Skip to main content

Showing 1–34 of 34 results for author: Janicke, H

Searching in archive cs. Search in all archives.
.
  1. arXiv:2406.12513  [pdf, other

    cs.CR

    Can We Trust Large Language Models Generated Code? A Framework for In-Context Learning, Security Patterns, and Code Evaluations Across Diverse LLMs

    Authors: Ahmad Mohsin, Helge Janicke, Adrian Wood, Iqbal H. Sarker, Leandros Maglaras, Naeem Janjua

    Abstract: Large Language Models (LLMs) such as ChatGPT and GitHub Copilot have revolutionized automated code generation in software engineering. However, as these models are increasingly utilized for software development, concerns have arisen regarding the security and quality of the generated code. These concerns stem from LLMs being primarily trained on publicly available code repositories and internet-ba… ▽ More

    Submitted 18 June, 2024; originally announced June 2024.

    Comments: 27 pages, Standard Journal Paper submitted to Q1 Elsevier

  2. arXiv:2405.08026  [pdf, other

    cs.LG

    ExplainableDetector: Exploring Transformer-based Language Modeling Approach for SMS Spam Detection with Explainability Analysis

    Authors: Mohammad Amaz Uddin, Muhammad Nazrul Islam, Leandros Maglaras, Helge Janicke, Iqbal H. Sarker

    Abstract: SMS, or short messaging service, is a widely used and cost-effective communication medium that has sadly turned into a haven for unwanted messages, commonly known as SMS spam. With the rapid adoption of smartphones and Internet connectivity, SMS spam has emerged as a prevalent threat. Spammers have taken notice of the significance of SMS for mobile phone users. Consequently, with the emergence of… ▽ More

    Submitted 12 May, 2024; originally announced May 2024.

  3. arXiv:2405.04874  [pdf, other

    cs.CR

    Critical Infrastructure Protection: Generative AI, Challenges, and Opportunities

    Authors: Yagmur Yigit, Mohamed Amine Ferrag, Iqbal H. Sarker, Leandros A. Maglaras, Christos Chrysoulas, Naghmeh Moradpoor, Helge Janicke

    Abstract: Critical National Infrastructure (CNI) encompasses a nation's essential assets that are fundamental to the operation of society and the economy, ensuring the provision of vital utilities such as energy, water, transportation, and communication. Nevertheless, growing cybersecurity threats targeting these infrastructures can potentially interfere with operations and seriously risk national security… ▽ More

    Submitted 8 May, 2024; originally announced May 2024.

  4. arXiv:2401.03530  [pdf, other

    cs.LG cs.CR

    Detecting Anomalies in Blockchain Transactions using Machine Learning Classifiers and Explainability Analysis

    Authors: Mohammad Hasan, Mohammad Shahriar Rahman, Helge Janicke, Iqbal H. Sarker

    Abstract: As the use of Blockchain for digital payments continues to rise in popularity, it also becomes susceptible to various malicious attacks. Successfully detecting anomalies within Blockchain transactions is essential for bolstering trust in digital payments. However, the task of anomaly detection in Blockchain transaction data is challenging due to the infrequent occurrence of illicit transactions. A… ▽ More

    Submitted 7 January, 2024; originally announced January 2024.

  5. arXiv:2310.12162  [pdf, other

    cs.CR cs.AI cs.LG

    AI Potentiality and Awareness: A Position Paper from the Perspective of Human-AI Teaming in Cybersecurity

    Authors: Iqbal H. Sarker, Helge Janicke, Nazeeruddin Mohammad, Paul Watters, Surya Nepal

    Abstract: This position paper explores the broad landscape of AI potentiality in the context of cybersecurity, with a particular emphasis on its possible risk factors with awareness, which can be managed by incorporating human experts in the loop, i.e., "Human-AI" teaming. As artificial intelligence (AI) technologies advance, they will provide unparalleled opportunities for attack identification, incident r… ▽ More

    Submitted 27 September, 2023; originally announced October 2023.

    Comments: 10 pages, Springer

  6. arXiv:2309.13612  [pdf, ps, other

    cs.CR cs.ET

    Digital Twins and the Future of their Use Enabling Shift Left and Shift Right Cybersecurity Operations

    Authors: Ahmad Mohsin, Helge Janicke, Surya Nepal, David Holmes

    Abstract: Digital Twins (DTs), optimize operations and monitor performance in Smart Critical Systems (SCS) domains like smart grids and manufacturing. DT-based cybersecurity solutions are in their infancy, lacking a unified strategy to overcome challenges spanning next three to five decades. These challenges include reliable data accessibility from Cyber-Physical Systems (CPS), operating in unpredictable en… ▽ More

    Submitted 24 September, 2023; originally announced September 2023.

