hypothesis results shows that one can design test cases through OCL. This thesis shows that Specification and Testing of Security specific authentication, access control and availability through OCL.","PeriodicalId":412730,"journal":{"name":"Journal of Independent Studies and Research Computing","volume":"22 10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132741408","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-06-07DOI: 10.31645/jisrc.23.21.1.5
Imran Imran, Syed Mubashir Ali, R. Faiz, M. M. Alam, Syed Kashif Ali Quadri, Muhammad Razeen Bari, Muhammad Farooq Shibli
In recent years, there has been a lot of focus on anomaly detection. Technological advancements, such as the Internet of Things (IoT), are rapidly being acknowledged as critical means for data streams that create massive amounts of data in real time from a variety of applications. Analyzing this gathered data to detect abnormal occurrences helps decrease functional hazards and avoid unnoticed errors that cause programme delay. Methods for evaluating specific anomalous behaviorsin IoT data stream sources have been established and developed in the current literature. Unfortunately, there are very few thorough researches that include all elements of IoT data acquisition. As a result, this article seeks to address this void by presenting a comprehensive picture of numerous cutting-edge solutions on the fundamental concerns and essential issues in IoT data. The data type, types of anomalies,the learning method, datasets, and evaluation criteria are all described. Lastly, the issues that necessitate further investigation and future approaches are highlighted.
{"title":"A Survey Of Machine Learning Techniques For Detecting Anomaly In Internet Of Things (IoT)","authors":"Imran Imran, Syed Mubashir Ali, R. Faiz, M. M. Alam, Syed Kashif Ali Quadri, Muhammad Razeen Bari, Muhammad Farooq Shibli","doi":"10.31645/jisrc.23.21.1.5","DOIUrl":"https://doi.org/10.31645/jisrc.23.21.1.5","url":null,"abstract":"In recent years, there has been a lot of focus on anomaly detection. Technological advancements, such as the Internet of Things (IoT), are rapidly being acknowledged as critical means for data streams that create massive amounts of data in real time from a variety of applications. Analyzing this gathered data to detect abnormal occurrences helps decrease functional hazards and avoid unnoticed errors that cause programme delay. Methods for evaluating specific anomalous behaviorsin IoT data stream sources have been established and developed in the current literature. Unfortunately, there are very few thorough researches that include all elements of IoT data acquisition. As a result, this article seeks to address this void by presenting a comprehensive picture of numerous cutting-edge solutions on the fundamental concerns and essential issues in IoT data. The data type, types of anomalies,the learning method, datasets, and evaluation criteria are all described. Lastly, the issues that necessitate further investigation and future approaches are highlighted.","PeriodicalId":412730,"journal":{"name":"Journal of Independent Studies and Research Computing","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134646814","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-06-07DOI: 10.31645/jisrc.23.21.1.3
Muhammad Wasim, Affan Alim, Waqas Ahmed
Mental health is an important part of a successful life for a person whether elderly, children, or young. Alzheimer’s is a fatal brain disease that severely damages the human brain, especially in the elderly. One way to prevent Alzheimer's disease is by detecting it early. The proposed research employs a deep learning methodology using a 3D convolutional neural network (3D CNN) that has been proposed to detect Alzheimer's disease at an early stage. The proposed model is primarily evaluated using three-dimensional brain images. A series of preprocessing have been applied that is an advanced normalization tool (ANT). The underlying pattern has a size of 128×128×64 and is passed to 17 layers of a neural network that is 3D-CNN. Another contribution of this study is the conversion of a 3D Alzheimer’s image into a 2D image. A 2D convolutional neural network such that RestNET50 and VGG16 are proposed to be used for Alzheimer’s detection. The proposed model has attained the highest of 78.07% accuracy using 3D CNN.
