Masters Thesis
Permanent URI for this collectionhttps://studentrepo.iium.edu.my/handle/123456789/9204
Browse
Browsing Masters Thesis by Department "#PLACEHOLDER_PARENT_METADATA_VALUE#"
Now showing 1 - 4 of 4
- Results Per Page
- Sort Options
- Some of the metrics are blocked by yourconsent settings
Publication A comparative study of software quality using the hybrid agile software development lifecycle and the plan-driven development model(Kuala Lumpur : Kulliyyah of Information and Communication Technology, International Islamic University Malaysia, 2025, 2025); Norzariyah YahyaSoftware development methodology is a series of processes that is necessary for software development to achieve a good quality software. Software development methodology can be divided into three general established approaches: the plan-driven development model, agile methodologies, and hybrid agile model. Agile methodologies are difficult to adapt for businesses that have strict timeline from its clients; thus, companies, especially software development houses, prefer the plan-driven development model or hybrid agile model as the models to be referred to in a software project. However, which software model between the plan-driven development model and the hybrid agile model which is widely used by software development houses will result in higher-quality software? To answer the question, this research investigates the plan-driven development model and hybrid agile model for comparison of the software quality produced by the software engineers. This research is empirical research adopting an experimental study to compare the internal quality of a plan-driven development model with a hybrid agile model involving a group of software engineers who were divided into two groups; one group using the Hybrid Agile model, WaterScrumFall while the other be using a plan-driven development model, the Waterfall model. The outcomes of this study shows that the complexity of the code, measured by the Average Cyclomatic Complexity (ACC); the lines of codes indicates the size and scale of the codebase; and the dependencies between objects specifically addressing structural quality through metrics like Coupling between Objects (CBO) and Lack of Cohesion in Methods (LCOM). The less complex project with low coupling between objects and cohesion in methods will contribute to high-quality source code and easier project management and maintenance, and it will also be cost effective. As a result, the team that implements Hybrid Agile model produce lower ACC and CBO, but higher LCOM compared to the team that applies plan-driven methodology. This research concludes that the Hybrid Agile model produces better software quality than the plan-driven methodology. This research will contribute to the benefit of knowing which model will produce better internal software quality and provide better insights for developers on which software development methodology may lead to software that is less complexity with a minimal line of codes, less coupling between methods, and more lack cohesion method.1 9 - Some of the metrics are blocked by yourconsent settings
Publication An information dissemination model for scholars on cryptocurrenciesThis dissertation reports on an information dissemination model for scholars on cryptocurrencies. This disruptive technology of cryptocurrencies acts as a virus that goes viral. The objectives were to review the existing information dissemination models, identify known factors influencing an information dissemination process, and propose an information dissemination model for scholars on cryptocurrencies. The research questions were on why the epidemic models could be used for understanding cryptocurrencies, what were the known factors influencing the relevant information dissemination model, and how could an information spreading model on cryptocurrencies work for scholars. The methods used in this research were survey questionnaire, interview, content analysis and triangulation. Survey questionnaire conducted on two cryptocurrencies companies, while content analysis for ten cryptocurrencies companies and interview five scholars. Triangulation was done to produce the upgraded info dissemination model. A pilot study was run for content analysis and interview. The findings included variables (security system, user interaction, known identities, legal activities and user support) and themes (epidemic form, information dissemination model, virus/viral, spread the information, proposed model of information dissemination, scholars play a big role, information dissemination process, approval for information from scholars and spreading to others) for disseminating information following the SIER epidemic model. An information dissemination model was proposed, and expert opinions were gathered.6 - Some of the metrics are blocked by yourconsent settings
Publication Internet and its implications for business in Yemen(Kuala Lumpur : Kulliyyah of Information Communication Technology, International Islamic University Malaysia, 2003, 2003); Farooq AhmadThis study examines the use of Internet for business purposes in Yemen. The main sectors observed are banking and private trade organizations. It was assumed that security is a main concern in e-commerce. A survey of the banking industry and private business organizations in Yemen is conducted. Through the survey and interviews a thorough study is performed about the: Internet facilities available in Yemen (the infrastructure, the service providers), the literacy and use of ICT in the above two sectors, the level of e-commerce adopted, the main hurdles in the adoption of e-commerce, and measure required to increase the adoption of e-commerce. The study has concluded that in general the above two sectors realize the importance of ecommerce for their business and they are willing to proceed further with the ecommerce. The main causes in the delay of e-commerce adoption are the discrepancies in the infrastructure (technology, service providers and human resources), high costing of the Internet facilities, bureaucratic hurdles in obtaining the facilities, and the non availability of a secure environment. In spite of the fact that they have a high concern about the Internet security, their awareness about the security hazards and the protection measures is 1t minimum. It is also observed that the public awareness of the ICT in general is very low. In light of the data collected, the study has come up with certain recommendations for the authorities interested to improve the e-commerce in Yemen.4 8 - Some of the metrics are blocked by yourconsent settings
Publication Secure digital forensics framework for vehicle maintenance service records(Kuala Lumpur : Kulliyyah of Information and Communication Technology, International Islamic University Malaysia, 2024, 2024); ;Hafizah MansorNormaziah Abdul AzizAutomotive technology is soaring and has reached an advanced phase. Despite their benefits, these advancements may expose vehicles to additional threats, particularly regarding security and data management. Currently, handling maintenance service records is a manual process, which may lead to inaccuracy, unavailability, and limited consumer access. These concerns are compounded by the lack of trustworthy platforms or legitimate sources for retrieving the history of vehicle maintenance service records. The objectives of this research are to identify a list of stakeholders to define their roles and responsibilities, to identify the security requirements that need to be implemented and to establish a secure framework and communication protocol to address these concerns. Stakeholders were identified through a snowball literature review method, and their roles were assessed to ensure comprehensive coverage of the vehicle maintenance ecosystem. The security requirements were derived using Threat and Vulnerability Risk Assessment (TVRA) and Spoofing, Tampering, Repudiation, Information Disclosure, Denial of Service, and Elevation of Privilege (STRIDE) threat modelling methodologies and then used in designing the secure frameworks and communication protocol for vehicle maintenance service records. The proposed frameworks that are designed for scheduled and repair maintenance services implement the use of consortium blockchain technology as it provides a decentralised yet controlled access to ensure that only authorised stakeholders can contribute and validate data. This approach helps to protect vehicle maintenance service records from unauthorised access and data manipulation. A secure communication protocol which mainly focuses on the grant access process for new vehicle owners was developed and then formally analysed using the Scyther Tool. This tool is chosen because of its ability to rigorously verify the security of protocols. As a result, this research listed eight stakeholders that are involved in the vehicle maintenance service records. The security requirements identified are then implemented in designing the secure frameworks and secure communication protocol to address and maintain the confidentiality, integrity and availability of vehicle maintenance service records. The integration of these solutions not only safeguards maintenance records but also supports digital forensics in providing a robust foundation for advancing the management and security of vehicle maintenance data.5 1