Skip to main content
Skip to main navigation menu
Skip to site footer
Open Menu
International Journal of Data Science and Advanced Analytics
Current
Archives
Announcements
About
About the Journal
Submissions
Abstracting and Indexing services
Publication Fees
Editorial Team
Privacy Statement
Contact
Quick Links
Search
Search
Register
Login
Search
Search
Home
/
Archives
/
Vol. 4 (2022): Special Issue 1
Vol. 4 (2022): Special Issue 1
6th Global Conference on Computing and Media Technology (GCMT 2022).
Published:
2023-06-14
Articles
A Modern Electoral System in Malaysia using E-Voting with the Implementation of Blockchain Technology
Samantha Yap Xin Tong, Intan Farahana Kasmin, Salmiah Amin, Nur Khairunnisha Zainal
202-208
PDF
Gamified Tailored Roleplay Story-based Phishing Awareness Training
William Wijaya, Intan Farahana Kasmin, Zety Marlia Zainal Abidin, Hemalata Vasudavan
146-153
PDF
Evaluating the Effectiveness of Gamification to Increase Cybersecurity Awareness among Students
Amos Alban Jr Maluda, Intan Farahana Kasmin, Zety Marlia Zainal Abidin, Hemalata Vasudavan
154-158
PDF
Password Generator and Storage
Goh Wei Qian, Intan Farahana Kasmin, Zety Marlia Zainal Abidin, Hemalata Vasudavan
159-164
PDF
Implementing Facial Recognition in Malaysia Point of Sale (POS) System
Koon Zhi Hin Erwin, Intan Farahana Kasmin, Zety Marlia Zainal Abidin, Hemalata Vasudavan
165-170
PDF
A Review and Comparative Analysis of Routing Protocols in Network
Daniel Mago Vistro, Ishtiaque Mahmood, Attique Ur Rehman, Farwa Javed
171-176
PDF
Intelligent Car Crash Reporting System
Lau Yi Xian, Amad Arshad, Kesava Pillai Rajadorai Rajoo, Zarir Hafiz Zulkipli
177-183
PDF
RANSOMWARE: TOOL DETECTION VULNERABILITIES AND DEFENSE
Charles Antonin Nivesse, Nor Azlina Abd Rahman , Khalida Shajaratuddur Harun
184-187
PDF
Social Distance Monitoring and Face Mask Detection System
Chin Xin Yee, Amad Arshad, Hairul Aysa Abdul Halim Sithiq
188-193
PDF
Addressing user perception and implementing Hedera Hashgraph and voice recognition into Multi-Factor Authentication (MFA) system
Wong Jie Sheng, Intan Farahana Kasmin, Salmiah Amin, Nur Khairunnisha Zainal
194-201
PDF
RFID Security Issue That is Implemented into Malaysia Toll Collection System
Goh Chei Onn, Intan Farahana Kasmin, Zety Marlia Zainal Abidin, Hemalata Vasudavan
139-145
PDF
Straper: Implementation to an Online Project Collaboration Application with Project Management Tools
Tam Kai Jun, Sathiapriya Ramiah
209-213
PDF
Performance Evaluation of IoT Routing Protocols
Ateefa Rehan Siddiqui, Chandrasekaran Arun Kuruvikulam
214-220
PDF
EFTS: An Encryption File Transfer System Applying Advanced Encryption Standard (AES) Algorithm
Omar Mahdi Eldood Mahdi, Julia Juremi
221-226
PDF
Malware and Type of Cyber Attacks Targeting Healthcare Industry In the current era, technology has evolved into many industries. As the technology gets upgraded from time to time, the vulnerability of hardware and software do still exist and without prope
Vinesh Thiruchelvam, Reshiwaran Jegatheswaran, Daniel Mago Vistro
227-235
PDF
Browser-Based Password Manager Using Tokenization
Teoh Xin Pei, Intan Farahana Kasmin, Zety Marlia Zainal Abidin, Hemalata Vasudavan
236-241
PDF
Secured E-Examination System with Continuous Authentication to Prevent Cheating
Keerrthanan Amkamaran, Intan Farahana Kasmin, Zety Marlia Zainal Abidin, Hemalata Vasudavan
242-249
PDF
AI Stroke Detection and Emergency Response System
Joel Francis Xavier, Intan Farahana Kasmin, Zety Marlia Zainal Abidin, Hemalata Vasudavan
250-256
PDF
Implementation of Machine Learning to Automate the Phishing Websites Detection