{"title":"Alzheimer’s Disease Detection: A Deep Learning-Based Approach","authors":"Muhammad Wasim, Affan Alim, Waqas Ahmed","doi":"10.31645/jisrc.23.21.1.3","DOIUrl":"https://doi.org/10.31645/jisrc.23.21.1.3","url":null,"abstract":"Mental health is an important part of a successful life for a person whether elderly, children, or young. Alzheimer’s is a fatal brain disease that severely damages the human brain, especially in the elderly. One way to prevent Alzheimer's disease is by detecting it early. The proposed research employs a deep learning methodology using a 3D convolutional neural network (3D CNN) that has been proposed to detect Alzheimer's disease at an early stage. The proposed model is primarily evaluated using three-dimensional brain images. A series of preprocessing have been applied that is an advanced normalization tool (ANT). The underlying pattern has a size of 128×128×64 and is passed to 17 layers of a neural network that is 3D-CNN. Another contribution of this study is the conversion of a 3D Alzheimer’s image into a 2D image. A 2D convolutional neural network such that RestNET50 and VGG16 are proposed to be used for Alzheimer’s detection. The proposed model has attained the highest of 78.07% accuracy using 3D CNN.","PeriodicalId":412730,"journal":{"name":"Journal of Independent Studies and Research Computing","volume":"40 8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114293228","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-06-07DOI: 10.31645/jisrc.23.21.1.4
Ayesha Anees Zaveri, Nabiha Faisal, S. Imtiaz, Sarama Shehmir, Mobeen Nazar, M. Parveen
The concept is to create a game based on augmented reality and use object tracking as the primary function for recognizing objects using a camera. The key goal is to design an atmosphere that not only satisfies a person's desire to play video games but also lowers their stress levels in a manner that is both cost-effective and makes less use of flashy devices and cutting-edge technology. The environment produced in this way will use a camera that can identify objects and carry out a series of activities that have been preset according to their functions.
{"title":"Techy Tennis–A Game Beyond Reality","authors":"Ayesha Anees Zaveri, Nabiha Faisal, S. Imtiaz, Sarama Shehmir, Mobeen Nazar, M. Parveen","doi":"10.31645/jisrc.23.21.1.4","DOIUrl":"https://doi.org/10.31645/jisrc.23.21.1.4","url":null,"abstract":"The concept is to create a game based on augmented reality and use object tracking as the primary function for recognizing objects using a camera. The key goal is to design an atmosphere that not only satisfies a person's desire to play video games but also lowers their stress levels in a manner that is both cost-effective and makes less use of flashy devices and cutting-edge technology. The environment produced in this way will use a camera that can identify objects and carry out a series of activities that have been preset according to their functions.","PeriodicalId":412730,"journal":{"name":"Journal of Independent Studies and Research Computing","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132569734","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-06-07DOI: 10.31645/jisrc.23.21.1.6
Sana Fatima, S. F. Nasim, N. G. Haider, Mubeen Rasheed, Zoha Akram
In today’s challenging world software testing is a very crucial part of the software development lifecycle (SDLC) as it helps in minimizing errors, and reduces maintenance and cost of the software. This work aims to analyze the various tools presently available for software automation. The selection of productive testing tools plays a vital role in the implementation of software products with high quality and it also ensures premium quality throughout the SDLC. One of the key issues is the selection of adequate software testing tools and frameworks. This paper discusses Quick Test Professional (QTP) and Selenium on the basis of various attributes which include Source and Licensing, Testing Cost, Object Repository, Usability, and programming language support.The use of an adequate automated software tool provides ease in testing and allows the tester to execute test cases in an efficient manner by overcoming the challenges such as limited time, increased pressure and minimum resources.