    Comments: IEEE Submitted Paper: Trust, Privacy and Security in Intelligent Systems, and Applications

  7. arXiv:2308.05126  [pdf, other

    cs.CR

    Data-Driven Intelligence can Revolutionize Today's Cybersecurity World: A Position Paper

    Authors: Iqbal H. Sarker, Helge Janicke, Leandros Maglaras, Seyit Camtepe

    Abstract: As cyber threats evolve and grow progressively more sophisticated, cyber security is becoming a more significant concern in today's digital era. Traditional security measures tend to be insufficient to defend against these persistent and dynamic threats because they are mainly intuitional. One of the most promising ways to handle this ongoing problem is utilizing the potential of data-driven intel… ▽ More

    Submitted 9 August, 2023; originally announced August 2023.

    Comments: 15 pages, Springer

  8. Security-Enhancing Digital Twins: Characteristics, Indicators, and Future Perspectives

    Authors: Matthias Eckhart, Andreas Ekelhart, David Allison, Magnus Almgren, Katharina Ceesay-Seitz, Helge Janicke, Simin Nadjm-Tehrani, Awais Rashid, Mark Yampolskiy

    Abstract: The term "digital twin" (DT) has become a key theme of the cyber-physical systems (CPSs) area, while remaining vaguely defined as a virtual replica of an entity. This article identifies DT characteristics essential for enhancing CPS security and discusses indicators to evaluate them.

    Submitted 2 June, 2023; v1 submitted 30 April, 2023; originally announced May 2023.

    Comments: \textcopyright 2023 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works

  9. arXiv:2204.00294  [pdf, other

    cs.CV cs.AI cs.LG

    GrowliFlower: An image time series dataset for GROWth analysis of cauLIFLOWER

    Authors: Jana Kierdorf, Laura Verena Junker-Frohn, Mike Delaney, Mariele Donoso Olave, Andreas Burkart, Hannah Jaenicke, Onno Muller, Uwe Rascher, Ribana Roscher

    Abstract: This article presents GrowliFlower, a georeferenced, image-based UAV time series dataset of two monitored cauliflower fields of size 0.39 and 0.60 ha acquired in 2020 and 2021. The dataset contains RGB and multispectral orthophotos from which about 14,000 individual plant coordinates are derived and provided. The coordinates enable the dataset users the extraction of complete and incomplete time s… ▽ More

    Submitted 1 April, 2022; originally announced April 2022.

    Comments: 23 pages, 21 figures, 5 tables

  10. arXiv:2203.07603  [pdf, other

    cs.CR cs.SE

    SmartValidator: A Framework for Automatic Identification and Classification of Cyber Threat Data

    Authors: Chadni Islam, M. Ali Babar, Roland Croft, Helge Janicke

    Abstract: A wide variety of Cyber Threat Information (CTI) is used by Security Operation Centres (SOCs) to perform validation of security incidents and alerts. Security experts manually define different types of rules and scripts based on CTI to perform validation tasks. These rules and scripts need to be updated continuously due to evolving threats, changing SOCs' requirements and dynamic nature of CTI. Th… ▽ More

    Submitted 14 March, 2022; originally announced March 2022.

  11. arXiv:2112.08431  [pdf, other

    cs.CR

    Cybersecurity Revisited: Honeytokens meet Google Authenticator

    Authors: Vasilis Papaspirou, Maria Papathanasaki, Leandros Maglaras, Ioanna Kantzavelou, Christos Douligeris, Mohamed Amine Ferrag, Helge Janicke

    Abstract: Although sufficient authentication mechanisms were enhanced by the use of two or more factors that resulted in new multi factor authentication schemes, more sophisticated and targeted attacks have shown they are also vulnerable. This research work proposes a novel two factor authentication system that incorporates honeytokens into the two factor authentication process. The current implementation c… ▽ More

    Submitted 15 December, 2021; originally announced December 2021.

    Comments: 6 pages, 1 figure

  12. arXiv:2109.09259  [pdf, other

    cs.CR

    A Deep Learning-based Penetration Testing Framework for Vulnerability Identification in Internet of Things Environments

    Authors: Nickolaos Koroniotis, Nour Moustafa, Benjamin Turnbull, Francesco Schiliro, Praveen Gauravaram, Helge Janicke

    Abstract: The Internet of Things (IoT) paradigm has displayed tremendous growth in recent years, resulting in innovations like Industry 4.0 and smart environments that provide improvements to efficiency, management of assets and facilitate intelligent decision making. However, these benefits are offset by considerable cybersecurity concerns that arise due to inherent vulnerabilities, which hinder IoT-based… ▽ More

    Submitted 19 September, 2021; originally announced September 2021.

