Theses for Computer Science
Permanent URI for this collection
Browse
Browsing Theses for Computer Science by Title
Now showing 1 - 20 of 35
Results Per Page
Sort Options
Item Artificial Intelligence Frameworks for Sentiment Variations’ Reasoning and Emerging Topic Detection(The British University in Dubai (BUiD), 2021-07) ALATTAR, FUAD ABDELWAHAB ABDELQADERUtilizing Sentiment Analysis techniques to monitor public opinions on social media has been an essential yet challenging task in the field of Artificial Intelligence (AI). Many studies were conducted during the last two decades to help users tracking public sentiments about entities, products, events, or other targets. However, these techniques focus on extracting overall positive/negative/neutral polarity of texts without identifying the main reasons for extracted sentiments. This thesis contributes to the very few studies that took one step ahead by developing novel models to understand what causes sentiment changes over time. Obviously, identifying main reasons for public reactions is valuable to decision-makers so that they can take necessary actions in a timely manner. To develop our approach, we first examined existing Sentiment Reason Mining methods to identify their limitations, then we introduced our Filtered Latent Dirichlet Allocation (Filtered-LDA) Model that overcomes major deficiencies of base methods. This model can be used for multiple applications, including detection of new research trends from large sets of scientific papers, discovery of hot topics on social media, comparison of customer reviews for two products to identify their strong/weak aspects, and our focus topic of interpreting public sentiment variations. The Filtered-LDA Model utilizes a novel Emerging Topic Detection technique for which we developed multiple AI frameworks. It emulates human approach for discovering new topics from a large set of documents. A human would first skim through all old and new documents to isolate the new ones that may contain Emerging Topics. These clustered documents are then analyzed to identify the high-frequency emerging topics. With this simple method, the impact of clustering errors is significantly reduced as the wrongly clustered documents do not usually contain main keywords of high-frequency emerging topics. Furthermore, the new frameworks introduce measures to genuinely reduce chances of detecting old topics and visualize candidate reasons online. Given that some social media platforms, like twitter, use short-text documents, we first compared accuracies of state-of-the-art Sentiment Analysis classifiers to select the best performer for short-texts. Subsequently, the selected classifier is applied on a real-life large Twitter dataset, which includes around two million tweets, to extract positive/negative/neutral sentiments. The Filtered-LDA Model is tested first on a Ground Truth dataset to validate that it outperforms baseline models, then it is finally applied on the large Twitter dataset to automatically conclude main reasons for sentiment variationsItem Customs Trade Facilitation and Compliance for Ecommerce using Blockchain and Data Mining(The British University in Dubai (BUiD), 2021-07) Alqaryouti, OmarElectronic commerce (ecommerce) has penetrated every society, organization, business and household and changed consumers’ habits. It enabled businesses in some nations to trade beyond local borders and reach global proportions. This led to the explosive growth in demands for ecommerce platforms over the last few years and the increased popularity in cross-border trade interactions. The popularity became more evident in times of crisis such as COVID-19 for critical food and medical supplies and products. However, it was disrupted in other markets due to societies going on lockdown, which were further accentuated by borders being shut down. Ecommerce cross-border trade is impacted by regulations of each country. The challenges facing global trade and Customs administrations in particular cover many dimensions. Customs being tasked with protecting society and the smooth trade flow can no longer rely on traditional practices. A coordinated and consorted effort is required to disrupt illegitimate activities and support the mission of Customs. This work first aims to determine factors that drive the adoption of Blockchain technology. Blockchain is characterized for providing visibility, integrity, provenance and immutability across participants through the shared ledger capabilities. Therefore, blockchain technology is used in this study to build a framework to enhance trade facilitation and increase compliance while eliminating risks. This framework will provide advance access to information from various sources and will enable real-time discovery of risks. Accordingly, two off-chain clustering algorithms are proposed to determine value manipulation in ecommerce transactions and increase the efficiency of Customs Audit process. The Software Development Life Cycle (SDLC) methodology is adopted to build the framework. An integrated web application is developed to mock up the end-to-end process in ecommerce. Additionally, the Cross Industry Standard Process for Data Mining (CRISP-DM) methodology is employed for modelling the two proposed clustering algorithms to identify transactional risks. The usability of the proposed framework is evaluated using the System Usability Scale (SUS) resulting in overall high acceptability levels across all users. Furthermore, accuracy measures are used to evaluate performance of the proposed clustering algorithms, reaching 86% for valuation assessment and 87% for risk identification in customs audit. The proposed framework will revolutionize the way trade supply chain is handled. It will create a shift from reactive limited visibility to proactive full visibility mode and properly manage various scenarios such as the current health hurdles and any future challenges lurching around.Item Cyberbullying Detection in Arabic Text using Deep Learning(The British University in Dubai (BUiD), 2023-03) ALBAYARI, REEM RAMADAN SA’ID; Professor Sherief AbdallahIn the new era of digital communications, cyberbullying is a significant concern for society. Cyberbullying involves the use of communication technology and data, including messages, photographs, and videos, to undertake aggressive negative actions to harm others. This practice has spread substantially due to rapid technological development and has gained significant attention in several domains involving data exchange, such as e-commerce, digital marketing, social media platforms, and others. Cyberbullying can negatively impact stakeholders, and can vary from psychological to pathological, such as self-isolation, depression, and anxiety potentially leading to suicide. Hence, detecting any act of cyberbullying in an automated manner will be helpful for stakeholders to prevent any unfortunate results from the victim’s perspective. If conducted automatically, rather than relying on human moderators, the process will be faster, enabling the early detection of cyberbullying before severe harm is caused. Data-driven approaches, such as machine learning (ML), particularly deep learning (DL), have shown promising results. DL approaches provide highly accurate predictive models for detecting cyberbullying. The first contribution of this thesis is conducting an in-depth meta-analysis of existing evaluation methods, classification techniques, and datasets related to ML for cyberbullying problems. The meta-analysis shows that ML approaches, particularly DL, have not been extensively studied for the Arabic text classification of cyberbullying. A potential reason for this research gap is the lack of Arabic-language repositories focusing on cyberbullying despite the large amount of Arabic text that can be extracted from Arabic social media platforms besides e-commerce and mobile applications. Consequently, I have designed and built a new Arabic text