Work place: School of Software, Tsinghua University, Beijing, P.R.China
E-mail: affan.yasin@qq.com
Website:
Research Interests: Computational Engineering, Software Construction, Software Engineering, Computational Game Theory, Engineering
Biography
Affan Yasin has received his Bachelor of Science in Computer Science (BSCS) from National University of Computer, and Emerging Sciences (NUCES-FAST), Lahore, Pakistan, and he has received his Master of Science in Software Engineering (MSSE) degree from Blekinge Tekniska Högskola (BTH), Karlskrona, Sweden. Recently, he has completed his Ph.D. from Tsinghua University, Beijing, P.R.China. His area of interest includes empirical research and development within Software Engineering, game-based learning, social engineering, serious game, Persuasive technology and requirements engineering. Currently, he is working as a Post-Doctoral researcher at Tsinghua University, Beijing, P.R.China.
By Naila Samad Shaikh Affan Yasin Rubia Fatima
DOI: https://doi.org/10.5815/ijitcs.2022.03.05, Pub. Date: 8 Jun. 2022
Much like other processing domains, cloud computing is not surely safe. Security of cloud processing needs the same attention as any other aspect of cloud processing requires. Cyber world is shifting toward ontological technique and web 3.0 or web semantics for security. Cloud hosts servers demand more attention in context of security as number of resources and their access increases. Security measures have to be more extensive in cloud. Semantic web is usually new revolution inside the web science, which usually works upon base of ontologies. Ontologies are receiving great attention in the domain of computing and hence in the domain of security. This review paper examines different proposed “ontology centered techniques” and also provides a comprehensive analysis on these tactics. This research paper gives critical analysis of different models presented by different authors and researchers for ensuring security of a cloud based environment. This analysis helps different vendors of cloud technology to adapt one or all of these models to practically implement in their cloud machines whether they are offering IaaS, PaaS or SaaS. Any new security model using ontologies can also be proposed based on this study, as this paper gives a comprehensive comparison of the previously proposed ontologies for monitoring security state of cloud environment as safe or malicious.
[...] Read more.By Shagufta Faryad Hira Batool Muhammad Asif Affan Yasin
DOI: https://doi.org/10.5815/ijitcs.2021.06.02, Pub. Date: 8 Dec. 2021
The Internet of Things (IoT) adds a new dimension to how people and things can communicate and collaborate. Society and the Internet are now being interconnected tightly and purposely. The research aims to analyze how IoT as a persuasive technology can affect human behavior and increase the awareness and effectiveness of IoT products among users. How will the Internet of Things infrastructure facilitate humans to change their attitudes and behaviors towards specific routine work? Our objective is to analyze which factors influence the acceptance and rejection of particular behaviors and the core motivators that persuade people to do something or to avoid something. We aim to determine whether IoT will facilitate humans to change their focused behaviors or not. Because of the rapid convergence of digital and physical worlds and the advent of digital technology, the Internet and social media have opened up a new world of affordances, constraints, and information flows from a design perspective. This article discusses how digital architecture affects behavior and the ramifications for designers who want to influence behavior for social and environmental good. In this paper we aim to give a brief introduction to persuasive technology, especially as it pertains to human adoption of IoT technology. We discuss a number of current research opportunities in IoT gadgets and their adoptions [1]. Our results indicate that persuasive (IoT) infrastructure can be expected to achieve a change of driving behaviour among their adopters. Furthermore, attention should be paid to an appropriate selection and implementation of persuasive strategies.
[...] Read more.Subscribe to receive issue release notifications and newsletters from MECS Press journals