在当今充满挑战的世界中,软件测试是软件开发生命周期(SDLC)中非常重要的一部分,因为它有助于将错误最小化,并减少软件的维护和成本。这项工作旨在分析目前可用于软件自动化的各种工具。生产性测试工具的选择在高质量软件产品的实现中起着至关重要的作用,它也确保了整个SDLC的优质质量。关键问题之一是选择适当的软件测试工具和框架。本文在各种属性的基础上讨论了Quick Test Professional (QTP)和Selenium,这些属性包括源代码和许可、测试成本、对象存储库、可用性和编程语言支持。适当的自动化软件工具的使用为测试提供了便利,并允许测试人员通过克服诸如有限的时间、增加的压力和最少的资源等挑战,以有效的方式执行测试用例。
{"title":"Comparative Study Of Software Automation Tools: Selenium And Quick Test Professional","authors":"Sana Fatima, S. F. Nasim, N. G. Haider, Mubeen Rasheed, Zoha Akram","doi":"10.31645/jisrc.23.21.1.6","DOIUrl":"https://doi.org/10.31645/jisrc.23.21.1.6","url":null,"abstract":"In today’s challenging world software testing is a very crucial part of the software development lifecycle (SDLC) as it helps in minimizing errors, and reduces maintenance and cost of the software. This work aims to analyze the various tools presently available for software automation. The selection of productive testing tools plays a vital role in the implementation of software products with high quality and it also ensures premium quality throughout the SDLC. One of the key issues is the selection of adequate software testing tools and frameworks. This paper discusses Quick Test Professional (QTP) and Selenium on the basis of various attributes which include Source and Licensing, Testing Cost, Object Repository, Usability, and programming language support.The use of an adequate automated software tool provides ease in testing and allows the tester to execute test cases in an efficient manner by overcoming the challenges such as limited time, increased pressure and minimum resources.","PeriodicalId":412730,"journal":{"name":"Journal of Independent Studies and Research Computing","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122178306","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-06-07DOI: 10.31645/jisrc.23.21.1.7
M. N. Qureshi, M. Ozair, Ahmad Hussain, S. Rehman, Q. Sultan, N. Islam
Large area ratio nozzles that are employed for space propulsion applications are not meant to be tested at the ground-level conditions because of the flow conditions that occurs in their divergent section due to their low exhaust pressures. Therefore, it is desired to perform the experimental evaluation at high-altitude to evaluate the performance of the said nozzles. Generally, a high-altitude test facility, consisting of a supersonic exhaust diffuser, is generally employed. In thispaper, a second-throat exhaust diffuser has been numerically investigated to predict its minimum starting pressure, and to understand the flow physics in the diffuser using Computational Fluid Dynamics (CFD). Numerical computation of the flow field in the diffuser system is done for the two cases: 1) when the nozzle and the diffuser system are initially evacuated to a low pressure, and 2) when the nozzle and the diffuser system are initially at ambient pressure (1 bar). Simulations have been carried out for cold flow situation (Ȗ=1.4) over a range of nozzle inlet stagnation pressures. Numerical results compare favorably with the theoretical and experimental results and provide adequate insight to the flow physics and internal shock structures formed in thediffuser in addition to minimum starting pressure, diffuser wall pressure and vacuum thrust.
{"title":"Numerical Investigations At High Altitudes For Nozzles Performance Monitoring","authors":"M. N. Qureshi, M. Ozair, Ahmad Hussain, S. Rehman, Q. Sultan, N. Islam","doi":"10.31645/jisrc.23.21.1.7","DOIUrl":"https://doi.org/10.31645/jisrc.23.21.1.7","url":null,"abstract":"Large area ratio nozzles that are employed for space propulsion applications are not meant to be tested at the ground-level conditions because of the flow conditions that occurs in their divergent section due to their low exhaust pressures. Therefore, it is desired to perform the experimental evaluation at high-altitude to evaluate the performance of the said nozzles. Generally, a high-altitude test facility, consisting of a supersonic exhaust diffuser, is generally employed. In thispaper, a second-throat exhaust diffuser has been numerically investigated to predict its minimum starting pressure, and to understand the flow physics in the diffuser using Computational Fluid Dynamics (CFD). Numerical computation of the flow field in the diffuser system is done for the two cases: 1) when the nozzle and the diffuser system are initially evacuated to a low pressure, and 2) when the nozzle and the diffuser system are initially at ambient pressure (1 bar). Simulations have been carried out for cold flow situation (Ȗ=1.4) over a range of nozzle inlet stagnation pressures. Numerical results compare favorably with the theoretical and experimental results and provide adequate insight to the flow physics and internal shock structures formed in thediffuser in addition to minimum starting pressure, diffuser wall pressure and vacuum thrust.","PeriodicalId":412730,"journal":{"name":"Journal of Independent Studies and Research Computing","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122184756","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-06-07DOI: 10.31645/jisrc.23.21.1.2
Huma Jamshed, Ansha Zahid, Rizwan Ul Hasan, Ahmad Hussain, N. Islam
Various organizations have plunged towards cloud computing solutions because of high cost, storage space and maintenance issues from big data. Big data is utilized by institutions in decision making process to achieve valuable insights in real time. Nevertheless big data has indeed helped organizations, andeven small to medium-sized businesses, but it characteristics has posed great challenges at same time. The cloud platform has facilitated in handling computational, networking and storage capacity related issues but still these mechanisms are inadequate to deal with the rapid data explosion. Moreover data is not secure in Cloud Environment as the servers are governed by third party. In recent years fusion of big data and blockchain technology has pushed big data beyond imagination and imparted great prospective in better-quality big data services and applications. Organizations certainly will adopt these two emerging technologies to transform their business needs. In this paper we present an overview of security related issue of big sensitive data on cloud platform along with motivation behind paradigm shift i.e. Integration of big data and blockchain technology.