repository, the largest available, that can serve me and others in investigating various classifiers to deal with the issue of detecting cyberbullying. This repository contains 200,000 comments, 46,898 of which were annotated by three human annotators. First, the comments were classified as (positive/negative/neutral), and then the negative comments were further classified into two categories based on their level of negativity (toxic, bullying). The dialect for each comment was also added. This gives the dataset an advantage since it can be used for other purposes such as sentiment analysis and dialect identification, not just for cyberbullying detection. For the dataset to be regarded as a benchmark, Fleiss’s Kappa metric was adopted to measure the inter-annotator agreement (IAA), and the results show that the total Fleiss Kappa coefficient is = 0.869 with a p-value of 10-3, indicating near-perfect agreement among the three annotators. The application of DL to cyberbullying detection problems within Arabic text classification can be considered a novel approach due to the complexity of the problem and the tedious process involved, besides the scarcity of relevant research studies. Therefore, this study aims to evaluate several versions of Recurrent Neural Networks (RNNs) and Feedforward Neural Networks (FNNs) for detecting cyberbullying in the Arabic language. Although these algorithms are widely used in text classification and outperform the performance of classical classifiers, many have been extensively investigated in other domains such as sentiment analysis and dialect identification, as well as cyberbullying detection in English text. Hence, a comprehensive study focusing on Arabic cyberbullying can fill this gap in research. In this study, I conduct a performance evaluation and comparison for various DL algorithms (LSTM, GRU, LSTM-ATT, CNN-BLSTM, CNN-LSTM, CNN-BILSTM-LSTM, and LSTM-TCN) on different datasets of Arabic cyberbullying to obtain more precise and dependable findings. As a result of the models’ evaluation, a hybrid DL model is proposed that combines the best characteristics of the baseline models CNN, BLSTM and GRU for identifying cyberbullying. The proposed hybrid model improves the accuracy of all the studied datasets and can be integrated into different social media sites to automatically detect cyberbullying from Arabic social media posts. It has the potential to significantly reduce cyberbullying. Other results, related implications, and limitations, along with future research are also clarified and discussed.Item A Cybersecurity Skills Performance Dashboard (CSPD): The Use of a Technical Gamification Simulation Platform (TGSP) to Address Cybersecurity Skills Gap in the UAE(The British University in Dubai (BUiD), 2021-10) BAZARGAN, FATMA AHMADCybersecurity capacity building has been one of the main pillars of the UAE cybersecurity strategy to shorten the cybersecurity skills gap in the UAE. There have been several capacity building initiatives introduced by the UAE government to upscale the hands-on technical skills amongst cybersecurity professionals in the UAE. However, there has not been any mechanism nor a platform in place to either measure the scale of the skills gap that currently exist and needs to be addressed nor any measurement tool to provide visibility into the effectiveness of the capacity building initiatives introduced. Furthermore, there have been a plethora of undergraduate cybersecurity academic degree programs taught in various recognized educational institutions across the UAE. However, the shortage of cybersecurity practitioners globally and locally has never been more acute. Hence, there is a crucial need to introduce a UAE nation-wide cybersecurity skills performance dashboard that shall provide the required visibility into the scale of the skills gap that currently exists, hands-on technical skills that is currently available, and those skills that need to be developed and trained. The Cybersecurity Skills Performance Dashboard (CSPD) shall provide the true measurement of the current existent skills gap shortage in the UAE to enable the concerned entities to introduce the needed capacity building initiatives to shorten the skills gap. In addition, there is a heightened need to introduce new ways of instructing cybersecurity academic program to upscale the hands-on technical cybersecurity skills amongst university undergraduate students and thus improve a variety of technical skills such as digital forensics, incident response, reverse engineering, cryptography, penetration testing, and many more. This research study aims to design and develop the Cybersecurity Skills Performance Dashboard (CSPD) as a measurement tool for capacity building of cybersecurity professionals. It records and provides a true assessment of the upscale of hands-on technical cybersecurity skills of cybersecurity professionals. This is fulfilled through the introduction of new ways to the current traditional academic teaching model through the use of the Technical Gamification Simulation Platform (TGSP) to shorten the cybersecurity skills gap problem in the United Arab Emirates. Integrating the TGSP within the fabric of the undergraduate cybersecurity academic programs will produce market-ready professionals to fill in the active cybersecurity job postings in the United Arab Emirates or globally. This study employs a qualitative grounded theory research design to understand and explore how the use of the technical gamification simulation platform will enhance the hands-on technical skills amongst undergraduate students. Purposeful sampling was used to mindfully select the sample for this research work from a pool of 3rd and 4th-year undergraduate students majoring in cybersecurity from various renowned universities across the United Arab Emirates. This research work that applied to the selected participants consisted of three phases: assess, train, and perform. The data was collected from all the three phases. The first phase, the assessment phase, was in the form of responses to one-on-one interview questions. The second phase, which was the training phase, was in the form of results collected from the cybersecurity skills performance dashboard that was designed and developed by the researcher. Finally, the performance phase involved results that were in the form of responses to the post-training survey questionnaire by the participants in the study. Analysis and findings indicated that the undergraduate students found the technical gamification simulation platform an invaluable tool to upscale their hands-on technical skills because it provided them with a simulated real-world environment whilst using real-world tools to complete the technical scenario in a structured manner. This research work is considered to be the first to be conducted in the United Arab Emirates that examined providing undergraduate students majoring in cybersecurity with access to the technical gamification simulation platform for a duration of 8-weeks. Also, it was able to draw invaluable information on the effectiveness of introducing the training platform alongside the academic curriculum to upscale the hands-on technical skills. Several research questions were tested as part of this research work within the U.A.E. context. Finally, this thesis delivers the design and development of the cybersecurity skills performance dashboard (CSPD) as a measurement tool for capacity building of cybersecurity professionals and a contribution to this research study. The CSPD captures and displays the scores of the students as they complete a given technical scenario or challenge in the technical gamification simulation platform. Hence, the dashboard provides a true assessment of the cybersecurity undergraduate’s technical hands-on skills. The CSPD provides the required means to various entities (i.e., government entities, private sector, business owners, etc.) to approach the cybersecurity