No Image Available

Computing and Data Science

RM0
 Author/Editor: Su-Cheng Haw, Lini Lee, Muhammad Mansoor Alam, Aurangzeb Khan, Muhammad Zubair Asghar, Faiz Ullah Khan  Category: Books, Science & Technology  Publisher: MMU Press  Year: 2024  e-ISBN: 978-629-7709-03-1 More Details  Buy from e-Sentral
 Description:

Recent advances in computing, AI, and data science are driving transformative changes across industries. Quantum computing has come a long way, offering a range of problem-solving breakthroughs. In AI, the rise of large language models, machine learning, and deep learning are changing the landscape of every industry by the day. On the other hand, data science is benefiting from enhanced data management and sophisticated analytics features. Integrating AI with big data analytics enables real-time data processing and more accurate predictive modeling. Additionally, improvements in privacy-preserving technology are mitigating concerns around data security and compliance, paving the way for more robust and secure AI applications.

Preview link: https://e-publication.mmu.edu.my/books/wbxu/

Cite this book as:
Haw, S-C., Lee, L., Alam, M. M., Khan, A., Asghar, M. Z., & Khan, F. U. (2024). Computing and Data Science. MMU Press

 

Table of Contents:

Chapter 1Chapter 2Chapter 3Chapter 4Chapter 5Chapter 6Chapter 7Chapter 8Chapter 9Chapter 10

Chapter 1

Empirical Investigation on Challenges of  Data Privacy and Security in Quantum Computing for Software Development

By Muhammad Jawad and Abdul Wahid Khan

Abstract – Software development is one of many areas that quantum computing, which offers a significant advance in computational capacity, is expected to transform. With regard to data security and privacy, this disruptive technology, however, also presents new difficulties. This study explores the important issues of data protection when integrating quantum computing into software development, showing both possibilities and difficulties. We have planned to use systematic literature review and empirical methods for the identification and validation of the identified challenges and their practices. The ultimate goal of this study is to develop a model that will support vendor organization in secure software development for quantum computing. The systematic literature review (SLR) technique will be used to determine the challenges of software integration with quantum computing architecture. An empirical inquiry will be done to validate the SLR findings and identify any new difficulties from industry experts.

Cite this chapter as:
Jawad, M., & Khan, A. W. (2024). Empirical Investigation on Challenges of Data Privacy and Security in Quantum. In S. C. Haw, L. Lee, M. M. Alam, A. Khan, M. Z. Asghar, & Khan, F. U (Eds.), Computing and Data Science. (1-14). MMU Press

Chapter 2

A Model for Deciding Adoption of DevOps Approach in Global Software Development from Vendors’ Perspective

By Saad Ullah Khan and Abdul Wahid Khan

Abstract – DevOps (Development and IT Operations teams) is a contemporary approach within the field of software engineering for software development process that has gained significant interest in recent times. This is primarily owing to its numerous advantages, such as closing the gap between the teams working on development and operations, swiftly identifying and rectifying failures, and expediting the development and deployment of new updates. DevOps plays an important part in the process of software development and addresses the evolving needs of the future. DevOps features, challenges, advantages, and tools are being explored by extensive research endeavours. However, the decision of vendor organizations for global software development to adopt DevOps is complex due to various characteristics of DevOps. This research aims to pursue this research gap and develop a model, in order to support vendor companies in the selection and adoption of DevOps for their global software development practice. The primary goal of this research project is for the development and refinement of the proposed model. This project initiates with a systematic literature review (SLR) to find out key success factors. A questionnaire survey further validates the SLR findings and adds additional insights. Analytic Hierarchy Process (AHP) is employed to prioritize the proposed model elements. A case study is also conducted to assess the model in practical environment. A focus group session is conducted to get insights and suggestions for further enhancement the model. This research aims to get a robust and validated model, by applying the systematic steps, for its planned application.