{"title":"A Review Of Blockchain Technology In Big Data Paradigm","authors":"Huma Jamshed, Ansha Zahid, Rizwan Ul Hasan, Ahmad Hussain, N. Islam","doi":"10.31645/jisrc.23.21.1.2","DOIUrl":"https://doi.org/10.31645/jisrc.23.21.1.2","url":null,"abstract":"Various organizations have plunged towards cloud computing solutions because of high cost, storage space and maintenance issues from big data. Big data is utilized by institutions in decision making process to achieve valuable insights in real time. Nevertheless big data has indeed helped organizations, andeven small to medium-sized businesses, but it characteristics has posed great challenges at same time. The cloud platform has facilitated in handling computational, networking and storage capacity related issues but still these mechanisms are inadequate to deal with the rapid data explosion. Moreover data is not secure in Cloud Environment as the servers are governed by third party. In recent years fusion of big data and blockchain technology has pushed big data beyond imagination and imparted great prospective in better-quality big data services and applications. Organizations certainly will adopt these two emerging technologies to transform their business needs. In this paper we present an overview of security related issue of big sensitive data on cloud platform along with motivation behind paradigm shift i.e. Integration of big data and blockchain technology.","PeriodicalId":412730,"journal":{"name":"Journal of Independent Studies and Research Computing","volume":"138 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116373440","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-06-07DOI: 10.31645/jisrc.23.21.1.1
Syed Rehan Abbas Jafri, Dr. Ghous B. Narego
This paper presents a novel wireless power transmission system through reflecting walls for enhancing received signal strength. The study has been conducted with an objective to achieve a novel system for the energy harvesting and subsequent wireless power transmission for mobile phone charging applications. The work is carried out at the well-known RF frequency range from 469.5 MHz to 773.5 MHz. We have employed three different antennas for the proposed system. Multiple changes in antenna orientations have also been accounted for including azimuthal variations. The results show substantial enhancement in the received signal strength (RSS) due to use of these reflecting walls
{"title":"Performance Comparison Of Three Antennas With Passive Reflecting Walls For Wireless Power Transmission","authors":"Syed Rehan Abbas Jafri, Dr. Ghous B. Narego","doi":"10.31645/jisrc.23.21.1.1","DOIUrl":"https://doi.org/10.31645/jisrc.23.21.1.1","url":null,"abstract":"This paper presents a novel wireless power transmission system through reflecting walls for enhancing received signal strength. The study has been conducted with an objective to achieve a novel system for the energy harvesting and subsequent wireless power transmission for mobile phone charging applications. The work is carried out at the well-known RF frequency range from 469.5 MHz to 773.5 MHz. We have employed three different antennas for the proposed system. Multiple changes in antenna orientations have also been accounted for including azimuthal variations. The results show substantial enhancement in the received signal strength (RSS) due to use of these reflecting walls","PeriodicalId":412730,"journal":{"name":"Journal of Independent Studies and Research Computing","volume":"297 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115430478","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-06-07DOI: 10.31645/jisrc.23.21.1.8
U. Afzal, Areeba Fatima, Bushra Nadeem, Faiza Shermeen, S. Usmani
Business Intelligence (BI) plays an important role in decision support systems by analyzing business data. Demand forecasting is a primary part of a sales decision system. In this research work, a Neural Network based Business Intelligence (NNBI) dashboard is proposed for a sales decision system. Data is collected from a leading clothing brand, then NNBI executes data and uses Recurrent Neural Network (RNN) to predict daily, monthly and weekly sales. The accuracy of the prediction model (0.95) validates the performance of NNBI. Tableau, a well-known BI tool is used to design NNBI dashboard. A combination of graphs, charts and text is used to interactively present the sales information. Results of NNBI show that a BI dashboard with the analysis and prediction power of NN is a good fit for a business organization.