professional based on the skills they most need through the use of CSPD. The beneficiaries of this dashboard include entities in the UAE and worldwide. In addition, the dashboard can be used as a reference by the U.A.E. cybersecurity policymakers to understand the cybersecurity skills that are widely available in the United Arab Emirates and the skills that further need to be trained and developed. Hence, being able to tailor the capacity building campaigns on factual data. Also, the dashboard can act as a nationwide cybersecurity skills performance database/repository in the United Arab Emirates to understand the current availability of cybersecurity professionals and talents. Although the dashboard in this research work is applied to the field of cybersecurity. However, it can be generalized and applied to any other field of expertise to gain invaluable insights into the skills gap.Item Data Analytics: Adaptive Network-based Fuzzy Inference System for prediction of computer science graduates’ employability(The British University in Dubai (BUiD), 2020-09) Khadragy, SaadaThe increased amount of data generated in the world of today in all fields is considered to be an indicator for future predictions. In recent decades, in any field and as a result of developments in information technology, a huge amount of data has been provided from the educational field, by which students’ Employability Prediction has become a main concern for higher education institutions. The question of employability has become a critical consideration not only for graduates but for the educational institutions themselves. This research study compares a number of classifiers to determine the effective classifier that accurately and efficiently categorizes CS and IT graduates into employed, unemployed, or other, and predict the future employability of CS and IT students in Jordan. For this purpose, an Adaptive Network Fuzzy Inference System (ANFIS) is applied in this research study. The data of 1095 CS and IT graduates was obtained from three universities in Jordan. This data was collected through a set of tracer studies that were carried out by these universities. ANFIS, Decision Tree, SVM, MLP, and Naïve Bayes classifiers were applied in order to find the classifier with the highest accuracy and efficiency. The final outcomes showed that ANFIS has the highest accuracy, with a percentage of 94% accuracy for its predictions. A set of recommendations is presented by the researcher according to the most effective factors that influence the CS and IT employment market in the Middle East. The researcher suggests for the ministries of higher education to focus on developing the CS and IT students’ programming skills and communication skills, which emerged as essential for increasing CS and IT students’ employment prospects. affecting the employment market for CS and IT.Item A Decision Modelling Approach for Security Modules of Delegation Methods in Mobile Cloud Computing using Probabilistic Interval Neutrosophic Hesitant Fuzzy Set(The British University in Dubai (BUiD), 2023-03) AL HANTOOBI, SENDEYAHMobile Cloud Computing (MCC) has become a pervasive technology that offers on-demand, flexible, and scalable computing resources to mobile devices. However, the security issues associated with MCC have become a major concern for users and organizations, leading to the development of various Security Modules. These modules typically use delegation methods that involve the transfer of data or operations from mobile devices to the cloud to perform the task at the best performance and security levels. Despite extensive attempts to design secure security modules of delegation in Mobile Cloud Computing (MCC), none of the existing modules possess all the necessary development attributes. Our analysis indicates that previous studies have not used security development attributes as evaluation criteria to compare and assess the available Security modules of delegation methods in MCC. However, Modeling these modules is critical and poses significant challenges in selecting the most secure security module. du to multicriteria, importance of data and data variation. To address this issue, this study proposes a Decision Modelling Approach for Security Modules of Delegation Methods in Mobile Cloud Computing using multi-criteria decision-making (MCDM) methods. The proposed approach involves the integration of Evaluation based on Distance from Average Solution (EDAS) method with fuzzy weighted with zero inconsistency (FWZIC) under Probabilistic Interval Neutrosophic Hesitant Fuzzy Set (PINHFS) environment. . The framework presented in this study involves two primary stages : the construction of decision matrices for Security Modules of delegation methods in MCC and the application of the PINHFS-FWZIC method to determine the weight of the security evaluation criteria. The EDAS method is then employed to modeling the Security Modules of delegation methods in MCC based on the formulated decision matrices and criteria weight. The validation and evaluation of the proposed framework were conducted through model validation and decision evaluation procedures. Model validation involved sensitivity analysis and systematic ranking procedures . The benchmarking checklist was used to compare the results of the proposed framework with the existing approaches. Based on the findings, it can be concluded that the proposed framework can efficiently weight the security criteria and successfully rank Security Modules of delegation methods in MCC. The PINHFS-FWZIC method effectively handled the uncertainty and hesitancy of the decision-makers in assigning weights to the evaluation criteria. Overall, the proposed framework provides a useful benchmark for evaluating other Security Modules of delegation methods in MCC. It can aid decision-makers in selecting the most secure MCC delegation method system by providing a comprehensive evaluation and Modeling of the available Security Modules.Item Detection of Depression in Arabic Social Media: A Comparison of Traditional and Modern Machine Learning Algorithms(The British University in Dubai (BUiD), 2023-12) ALSHEHHI, OMAR KHALID HAMAD; Professor Sherief AbdallahThis study aims to address the research gap in detecting depression from Arabic tweets using the PHQ-9 scale as a framework. The dataset collected was a set of 200,000 tweets from around 20,000 users. A team of psychologists and assistants used a user-based approach to label users as either depressed or not. The data labelling and annotation process involved a user-based evaluation of the tweets to label users as either depressed or not, based on the two target variables of depressed_binary and depressed_multi. Users with scores between 0 and 6 were categorized as not depressed in the depressed_binary variable, while those with scores above six were classified as depressed. For the depressed_multi variable, users with scores ranging from 0 to 2 were labelled as not depressed, scores from 3 to 6 indicated mild depression, scores from 7 to 9 indicated moderate depression and scores of 10 or above represented high depression. Four machine learning models were employed in this study: HGB (Histogram Gradient Boost), GRU (Gated Recurrent Units), LSTM (Long Short-Term Memory), and SVM (Support Vector Machines). The findings revealed that the older models exhibited strong performance in binary classification, while the new models demonstrated competitive results. Future research should focus on exploring and developing newer deep learning models, such as HGB and GRU models, to enhance the accuracy and performance of depression detection in Arabic tweets. Future studies should also investigate strategies to account for the influence of different Arabic dialects and incorporate Arabic colloquialisms in depression detection models.Item A Digital DNA Sequencing Engine for Ransomware Analysis using a Machine Learning Network(The British University in Dubai (BUiD), 