    Comments: 8 pages, 3 figures, Accepted at IEEE TrustCom2021

  13. arXiv:2102.04661  [pdf, other

    cs.CR cs.AI

    Security and Privacy for Artificial Intelligence: Opportunities and Challenges

    Authors: Ayodeji Oseni, Nour Moustafa, Helge Janicke, Peng Liu, Zahir Tari, Athanasios Vasilakos

    Abstract: The increased adoption of Artificial Intelligence (AI) presents an opportunity to solve many socio-economic and environmental challenges; however, this cannot happen without securing AI-enabled technologies. In recent years, most AI models are vulnerable to advanced and sophisticated hacking techniques. This challenge has motivated concerted research efforts into adversarial AI, with the aim of de… ▽ More

    Submitted 9 February, 2021; originally announced February 2021.

  14. arXiv:2012.08782  [pdf, other

    cs.CR

    A novel Two-Factor HoneyToken Authentication Mechanism

    Authors: Vassilis Papaspirou, Leandros Maglaras, Mohamed Amine Ferrag, Ioanna Kantzavelou, Helge Janicke, Christos Douligeris

    Abstract: The majority of systems rely on user authentication on passwords, but passwords have so many weaknesses and widespread use that easily raise significant security concerns, regardless of their encrypted form. Users hold the same password for different accounts, administrators never check password files for flaws that might lead to a successful cracking, and the lack of a tight security policy regar… ▽ More

    Submitted 20 January, 2021; v1 submitted 16 December, 2020; originally announced December 2020.

    Comments: 7 pages, 6 figures

  15. arXiv:2010.08522  [pdf, other

    cs.CR

    Federated TON_IoT Windows Datasets for Evaluating AI-based Security Applications

    Authors: Nour Moustafa, Marwa Keshk, Essam Debie, Helge Janicke

    Abstract: Existing cyber security solutions have been basically developed using knowledge-based models that often cannot trigger new cyber-attack families. With the boom of Artificial Intelligence (AI), especially Deep Learning (DL) algorithms, those security solutions have been plugged-in with AI models to discover, trace, mitigate or respond to incidents of new security events. The algorithms demand a lar… ▽ More

    Submitted 4 October, 2020; originally announced October 2020.

  16. arXiv:2010.07041  [pdf, other

    cs.CY cs.CR

    From Cyber Terrorism to Cyber Peacekee**: Are we there yet?

    Authors: Maria Papathanasaki, Georgios Dimitriou, Leandros Maglaras, Ismini Vasileiou, Helge Janicke

    Abstract: In Cyberspace nowadays, there is a burst of information that everyone has access. However, apart from the advantages the Internet offers, it also hides numerous dangers for both people and nations. Cyberspace has a dark side, including terrorism, bullying, and other types of violence. Cyberwarfare is a kind of virtual war that causes the same destruction that a physical war would also do. In this… ▽ More

    Submitted 27 September, 2020; originally announced October 2020.

  17. A Survey of COVID-19 Contact Tracing Apps

    Authors: Nadeem Ahmed, Regio A. Michelin, Wanli Xue, Sushmita Ruj, Robert Malaney, Salil S. Kanhere, Aruna Seneviratne, Wen Hu, Helge Janicke, Sanjay Jha

    Abstract: The recent outbreak of COVID-19 has taken the world by surprise, forcing lockdowns and straining public health care systems. COVID-19 is known to be a highly infectious virus, and infected individuals do not initially exhibit symptoms, while some remain asymptomatic. Thus, a non-negligible fraction of the population can, at any given time, be a hidden source of transmissions. In response, many gov… ▽ More

    Submitted 26 July, 2020; v1 submitted 18 June, 2020; originally announced June 2020.

    Comments: Paper has been accepted for publication in IEEE Access. Currently available on IEEE ACCESS early access (see DOI)

  18. arXiv:2004.10411  [pdf, other

    cs.CR

    A NIS Directive compliant Cybersecurity Maturity Assessment Framework

    Authors: George Drivas, Argyro Chatzopoulou, Leandros Maglaras, Costas Lambrinoudakis, Allan Cook, Helge Janicke

    Abstract: The NIS Directive introduces obligations for the security of the network and information systems of operators of essential services and of digital service providers and require from the national competent authorities to assess their compliance to these obligations. This paper describes a novel cybersecurity maturity assessment framework (CMAF) that is tailored to the NIS Directive requirements and… ▽ More

    Submitted 22 April, 2020; originally announced April 2020.