{"title":"NNBI: A Neural Network Based Business Intelligence Dashboard For A Clothing Store","authors":"U. Afzal, Areeba Fatima, Bushra Nadeem, Faiza Shermeen, S. Usmani","doi":"10.31645/jisrc.23.21.1.8","DOIUrl":"https://doi.org/10.31645/jisrc.23.21.1.8","url":null,"abstract":"Business Intelligence (BI) plays an important role in decision support systems by analyzing business data. Demand forecasting is a primary part of a sales decision system. In this research work, a Neural Network based Business Intelligence (NNBI) dashboard is proposed for a sales decision system. Data is collected from a leading clothing brand, then NNBI executes data and uses Recurrent Neural Network (RNN) to predict daily, monthly and weekly sales. The accuracy of the prediction model (0.95) validates the performance of NNBI. Tableau, a well-known BI tool is used to design NNBI dashboard. A combination of graphs, charts and text is used to interactively present the sales information. Results of NNBI show that a BI dashboard with the analysis and prediction power of NN is a good fit for a business organization.","PeriodicalId":412730,"journal":{"name":"Journal of Independent Studies and Research Computing","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125661232","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-06-07DOI: 10.31645/jisrc.23.21.1.10
Taha Abbas, Kashif Arif
The advancement of information and communication technology (ICT)has resulted in dynamic changes in the operations of various business sectors all over the world, while causing inconvenience to users and making stakeholders' lives easier. However, the advancement in the same has brought major concerns for businesses, such as cybercrime. This study focuses on identifying the impact of cybercrime on the adoption of e-banking services in Pakistan. The study aims to understand the impact of hacking, identity theft and phishing on the adoption of E-banking in Pakistan. The data was collected from 384 banking customers through structured questions containing the demographic questions as well as questions related to the constructs used in the study. The findings of the study suggest that hacking, phishing and identity theft negatively affect the adoption of E-banking in Pakistan. The results of the study are discussed in line with the existing literature. The study limitations and future research areas are also discussed.
{"title":"End-Users' Perception Of Cybercrimes Towards E-Banking Adoption And Retention","authors":"Taha Abbas, Kashif Arif","doi":"10.31645/jisrc.23.21.1.10","DOIUrl":"https://doi.org/10.31645/jisrc.23.21.1.10","url":null,"abstract":"The advancement of information and communication technology (ICT)has resulted in dynamic changes in the operations of various business sectors all over the world, while causing inconvenience to users and making stakeholders' lives easier. However, the advancement in the same has brought major concerns for businesses, such as cybercrime. This study focuses on identifying the impact of cybercrime on the adoption of e-banking services in Pakistan. The study aims to understand the impact of hacking, identity theft and phishing on the adoption of E-banking in Pakistan. The data was collected from 384 banking customers through structured questions containing the demographic questions as well as questions related to the constructs used in the study. The findings of the study suggest that hacking, phishing and identity theft negatively affect the adoption of E-banking in Pakistan. The results of the study are discussed in line with the existing literature. The study limitations and future research areas are also discussed.","PeriodicalId":412730,"journal":{"name":"Journal of Independent Studies and Research Computing","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116302255","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}