2020-02) KHAN, FIROZThe research work proposes a novel detection mechanism for ransomware using machine learning approach using Digital DNA sequencing. The proposed work contains three significant phases: Preprocessing and Feature Selection, DNA Sequence Generation and Ransomware Detection. In the first phase, data preprocessing and feature selection technique is applied to the collected dataset. The preprocessing of data includes remove missing value records and remove columns that have a negligible impact. The feature selection uses Grey Wolf Optimisation and Binary Search algorithms for choosing the best features out of the dataset. In the DNA Sequence generation phase uses design constraints of DNA sequence and k-mer frequency vector. A newly collected dataset after feature selection is used to generate the DNA sequence. In the final phase, the new dataset is trained using active learning concept, and the test data is generated using a random DNA sequence method. The data is finally classified as either ransomware or goodware using the learning methodologies. The results are found to be promising and reconfirm the fact that the developed method has efficiently detected ransomware when compared to other methods. The thesis concludes by a discussion of future work to advance the proposed method and future directions of research on the use of Digital DNA sequencing engine for general malware detection.Item Digital Forensics Framework for Investigating Hyperledger Fabric Blockchain Networks(The British University in Dubai (BUiD), 2022-03) AL BARGHUTHI, NEDAA BAKER JAMILIndustry leaders worldwide are adopting a new initiative to replace all paper transactions with digital ones and adopt them on blockchain platforms. Many pilot projects rely on private blockchain platforms such as the Hyperledger Fabric platform, whether at the government or private sector level. The increasing rise of this type of platform has led to the new research approach in digital forensics. There is a lack of research papers dealing with digital forensic techniques within the Hyperledger platform. This research fills the gap in the literature and provides guidelines for investigating the blockchain network. It also provides an approach for digital forensic investigators to examine the layers and associated components of Hyperledger Fabric, involving either criminal incidents, violations or abuse. This prototype retrieves relative evidence and contributes a valuable model to the current state of research. This research focuses on four objectives. proposing a prototype for network traffic investigations and retrieving all possible clues from the Hyperledger Blockchain. In addition, the research developed data mining methods and techniques to analyse the BC components. These techniques use a deployed Python-based Forensics Extractor Tool to automate the process. Furthermore, the criminological method was introduced and offered a novel and a law enforcement approach to investigate legal criminal cases in HLF BC networks. These objectives follow an adequate assessment of the characteristics of the main network components and examine in-depth network traffic. As a result, this research overcomes these challenges by working on flexible and reliable digital investigations. The numerical data extracted from the proposed framework has been verified and validated using various samples to test this framework. Accordingly, all research hypotheses were fulfilled during the research study. The outcome of the research is promising. and excellent results were illustrated. Moreover. this proposed prototype serves as a general framework for in-depth monitoring and analysis of the Hyperledger Blockchain network.Item Dynamic Cyber Resilience of Interdependent Critical Information Infrastructures(The British University in Dubai (BUiD), 2021-12) JUMA, MAZEN GHAZIWe are becoming progressively reliant on the Critical Information Infrastructures (CIIs) to provide essential services in our daily lives, such as telecommunications, energy facilities, financial systems, and power grids. These interdependent infrastructures form one coupled heterogeneous network that qualifies them to deliver new cyber roles and crucial tasks not achievable before in numerous domains worldwide. The CIIs have to deal with sophisticated cyber risks resulting from cyber vulnerabilities of their scale-free topology targeted by different cyber threats like concurrent and consecutive cyberattacks to the expected failure cause of the single hub nodes in their decentralized structures lead to cascading and escalating cyber failures that interrupt the vital services and considerable losses in modern societies with vast negative impacts on the economy and national security. Therefore, the research community has attempted over the last decade to pay attention to address the cyber protection gaps of CIIs in many studies by enhancing the existing standard solutions based on cyber trustfulness engineering, for example, distance-vector, link-state, and path-rule solutions, or developing new ones, but still missing one comprehensive technology solution. The required solution has to bridge the current literature gaps by shifting the paradigm of cyber CIIs protection properly towards dynamic cyber resilience to balance proactive and reactive perspectives at theoretical and empirical levels. Besides, it also needs to understand, analyze, evaluate, and optimize the set of dynamic cyber resilience capabilities consisting of withstanding, mitigation, recovery, and normalization. These capabilities support the various states of the typical cycle of dynamic cyber resilience, including threshold, bottom, and equilibrium states to increase CIIs robustness against cyberattacks, absorb frequent cyber disturbances that occurred, recover quickly from cyber failures, and re-establish their acceptable performance levels within appropriate timeframe. This thesis presents the novel proposed solution of dynamic cyber resilience using cyber zero-trust engineering for the first time to cope with highlighted shortcomings of the standard solutions, overcome the single hub node failure and enhance dynamic cyber resilience capabilities of interdependent CII networks against concurrent and consecutive cyberattacks to deliver their core services continuously. The research goal of this thesis was accomplished by an iterative four-objective cycle through two phases: primary and optimization. In the primary phase, the novel conceptual framework of the proposed solution was developed based on four fundamental concepts: decentralized registry, delegated peers, consensus rules, and dynamic routing. The technology stack of the proposed solution was also implemented with four algorithms and eight protocols. The evaluation results of the proposed solution were compared to the results of standard solutions under different cyberattack scenarios using quantitative research methods involving computing simulations, emulation experiments, and analytical modeling. The optimization phase improved the conceptual framework by adding three new fundamental concepts: hubs coupling, encrypted transmission, and end-to-end service quality. The technology stack was also enhanced with three new algorithms and five protocols. The proposed solution was optimized using the iterative four-objective cycle based on previous primary phase results. Lastly, all results in both phases were analyzed and discussed, and the final findings of the thesis were interpreted. However, it can be concluded that the proposed solution failed to compete with other standard solutions in terms of dynamic cyber resilience capabilities and total resilience measurements during the primary phase. Nevertheless, the optimized solution achieved the optimal results compared to the standard solutions. Finally, study limitations and recommendations for future works represented the research outcomes and contributions.Item Enhancing Arabic Offensive Tweet