Cite this chapter as:
Khan, S. U., & Khan, A. W. (2024). A Model for Deciding Adoption of DevOps Approach in Global Software. In S. C. Haw, L. Lee, M. M. Alam, A. Khan, M. Z. Asghar, & Khan, F. U (Eds.), Computing and Data Science. (15-30). MMU Press

 

Chapter 3

Software Development Readiness Model for Quantum Computing in Health Care Organization

By Faheem Ahmed and Abdul Wahid Khan

Abstract – This study introduces the Software Development Readiness Model for Quantum Computing (SDRMQC), a comprehensive framework tailored to address the unique opportunities and challenges presented by quantum computing. As quantum technologies continue to evolve, software developers must adapt their strategies to harness the full potential of this emerging field. The SDRMQC framework offers a systematic approach to navigating the complexities of quantum algorithms, the dynamic nature of quantum hardware, and the specialized skill sets required for effective quantum software development. One of the key pillars of the SDRMQC model is the emphasis on validation and verification processes for quantum software. Given the inherent complexity and uncertainty associated with quantum computing, ensuring the reliability and accuracy of software implementations is paramount. By incorporating rigorous validation and verification protocols into the development workflow, organizations can mitigate the risks associated with quantum software errors and vulnerabilities. To develop the SDRMQC framework, the study will employ a systematic literature review (SLR) to identify success factors, challenges, and best practices in quantum software development. By synthesizing insights from existing research and industry practices, the SDRMQC model will be informed by a comprehensive understanding of the current state-of-the-art in quantum computing. Additionally, the study plans to validate the SLR findings through a questionnaire survey conducted within the software industry, ensuring that the SDRMQC framework is grounded in real-world insights and experiences. Ultimately, the goal of the SDRMQC framework is to provide vendor organizations with a robust tool for assessing their readiness and capabilities in software development for quantum computing. By leveraging the SDRMQC model, organizations can identify areas for improvement, allocate resources effectively, and ultimately positionthemselves for success in the era of quantum computing.

Cite this chapter as:
Ahmed, F., & Khan, A. W. (2024). Software Development Readiness Model for Quantum Computing in Health Care. In S. C. Haw, L. Lee, M. M. Alam, A. Khan, M. Z. Asghar, & Khan, F. U (Eds.), Computing and Data Science. (31-44). MMU Press

Chapter 4

Exploring Factors for a Framework Deciding Adoption of DevOps in Global Software Development from Vendors’ Perspective: A Protocol for a Systematic Literature Review

By Saad Ullah Khan and Abdul Wahid Khan

Abstract – This research explores the lack of DevOps procedures in global software development and underscores the benefits of DevOps which provides faster failure detection, faster modification deployment, greater product quality, cost-effective development, automation, and better communication between the development and operations teams. The modern software business has seen a rise in the use of global software development due to its potential for cost saving, access to a diversified talent pool, and capacity to serve a larger market. To effectively manage and streamline the existing complexities such as socio-cultural, geographical, and temporal differences of global software development, organizations are turning to DevOps practices. Existing frameworks, in this aspect, have limitations in providing comprehensive insights into GSD context using DevOps methods. In order to fill this gap in knowledge, this research uses a systematic literature review (SLR) to find important factors that contribute to success and their related strategies to make a framework for vendor organization to consider it when selecting and adopting DevOps as their methodology for initiatives of global development of software. With the goal to provide a framework based on critical success factors and their supported practices for selecting the best DevOps approach in global software development, the study presents a protocol paper that defines a path for performing systematic literature reviews (SLRs).

Cite this chapter as:
Khan, S. U., & Khan, A. W. (2024). Exploring Factors for a Framework Deciding Adoption of DevOps in Global Software Development from Vendors’ Perspective: A Protocol for a Systematic Literature Review. In S. C. Haw, L. Lee, M. M. Alam, A. Khan, M. Z. Asghar, & Khan, F. U (Eds.), Computing and Data Science. (45-62). MMU Press

Chapter 5

Empirical Investigation of Security Awareness and Training for Distributed Team to Safeguard from Cyberattacks

By Jamshid Ahmad and Abdul Wahid Khan

Abstract – The increased use of remote teams in today’s business environment has increased the need for strong cyber security measures to previously unheard-of heights. This study highlights how crucial it is to put in place thorough security awareness and training programs designed especially for distributed teams. These kinds of initiatives are crucial for strengthening the defenses against changing cyberthreats that aim to compromise remote work settings. Organizations may equip their distributed workforce with the necessary knowledge and abilities to identify, stop, and successfully respond to cyberattacks by placing a high priority on security education. Acknowledging the critical importance of security awareness and training, our program seeks to assist vendor organizations in seeing the inherent worth of these precautions in preventing cyberattacks. In order to do this, we plan to carry out a thorough literature analysis in order to pinpoint critical success factors and in organization best practices related to security awareness and training initiatives. The goal of this project is to provide organizations with useful information, so they may improve their cyber resilience and lessen the dangers that come with dealing with malevolent actors online. Organizations may protect their remote workforce and maintain operational integrity in the face of changing threats by working together to create a culture of cyber security awareness.