Angeline Tandri, Intan Farahana Kasmin, Zety Marlia Zainal Abidin, Hemalata Vasudavan
257-262
PDF
Mobile Application for Cybersecurity Education and Awareness since COVID-19 Pandemic
Tang Shi Yin, Intan Farahana Kasmin, Zety Marlia Zainal Abidin, Hemalata Vasudavan
263-269
PDF
Cyber Security Implementation in Hospitality Industry
Chai Ming En, Intan Farahana Kasmin, Zety Marlia Zainal Abidin, Hemalata Vasudavan
70-76
PDF
A Study of AIOT in Detecting Social Engineering Attacks: Phishing and Identity Theft
Ateefa Rehan Siddiqui, Nor Azlina Abd Rahman , Khalida Shajaratuddur Harun
7-12
PDF
Filling The Gap of Attacker Behavior Analysis in Organizing and Understanding CTF Games Among Students
Intan Farahana Kamsin, Thana Jebbr, Salmiah Amin, Nur Khairunnisha Zainal
13-19
PDF
Implementation of One-Time Password in Online Banking System Among Malaysian Bank Users to Reduce Cyber Fraud
Poh Xin Yi, Intan Farahana Kasmin, Salmiah Amin, Nur Khairunnisha Zainal
20-26
PDF
Cybersecurity Education Through Mobile Application to Prevent Cyber Attacks During Covid-19
Chan Xin Ying, Intan Farahana Kasmin, Salmiah Amin, Nur Khairunnisha Zainal
27-33
PDF
Preventing Malicious Keyloggers using Anti-keylogger Integrated Keyboard in Mobile Banking Applications
Chow Wen Xuan, Intan Farahana Kasmin, Salmiah Amin, Nur Khairunnisha Zainal
34-43
PDF
Minimizing Human Elements in Phishing Attacks by Integrating Administrative Controls to Phishing Detection Systems
Jonathan Owen Pang, Intan Farahana Kasmin, Salmiah Amin, Nur Khairunnisha Zainal
44-51
PDF
Securing Healthcare System with the Blockchain Technology
Adriena Lim Ken We’rn, Intan Farahana Kasmin, Salmiah Amin, Nur Khairunnisha Zainal
52-58
PDF
Develop deep learning software with automated filtering of email phishing to counter phishing attacks
Cheah Khai Xuan, Intan Farahana Kasmin, Salmiah Amin, Nur Khairunnisha Zainal
59-62
PDF
Implementation of Self-service Petrol Stations based RFID Technology
Lee Zi Qian, Intan Farahana Kasmin, Salmiah Amin, Nur Khairunnisha Zainal
63-69
PDF
Credit Monitoring Application: Protect Children from Child Identity Theft
Chua Zi Liang, Intan Farahana Kasmin, Zety Marlia Zainal Abidin, Hemalata Vasudavan
77-83
PDF
An application to Raise Cyber Security Awareness Among Organization Employees
Hong Yen Wai, Intan Farahana Kasmin, Zety Marlia Zainal Abidin, Hemalata Vasudavan
84-90
PDF
Browser-Based Password Manager Using Tokenization
Teoh Xin Pei, Intan Farahana Kasmin, Zety Marlia Zainal Abidin, Hemalata Vasudavan
91-96
PDF
Secured E-Examination System with Continuous Authentication to Prevent Cheating
Keerrthanan Amkamaran, Intan Farahana Kasmin, Zety Marlia Zainal Abidin, Hemalata Vasudavan
97-104
PDF
ACJS: “Anti-Crypto Jacking System” Security Development
Ahmed Mabrook Rafeequ, Intan Farahana Kasmin, Zety Marlia Zainal Abidin, Hemalata Vasudavan
105-112
PDF
Smartphone Security Issue and Cybercrime During Covid-19
Lee Zhao You, Intan Farahana Kasmin, Zety Marlia Zainal Abidin, Hemalata Vasudavan
113-116
PDF
Implementation of NFC into the authentication system of the IOT devices
Lim Pei Hui, Intan Farahana Kasmin, Zety Marlia Zainal Abidin, Hemalata Vasudavan
117-123
PDF
Risks, threats, and vulnerabilities within virtual reality technology
Ng Zheng Yao, Intan Farahana Kasmin, Zety Marlia Zainal Abidin, Hemalata Vasudavan
124-130
PDF
Cybersecurity Awareness Among Teenagers and Children Using Self-Learning System
Summetha Parimalam, Intan Farahana Kasmin, Zety Marlia Zainal Abidin, Hemalata Vasudavan
131-138
PDF
The Effects of Fragmentation of Government Services Against Cybercrimes
Yap Chee Sing, Nor Azlina Abd Rahman, Yusnita Yusof
1-6
Make a Submission
Make a Submission