Classification: An Ensemble Approach Integrating AraBERT, Neural Networks, and LSTM Models(The British University in Dubai (BUiD), 2023-10) WAHDAN, AHLAM MOHAMMAD; Professor Khaled Shaalan; Dr Mostafa AL-EmranThis thesis addresses the crucial research problem of accurate detection and moderation of offensive language in Arabic text, considering the intricacies posed by the language's complex morphology, dialectal variations, orthographic ambiguity, orthographic noise, limited linguistic resources, and the necessity for comprehensive coverage of offensive language expressions. The research objectives are delineated through four key research questions. Firstly, the study aims to identify the existing research gaps in Arabic Text Classification (ATC) through an extensive and rigorous systematic literature review. The study adopts a scholarly and formal approach, aiming to identify the specific areas within ATC research that lack comprehensive exploration or exhibit inadequacies in existing knowledge. This endeavor is grounded in the rigorous analysis and synthesis of relevant academic literature, ensuring a meticulous examination of the current state of research in ATC. Secondly, it investigates the effects of employing novel pre-processing methods on the performance of Arabic Text Classification. Thirdly, the research endeavors to determine the most effective model for enhancing the accuracy of Arabic offensive text classification by introducing a novel approach using pre-trained models; AraBERT model in conjunction with fully connected neural networks (NN) and long short-term memory (LSTM) networks. Finally, the study evaluates the proposed model's ability to classify Arabic offensive text effectively. The research methodology consists of two integral parts, comprising dataset description, the proposed framework. The dataset description provides insights into the two datasets utilized, namely OSACT and SEMEval. The framework elucidates the proposed model, which leverages a combination of pretrained models and neural networks, thereby achieving a high level of effectiveness in classifying Arabic offensive text. The model's performance is meticulously assessed using various evaluation metrics, including accuracy and F1-macro score, and is compared against other classifier models. The research findings demonstrate the superiority of the proposed model over the baseline AraBERT model, with the proposed model achieving an accuracy of 0.870 compared to the baseline accuracy of 0.820, along with an F1-score of 0.853 compared to the baseline's 0.800. This emphasizes the model's exceptional capacity to accurately identify offensive content in Arabic text. The implications of this research extend to diverse domains and stakeholders, encompassing decision makers, developers, and policy makers. The insights garnered from the study can be instrumental in making informed decisions pertaining to the integration of Arabic text classification systems in various operational settings. By comprehending the proposed model's performance and efficacy, decision makers can assess its potential impact on optimizing processes such as information retrieval, content filtering, and sentiment analysis in Arabic text. In conclusion, this thesis contributes significantly to the existing literature by addressing the complexities associated with offensive language identification in Arabic text and introducing an innovative approach that integrates pretrained models with deep learning techniques and neural networks. The demonstrated effectiveness and superior performance of the proposed model underscore its potential for practical implementation in real-world scenarios, thereby bolstering the field of Arabic offensive text classification.Item Examining the Factors affecting the sustainability of blockchain technology in higher education using a hybrid SEM-ANN approach(The British University in Dubai (BUiD), 2022-10) AL SHAMSI, MOHAMMED SALEM MATARBlockchain technology has received considerable attention during the last few years. Blockchain technology permits the creation of a distributed record of a decentralized digital event in which data and related transactions are not controlled by a third party. However, little is known concerning what affects their sustainable use for educational purposes. Consequently, there are three primary goals for this research. A systematic review is conducted to address the research gaps in the literature on Blockchain adoption from the lens of information system (IS) models and theories. The systematic review included empirical studies published between January 2010 and December 2021 on the topic of blockchain adoption. Among the 918 articles, 30 articles were critically analyzed based on the inclusion criteria. This research, therefore, develops a theoretical model based on extracting constructs from the protection motivation theory (PMT) and expectation confirmation model (ECM) to understand the sustainable use of blockchain in higher education. The developed model was then tested based on data collected through an online survey from 374 university students in the UAE who used blockchain technology for educational purposes. The model was empirically validated using a hybrid structural equation modelling-artificial neural network (SEM-ANN) approach. The hypotheses testing results reinforced most of the suggested hypotheses in the developed model. The sensitivity analysis results for model 1 revealed that satisfaction has the most considerable effect on the sustainable use of blockchain technology with 100% normalized importance, followed by perceived usefulness (58.8%), perceived severity (12.1%), and response cost (9.2%). Besides, the sensitivity analysis for model 2 showed that perceived usefulness has the most considerable effect on the sustainable use of blockchain technology with 100% normalized importance. However, expectation confirmation has 29.2%. Theoretically, integrating the PMT and ECM will add significant value to the validation of the two theories in general and the blockchain in specific. Practically, understanding the impact of security factors would assist in understanding the effect of security incidents on the sustainable use of technology in higher educational institutions. In addition, governments, academia, businesses, and individuals often tend to share resources over a distributed ledger secured by means of cryptography. Blockchain technology also helps in facilitating the traceable, secure, and verifiable exchange of educational data across institutions effectively. Methodologically, the use of SEM-ANN in validating such theoretical models is rarely used, and hence, it would add value to the existing literature by measuring the non-linear relationships among the factors.Item Examining the factors affecting users’ cybersecurity behaviour in mobile payment contactless technologies: A hybrid SEM-ANN approach(The British University in Dubai (BUiD), 2022-12) ZAINAL, HANA YOUSUFModern businesses have adopted a plethora of advancements due to the emergence of digital transformation where the recent lifestyle requires to have a robust platform to process all the communication in an effective and secure way. Advanced technologies adopted by the society purely concentrated on the software and cybersecurity enhancements from the software perspective ignoring the fact that a human behaviour can be the most major and severe threat for these advanced technologies. The adoption of any new technology in the society has been turned into a must rather than a complimentary due to the rapid growth of the technology advancements and people curiosity to investigate new trends. Technology adoption depends on the behaviour of the end users in dealing with the technology. Mobile payment contactless technologies are one of the fast-growing technologies specially after the appearance of the COVID-19 where all the payments and transactions are performed using RFID (Radio-Frequency