Cite this chapter as:
Ahmad, J., & Khan, A. W. (2024). Empirical Investigation of Security Awareness and Training for Distributed Team to Safeguard from Cyberattacks. In S. C. Haw, L. Lee, M. M. Alam, A. Khan, M. Z. Asghar, & Khan, F. U (Eds.), Computing and Data Science. (63-76). MMU Press

Chapter 6

Bridging the Gap: Enhancing Security Awareness, Management, and Employee Behaviors in InfoSec Policies and Standards

By Hamza, Jawaid Iqbal and Salman Ali

Abstract – This research explores the important topic of how an organization’s Information Security Culture (ISC) influences employees following Information Security Policies (ISP). As the electronic ecosystem becomes larger and full of information, safeguarding it becomes more vital. Organizations are becoming more aware of the importance of Information Security Policy Compliance (ISPC), yet there is a lack of experience in terms of implementation. This research addresses the gap by analyzing the factors that influence employees’ transition from noncompliance to adherence to ISP. It examines how ISC affects employee behavior toward ISP compliance. This research discusses a complicated link using a strong foundation to deliver new perspectives. These understandings will allow organizations to create effective compliance plans, address non-compliance threats, and eventually develop a strong data security culture – a vital defense against continuously evolving security risks.

Cite this chapter as:
Hamza, Iqbal, J., & Ali, S. (2024). Bridging the Gap: Enhancing Security Awareness, Management, and Employee Behaviors in InfoSec Policies and Standards. In S. C. Haw, L. Lee, M. M. Alam, A. Khan, M. Z. Asghar, & Khan, F. U (Eds.), Computing and Data Science. (77-90). MMU Press

Chapter 7

Traffic Rules Violation Detection in Smart Cities using Internet of Things: A Systematic Literature Review Protocol

By Asad Hussain, Ihsan Rabbi and Umar Farooq

Abstract – The Intelligent Transportation System is an integral part of the concept of smart cities, which is becoming a reality in many countries with the help of Internet of Things (IoT). Reducing traffic violations plays a crucial role in the successful implementation of these systems. The concept of Internet of Vehicles (IoV) is an extension of IoT infrastructure, which is developed for this specific reason. However, there are many challenges towards its successful implementation and, therefore, there is need to explore the current implementations and determine their challenges. Systematic Literature Review (SLR) is an organized method to investigate such challenges. This work focuses on determining various traffic rules violations, their consequences and the challenges of current solutions found in the literature. Towards this, this paper presents a comprehensive SLR protocol developed by incorporating all the generic and specific terminologies of traffic violations in the literature. It adopted well defined criteria for the inclusion and exclusion of literature. The proposed protocol was used to explore relevant literature from four well known databases. The initial search resulted in a total of 6449 articles, which were reduced to 51 for analysis purposes when this work applied the inclusion, exclusion and quality assessment criteria on them. This work reported 11 traffic violations including overspeeding and lane changes among the most frequent ones and found 8 consequences associated with these violations. Furthermore, it enlisted 6 challenges in IoV infrastructure and reported 6 mechanisms developed to overcome these limitations.