    Comments: 6 pages, 2 figures

  19. arXiv:1901.03899  [pdf, other

    cs.CR

    Threats, Protection and Attribution of Cyber Attacks on Critical Infrastructures

    Authors: Leandros Maglaras, Mohamed Amine Ferrag, Abdelouahid Derhab, Mithun Mukherjee, Helge Janicke, Stylianos Rallis

    Abstract: As Critical National Infrastructures are becoming more vulnerable to cyber attacks, their protection becomes a significant issue for any organization as well as a nation. Moreover, the ability to attribute is a vital element of avoiding impunity in cyberspace. In this article, we present main threats to critical infrastructures along with protective measures that one nation can take, and which are… ▽ More

    Submitted 12 January, 2019; originally announced January 2019.

  20. arXiv:1812.11900  [pdf

    cs.CY cs.CR

    Develo** Cyber Buffer Zones

    Authors: Michael Robinson, Kevin Jones, Helge Janicke, Leandros Maglaras

    Abstract: The United Nations conducts peace operations around the world, aiming tomaintain peace and security in conflict torn areas. Whilst early operations werelargely successful, the changing nature of warfare and conflict has often left peaceoperations strugglingto adapt. In this article, we make a contribution towardsefforts to plan for the next evolution in both intra and inter-state conflict: cyberwa… ▽ More

    Submitted 31 December, 2018; originally announced December 2018.

  21. arXiv:1812.09059  [pdf, other

    cs.CR

    A Novel Hierarchical Intrusion Detection System based on Decision Tree and Rules-based Models

    Authors: Ahmed Ahmim, Leandros Maglaras, Mohamed Amine Ferrag, Makhlouf Derdour, Helge Janicke

    Abstract: This paper proposes a novel intrusion detection system (IDS) that combines different classifier approaches which are based on decision tree and rules-based concepts, namely, REP Tree, JRip algorithm and Forest PA. Specifically, the first and second method take as inputs features of the data set, and classify the network traffic as Attack/Benign. The third classifier uses features of the initial da… ▽ More

    Submitted 21 December, 2018; originally announced December 2018.

    Comments: 6 pages, 1 figure

  22. Blockchain Technologies for the Internet of Things: Research Issues and Challenges

    Authors: Mohamed Amine Ferrag, Makhlouf Derdour, Mithun Mukherjee, Abdelouahid Derhab, Leandros Maglaras, Helge Janicke

    Abstract: This paper presents a comprehensive survey of the existing blockchain protocols for the Internet of Things (IoT) networks. We start by describing the blockchains and summarizing the existing surveys that deal with blockchain technologies. Then, we provide an overview of the application domains of blockchain technologies in IoT, e.g, Internet of Vehicles, Internet of Energy, Internet of Cloud, Fog… ▽ More

    Submitted 24 June, 2018; originally announced June 2018.

    Comments: 14 pages, 5 figures

  23. arXiv:1806.02608  [pdf, other

    cs.CY

    Develo** Cyber Peacekee**: Observation, Monitoring and Reporting

    Authors: Michael Robinson, Kevin Jones, Helge Janicke, Leandros Maglaras

    Abstract: Cyber peacekee** is an emerging and multi-disciplinary field of research, touching upon technical, political and societal domains of thought. In this article we build upon previous works by develo** the cyber peacekee** activity of observation, monitoring and reporting. We take a practical approach: describing a scenario in which two countries request UN support in drawing up and overseeing… ▽ More

    Submitted 7 June, 2018; originally announced June 2018.

  24. arXiv:1803.10281  [pdf, other

    cs.CR

    Authentication schemes for Smart Mobile Devices: Threat Models, Countermeasures, and Open Research Issues

    Authors: Mohamed Amine Ferrag, Leandros Maglaras, Abdelouahid Derhab, Helge Janicke

    Abstract: This paper presents a comprehensive investigation of authentication schemes for smart mobile devices. We start by providing an overview of existing survey articles published in the recent years that deal with security for mobile devices. Then, we describe and give a classification of threat models in smart mobile devices in five categories, including, identity-based attacks, eavesdrop**-based at… ▽ More

    Submitted 8 March, 2019; v1 submitted 27 March, 2018; originally announced March 2018.