Identification) or NFC (Near Field Communication) techniques. The individual’s cybersecurity behaviour is a major concern in these technologies. A quick review of literature showed that none of the studies discussed the individual’s cybersecurity behaviour toward this technology. Therefore, this research has three main objectives. First, conducting a systematic of systematic reviews on cybersecurity through a multidisciplinary perspective to address the research gaps in the existing literature of human cybersecurity behaviour. The systematic review of systematic review included empirical studies published between January 2015 and February 2022 on the topic of cybersecurity. A total of 794 studies have been reviewed, and 60 studies were found qualified and considered in the analysis. Through the analysis, little attention has been paid to cybersecurity behaviour in general and mobile payment contactless technologies in specific. Moreover, the existing literature discussed the utilization of mobile payment contactless technologies in terms of adoption and use in a certain criteria or environment and do not measure or explore the cybersecurity behaviour towards this technology. To bridge this literature gap, this research builds an integrated theoretical model by combining factors from the Protection Motivation Theory (PMT), Technology Threat Avoidance Theory (TTAT), Theory of Planned Behaviour (TPB), along with cybersecurity awareness to measure the cybersecurity behaviour in mobile payment contactless technologies. The model was then empirically validated using a hybrid Structural Equation Modelling-Artificial Neural Network (SEM-ANN) approach based on data collected through questionnaire surveys from mobile payment contactless technologies users in the UAE. The results indicated that the attitude, subjective norm, cybersecurity awareness, perceived behavioural control and response efficacy have a significant influence on cybersecurity behaviour. On the other side, the results indicated that perceived threat, response cost, and self-efficacy have insignificant influence on cybersecurity behaviour. The model explained 53% of the total variance in cybersecurity behaviour. Additionally, the ANN results showed that cybersecurity awareness is the most important factor affecting cybersecurity behaviour, with a normalized importance of 100%. Theoretical contributions, practical implications, and limitations and future research were also discussed.Item Exploring the Factors Affecting Chatbot Use in Higher Education and Its Impact on Social Sustainability Using a Hybrid SEM-ANN Approach(The British University in Dubai (BUiD), 2023-06) ALNUAIMI, ABDULLA ALSHARHAN; Professor Khaled ShaalanPrevious studies have identified various drivers of chatbot adoption through different technology adoption theories. However, these studies have not been thoroughly reviewed and synthesized. Most studies have focused on examining the intention of using chatbots, with limited investigations on actual use and sustainable intention. This thesis explores the factors influencing the sustainable adoption of chatbots in higher education, specifically focusing on social sustainability. It aims to develop an integrated model that comprehensively examines the influencing factors, moderating effects, and organizational dynamics that shape chatbot adoption. The research begins with a comprehensive literature review to identify factors that generally influence chatbot adoption. These factors encompass technological, individual, organizational, and contextual dimensions. Building upon this literature review, the conceptual model is developed, addressing the research gaps in the existing literature and focusing on chatbot acceptance in the higher education sector. The systematic review includes an analysis of empirical studies published between 2016 and September 2022, resulting in 219 eligible studies out of 3,942 reviewed. The main findings reveal that the Technology Acceptance Model (TAM), Social Presence Theory (SPT), and Computers as Social Actors (CASA) are the prevailing theories explaining chatbot adoption. Anthropomorphism is the most examined external factor, followed by trust, enjoyment, and interactivity. The conceptual framework integrates established theories such as Task-Technology Fit (TTF), Source Credibility Theory, Social Presence Theory (SPT), and additional factors specific to chatbot adoption in higher education. A quantitative survey is administered to a sample of 341 individuals and students from the higher education sector in the UAE, capturing diverse perspectives on chatbot adoption. The model is then validated using advanced analytical techniques, including Partial Least Squares Structural Equation Modelling (PLS-SEM) and Artificial Neural Networks (ANN). The findings contribute to understanding chatbot adoption in higher education, providing insights into key drivers, challenges, and implications for social sustainability. The study's findings highlight factors such as task-technology fit, credibility, and social presence that significantly influence the intention to sustainably use chatbots in higher education. The sensitivity analysis reveals the importance of social presence, followed by credibility and task-technology fit, in influencing chatbot use. The chatbots’ technological characteristics have a greater impact than the task characteristics, and visual cues are perceived as more important than invisible and verbal cues for chatbot social presence. Trustworthiness is the most significant factor impacting credibility, followed by ease of use, tailoring, and commercial implications. However, Expertise, Real-World Feel, and Amateurism do not significantly impact credibility. These results contribute to developing acceptance models that can guide the design, implementation, and evaluation of chatbot initiatives in higher education institutions, fostering social sustainability. The theoretical contributions lie in developing an integrated model that extends existing theories to the context of chatbot adoption in higher education. The model provides a comprehensive understanding of the influencing factors and their interrelationships, offering a valuable framework for future research. From a practical perspective, the findings assist higher education institutions in strategically implementing and managing chatbots. The insights gained from this study can guide the development of effective strategies to promote chatbot acceptance, address privacy concerns, and leverage chatbots' potential for enhancing social sustainability in higher education settings.Item Factors Affecting Cybersecurity Behaviour in the Metaverse: A Hybrid SEM-ANN Approach Based on Deep Learning(The British University in Dubai (BUiD), 2023-01) ALMANSOORI, AFRAHCybersecurity procedures and policies are prevalent countermeasures for protecting organizations from cybercrimes and security incidents. However, without considering human behaviours, implementing these countermeasures will remain useless. Cybersecurity behaviour has gained much attention in recent years. However, little is known concerning the factors that influence the cybersecurity behaviour of Metaverse users. Consequently, this research has three key objectives. A comprehensive systematic review is steered to address research gaps in the current literature on cybersecurity behaviour via the lens of information system models and theories to identify the most prevalent factors, theoretical models, technologies and services, and participants. The systematic review identified 2,210 empirical studies published on cybersecurity behaviour between 2012 and 2021. In line with the existing gaps found in the literature, this research, therefore, develops an integrated model based on extracting constructs from the Protection Motivation Theory (PMT), Health Belief Model (HBM), and Theory of Interpersonal Behaviour (TIB). An external factor, “trust”, is also incorporated in