Cite this chapter as:
Hussain, A., Rabbi, I., & Farooq, U. (2024). Traffic Rules Violation Detection in Smart Cities using Internet of Things: A Systematic Literature Review Protocol. In S. C. Haw, L. Lee, M. M. Alam, A. Khan, M. Z. Asghar, & Khan, F. U (Eds.), Computing and Data Science. (91-112). MMU Press

Chapter 8

Impact of Online Learning on Students’ Self-Concept Motivation in Khyber Pakhtunkhwa

By Irfan Ullah Khan and Muhammad Bilal Qureshi

Abstract – Online learning plays a vital role in this present digital era. This study aims to highlight the role of online learning in students’ self-concept motivation. In order to do so, this study firstly investigates the impact of online learning on university-level students’ self-concept motivation in southern districts of Khyber Pakhtunkhwa, Pakistan. The researcher collected data from 400 students at the Bachelor of Science Level, both urban and rural. A self-developed questionnaire was used to collect data from the desired population. Next, the collected data were analyzed through SPSS (Statistical Package for the Social Sciences) version 20. Regression and coefficient of impact (β) were used as statistical techniques. The results of this study revealed that online learning opportunities play a vital role in students’ self-concept motivation at the university level. The study highlighted that at this stage, the students are mature enough to use various online learning sources to motivate them to learn more and improve their knowledge.

Cite this chapter as:
Khan, I. U., & Qureshi, M. B. (2024). Impact of Online Learning on Students’ Self-Concept Motivation in Khyber Pakhtunkhwa. In S. C. Haw, L. Lee, M. M. Alam, A. Khan, M. Z. Asghar, & Khan, F. U (Eds.), Computing and Data Science. (113-124). MMU Press

 

Chapter 9

Importance of Assembly Language in Cyber Security and Reverse Engineering

By Muhammad Talha Attari, Muhammad Ahmad Nawaz and Mubariz Rehman

Abstract – Unlike other skill sets such as which are more commonly available, knowledge of Assembly Language is relatively rare. Consequently, when a company requires someone with this skill set, the principles of supply and demand dictate that the scarcity of such individuals increases the value of the skill. Another reason for the significance of Assembly Language is its indispensable role in Reverse Engineering. Whether analyzing malicious software as a malware analyst or benign software as a vulnerability hunter, understanding Assembly Language is crucial. Regardless of the specific case, knowing Assembly Language is necessary to effectively reverse engineer software and identify vulnerabilities. However, it is important to note that discovering vulnerabilities and exploiting them require distinct skill sets. Moreover, if the objective is to secure a system, knowledge of assembly language is essential for delving deep into the system’s core and comprehending its inner workings, enabling the development of effective security measures. So, the problem is that most people who are new in the field of cyber security do not know the importance of assembly language in cyber security and reverse engineering. So, in this paper, we are going to go through from the start by first explaining the term assembly language, then its importance in cyber security and reverse engineering. This anticipated outcome of this will be in narrowing the gap between assembly language and cyber security.

Cite this chapter as:
Attari, M. T., & Nawaz, M. A., & Rehman, M. (2024). Importance of Assembly Language in Cyber Security and Reverse Engineering. In S. C. Haw, L. Lee, M. M. Alam, A. Khan, M. Z. Asghar, & Khan, F. U (Eds.), Computing and Data Science. (125-140). MMU Press

Chapter 10

Empirical Investigation of Quantum Computing for Integration with Existing Software Architecture Process

By Fahad Rehman and Abdul Wahid Khan

Abstract – The idea of quantum computing is a relatively recent advancement in technology. That, in comparison to traditional computers, demonstrates significantly improved problem[1]solving capabilities. Over the course of the past few years, the development of quantum computing has had a considerable impact on the discipline of software engineering. A rising number of businesses are showing an interest in quantum computing, which has led to an improvement in the prospects for this subject throughout the course of time. In the same way as other fields of academic investigation face considerable challenges, quantum computing does as well. In order to determine the key challenges that vendor firms have while attempting to incorporate quantum computing into their existing software architecture, this study’s objective is to look at these challenges specifically. A technique known as the systematic literature review (SLR) will be utilized in order to identify the difficulties associated with the integration of software with the architecture of quantum computing. In order to provide evidence in support of the conclusions of the systematic literature review (SLR), an empirical investigation will be carried out to identify any potential novel impediments that may be encountered by industry experts.

Cite this chapter as:
Rehman, F., & Khan, A. W. (2024). Empirical Investigation of Quantum Computing for Integration with Existing Software Architecture Process. In S. C. Haw, L. Lee, M. M. Alam, A. Khan, M. Z. Asghar, & Khan, F. U (Eds.), Computing and Data Science. (141-153). MMU Press

 

 

 

 


 Back