the model to understand better the factors affecting the cybersecurity behaviour in the Metaverse. The developed model was then evaluated based on survey responses from 531 Metaverse users in the United Arab Emirates who used the Metaverse for personal or professional purposes. The empirical data were analysed using a deep learning-based hybrid Structural Equation Modeling (SEM) and Artificial Neural Network (ANN) Approach. The integrated model explained 66.1% of the total variance in cybersecurity behaviour. The hypotheses testing results reinforced most of the suggested hypotheses in the developed model. The sensitivity analysis results for the ANN model revealed that “cues to action” have the most considerable importance in understanding cybersecurity behaviour in the Metaverse, with 97.8% normalized importance, followed by habit (69.7%), perceived vulnerability (69.6%), self-efficacy (40.9%), and trust (27.2%). Theoretically, integrating the PMT, HBM, and TIB along with the external factor, “trust”, is believed to add a significant value to validating the three theories in general and the cybersecurity behaviour in specific. Practically, understanding the impact of security factors would assist in understanding the effect of security incidents on cybersecurity behaviour in the Metaverse. Furthermore, policymakers and regulators should pay attention to and analyse the present data privacy policies and legislation to create specific policies and regulations for using the Metaverse. Moreover, cybersecurity companies, system analysts, and developers can use the insights from the essential factors as a form of a lesson to the refinement of presently implemented solutions as well as the anticipation of new future technological advancements.Item Federal Multi Criteria Decision Making Framework in Distribution of Anti-SARS-CoV-2 Monoclonal Antibody to Eligible High-Risk Patients as Case Study(The British University in Dubai (BUiD), 2022-06) ALSEREIDI, ABEERNo specific treatment was available for severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2) when the epidemic firstly broke out. The urgent need to end this unusual situation has resulted in many attempts to deal with SARS-CoV-2. In addition to several types of vaccinations that have been created, anti-SARS-CoV-2 monoclonal antibodies (mAbs) have added a new dimension to preventative and treatment efforts. This therapy also helps prevent severe symptoms for those at a high risk. Therefore, it is a promising treatment for mild-to-moderate SARS-CoV-2 cases. However, the availability of anti-SARS-CoV-2 mAb therapy is limited and leads to two main challenges. The first is the privacy challenge of selecting eligible patients from the distribution hospital networking, which requires data sharing; the second is the prioritisation of all eligible patients amongst the distribution hospitals according to dose availability. To our knowledge, no research has combined the federated fundamental approach with multicriteria decision-making methods for the treatment of SARS-COV-2, which indicates a research gap. This thesis presents a unique sequence processing methodology that distributes anti-SARS-CoV-2 mAbs to eligible high-risk patients with SARS-CoV-2 according to medical requirements by using a novel federated decision-making distributor (FDMD). A novel FDMD of anti-SARS-CoV-2 mAbs is proposed for eligible high-risk patients. FDMD is implemented on augmented data of 49,152 cases of patients with SARS-CoV-2 with mild and moderate symptoms. For proof of concept, three hospitals with 16 patients each are enrolled. The proposed FDMD is constructed from the two sides of claim sequencing: central federated server (CFS) and local machine (LM). The CFS includes five sequential phases synchronised with the LMs, namely, the preliminary criteria setting phase that determines the high-risk criteria, calculates their weights using the newly formulated interval-valued spherical fuzzy and hesitant 2-tuple fuzzy-weighted zero-inconsistency (IVSH2-FWZIC) and allocates their values. The subsequent phases are federation, dose availability confirmation, global prioritisation of eligible patients and alerting the hospitals with the patients most eligible for receiving the anti-SARS-CoV-2 mAbs according to dose availability. The LM independently performs all local prioritisation processes without sharing patients’ data using the provided criteria settings and federated parameters from the CFS via the proposed federated TOPSIS (F-TOPSIS). The sequential processing steps are coherently performed at both sides. The results are presented as follows: (1) The proposed FDMD efficiently and independently identifies the high-risk patients who are most eligible for receiving anti-SARS-CoV-2 mAbs at each local distribution hospital. The final decision at the CFS relies on the indexed patients’ score and dose availability without sharing the patients’ data. (2) The IVSH2-FWZIC effectively weights the high-risk criteria of patients with SARS-CoV-2. (3) The local and global prioritisation ranks of the F-TOPSIS for eligible patients are subjected to a systematic ranking validated by high correlation results across nine scenarios by altering the weights of the criteria. (4) A comparative analysis of the experimental results with a prior study confirms the effectiveness of the proposed FDMD. The study of the proposed FDMD implies that it has the benefits of centrally distributing anti-SARS-CoV-2 mAbs to high-risk patients prioritised according to their eligibility and dose availability. It also simultaneously protects their privacy and offers an effective cure to prevent progression to severe SARS-CoV-2, hospitalisation or death.Item Framework for Minimizing Critical Information Infrastructure Threats from Insiders(The British University in Dubai (BUiD), 2017-10) AL KATHEERI, AHMED OMARMalicious insiders are posing unique security challenges to organizations due to their knowledge, capabilities, and authorized access to information systems. Data theft and IT sabotage are two of the most recurring themes among crimes committed by malicious insiders. This research aims at investigating the scale and the scope of the risks from malicious insider’s activities and exploring the impact of such threats on business operations. The developed framework targets minimization of the insider threats through profiling the user activities using information from the log files of several components participating in these activities, like IDS, IPS, firewalls, network devices, sever hosts and workstations. Malicious activities potentially leave suspicious patterns and references to users which can be used to infer the main actor or actors and mitigate the threat before they actually occur. The analytical backbone of the framework can be build upon Actor Network Theory. Organizations need to implement a multi layered defensive approaches to combat insider risks; safeguarding sensitive business information from malicious insiders requires an effective security framework that can identify the malicious group members involved and predict their offensive intentions something like a black box. To open this black box and explore the intention of the insiders, the framework developed here relies on two different security technologies: Security Information Event Management (SIEM) and User Behavior Analytics (UBA). They allow extracting the data from different entity logs, analyzing and separating the malicious activities from non-malicious ones on the base of the User Security Profile (USP). On the other hand, the security engine must allow formulating different hypothesis, which have varying degree of flexibility to address the security requirements and have the ability to identify the main actor and the other participants using analyzed information. Organizations need to implement multi layered defensive approaches to combat insider risks; safeguarding sensitive business information from malicious insiders requires an effective security policy that communicates widely the consequences of stealing or leaking confidential information in an unauthorized manner. Secondly, logging and monitoring employee activity is essential in detecting and controlling system vulnerabilities. Thirdly, conducting periodic and consistent vulnerability assessments is critical to identify any gaps in security controls and to prevent insiders from exploiting them. And last, but certainly not least, taking extra caution when dealing with privileged users is important to proactively protect the information infrastructure from insider risks.Item A Framework to Implement Advanced Technologies in Higher Education Institutions: A Blockchain-Based Solution Case Study(The British University in Dubai (BUiD), 2022-11) AL MANSOORI, SUAADThe main drive behind this research is a statement made by Haugsbakken and Langseth (2019) that higher education institutions (HEIs) have a history of being slow and ineffective in adopting new technologies. The United Arab Emirates has encouraged HEIs to adopt new technologies to reinforce services. One of the main operations in HEIs is managing students’ credentials which requires HEIs to implement smart solutions rather than following traditional practices such as filling paper-based forms and getting approvals via emails. However, smart solutions, technologies, and advanced systems are associated with several challenges that might drive decision-makers away from replacing the traditional practices with new advances solutions in HEIs. This research proposes a general implementation framework that can guide decision-makers in HEI when implementing new solutions and technologies. The research also takes Blockchain Technology as a case study to customize the proposed framework and use it to implement Blockchain-based solutions. The researcher has conducted several qualitative and quantitative methods. First, highlighting challenges of implementing new solutions that were discussed in literature; with the focus on Blockchain as one of the most promising technologies. Second, building an online survey questionnaire in which HEIs stakeholders participated in to rank the challenges and provide further insights. Third, studying the case of a private university in The United Arab Emirates to highlight the issues of the current traditional credentials management practices and use the new proposed framework to implement a new Blockchain-based system in the same university. For the validation, the research was presented and published at two international conferences. It was also validated with the experts’ feedback and a live demo. This research does not focus on the technical aspects of Blockchain technology or any other technology but serves as a guideline to motivate decision-makers and stakeholders in HEIs to adopt new technologies.Item Governmental Data Analytics: An Agile Framework Development and Real-World Data Analytics Case Studies(The British University in Dubai (BUiD), 2023-03) QADADEH, WAFA; Professor Sherief AbdallahItem Information Technology Disaster Recovery Plan (IT DRP) Framework – A study on IT Continuity for Smart City in Abu Dhabi Smart Government(The British University in Dubai (BUiD), 2017-07) AL HASSAN, LINDA KHALED MOHAMMEDThe growth in urbanization in the world of today in unprecedented, supported with information technology to meet the growing demands of the humankind. Over the years, technology application in various fields of business has increased, with one such concept been seen in the form of smart cities. The heavy reliance on technology today has facilitated governments to improve public services and achieve satisfaction amongst its users. Similarly for businesses, it has boosted global communication, trade and development. However, the reliance on information technology has also increased the challenges with one such being disaster recovery. In this research study, the aim was to develop a IT DRP framework to support the Abu Dhabi Government in the initiatives of smart city services to assure its system and IT continuity. An extensive literature review was conducted to identify the key parameters that dictate the efficiency of an IT framework, and the challenges, barriers and risks that are involved in securing IT disaster recovery. Past literature in the area of smart cities and information technology had led to the identification of the gap of IT disaster recovery which is found missing. While a large extent of the literature deals with securing firms in the event of a natural disaster, however, no significant finding was made in terms of a well-developed IT disaster recovery framework. This applies especially in the area of public services such as those offered by Abu Dhabi Smart City. Also, given the focus of the past researchers on IT continuity for corporates, this research study design was framed to incorporate the case of Abu Dhabi Smart City. Based on the factors identified in the literature review, i.e. factors influencing smart city services and the components of IT disaster recovery, a conceptual framework was developed. The concept was reviewed and examined in light of the past literature in the area of IT disaster recovery and the challenges or barriers that restricted their application in smart city services. A quantitative method was adopted as the research design for data collection from experts, IT professionals and policy makers from Abu Dhabi Government, UAE as the sample. A detailed statistical analysis was conducted to identify the relationships between the key variables i.e. smart city services and IT DRP and how the framework can be implemented in case of an IT disaster to secure IT services continuity. Upon data analysis, the researcher was able to identify the core components of IT DRP and Smart city which were then conjoined together to formulate the revised framework. Post review of each individual factor, correlation testing and hypothesis testing was conducted that examined the relationship between smart city variables and IT DRP variables. The analysis revealed that all the components of IT DRP and Smart city are inter-connected. As per the findings from the responses of the IT personnel associated with smart city projects in Abu Dhabi Government and the analysis of data, distinct from data validation, some additional factors are discovered. Based on this, few changes are made to the framework which involves addition of new factors and removal of less dominant factors from the framework for smart city IT DRP. The new comprehensive framework for smart city IT DRP for smart government services was tested as well as evaluated for validity. It was found that the framework proposed with the subcomponents of IT DRP and Smart city have a strong relationship when integrated together. After conducting the research and drawing important conclusions, the researcher offers recommendations for policy makers as well as researchers. The government can adopt the proposed framework for analysis of the numerous external factors having the potential to impact the plans in one way or the other and to devise more intelligent plans and strategies accordingly. In case of academic researchers, his study suggests to investigate on how to identify and then manage the identified stakeholders effectively for better results. They can look into the details of how by keeping in view the specific needs of the public, government can formulate more effectual policies to administer such large ICT projects. They can explore the different techniques adopted by the government entities and how they determine the order in which they execute their different tasks. It is suggested that they should look into the several facets of this smart city project so as to make planning in compliance. It is also recommended that the organizations and government should constantly monitor their security systems to avoid any sort of data breach and keep them up to date.