    Comments: 22 pages, 9 figures

  25. arXiv:1711.00525  [pdf, other

    cs.CR

    Internet of Cloud: Security and Privacy issues

    Authors: Allan Cook, Michael Robinson, Mohamed Amine Ferrag, Leandros A. Maglaras, Ying He, Kevin Jones, Helge Janicke

    Abstract: The synergy between the cloud and the IoT has emerged largely due to the cloud having attributes which directly benefit the IoT and enable its continued growth. IoT adopting Cloud services has brought new security challenges. In this book chapter, we pursue two main goals: 1) to analyse the different components of Cloud computing and the IoT and 2) to present security and privacy problems that the… ▽ More

    Submitted 1 November, 2017; originally announced November 2017.

    Comments: 27 pages, 4 figures

  26. arXiv:1710.09616  [pdf, other

    cs.CY

    An Introduction to Cyber Peacekee**

    Authors: Michael Robinson, Kevin Jones, Helge Janicke, Leandros Maglaras

    Abstract: Peacekee** is a noble and essential activity, hel** to bring peace to conflict torn areas and providing security to millions of people around the world. Peacekeepers operate in all domains of war: buffer zones on land, no fly zones in the air and ensuring free passage at sea. With the emergence of cyberspace as a domain of war, questions on the role of peacekee** in this domain naturally ari… ▽ More

    Submitted 24 April, 2018; v1 submitted 26 October, 2017; originally announced October 2017.

    Comments: This is an updated version, submitted to the Journal of Networking and Computer Applications

  27. arXiv:1708.04027  [pdf, other

    cs.CR

    Security for 4G and 5G Cellular Networks: A Survey of Existing Authentication and Privacy-preserving Schemes

    Authors: Mohamed Amine Ferrag, Leandros Maglaras, Antonios Argyriou, Dimitrios Kosmanos, Helge Janicke

    Abstract: This paper presents a comprehensive survey of existing authentication and privacy-preserving schemes for 4G and 5G cellular networks. We start by providing an overview of existing surveys that deal with 4G and 5G communications, applications, standardization, and security. Then, we give a classification of threat models in 4G and 5G cellular networks in four categories, including, attacks against… ▽ More

    Submitted 14 August, 2017; originally announced August 2017.

    Comments: 24 pages, 14 figures

  28. arXiv:1612.07206  [pdf, other

    cs.CR

    Authentication Protocols for Internet of Things: A Comprehensive Survey

    Authors: Mohamed Amine Ferrag, Leandros A. Maglaras, Helge Janicke, Jianmin Jiang

    Abstract: In this paper, we present a comprehensive survey of authentication protocols for Internet of Things (IoT). Specifically, we select and in-detail examine more than forty authentication protocols developed for or applied in the context of the IoT under four environments, including: (1) Machine to machine communications (M2M), (2) Internet of Vehicles (IoV), (3) Internet of Energy (IoE), and (4) Inte… ▽ More

    Submitted 21 December, 2016; originally announced December 2016.

    Comments: 62 pages, 8 figures

  29. arXiv:1611.07722  [pdf, other

    cs.CR

    A Survey on Privacy-preserving Schemes for Smart Grid Communications

    Authors: Mohamed Amine Ferrag, Leandros A. Maglaras, Helge Janicke, Jianmin Jiang

    Abstract: In this paper, we present a comprehensive survey of privacy-preserving schemes for Smart Grid communications. Specifically, we select and in-detail examine thirty privacy preserving schemes developed for or applied in the context of Smart Grids. Based on the communication and system models, we classify these schemes that are published between 2013 and 2016, in five categories, including, 1) Smart… ▽ More

    Submitted 23 November, 2016; originally announced November 2016.

    Comments: 30 pages, 13 figures, 15 tables

  30. A Security Evaluation Framework for U.K. E-Goverment Services Agile Software Development

    Authors: Steve Harrison, Antonis Tzounis, Leandros A. Maglaras, Francois Siewe, Richard Smith, Helge Janicke

    Abstract: This study examines the traditional approach to software development within the United Kingdom Government and the accreditation process. Initially we look at the Waterfall methodology that has been used for several years. We discuss the pros and cons of Waterfall before moving onto the Agile Scrum methodology. Agile has been adopted by the majority of Government digital departments including the G… ▽ More

    Submitted 8 April, 2016; originally announced April 2016.

    Comments: 19 pages, 4 figures, International Journal of Network Security & Its Applications (IJNSA) Vol.8, No.2, March 2016

  31. arXiv:1601.03921  [pdf

    cs.CR cs.CY

    Human Behaviour as an aspect of Cyber Security Assurance

    Authors: Mark Evans, Leandros A. Maglaras, Ying He, Helge Janicke

    Abstract: There continue to be numerous breaches publicised pertaining to cyber security despite security practices being applied within industry for many years. This article is intended to be the first in a number of articles as research into cyber security assurance processes. This article is compiled based on current research related to cyber security assurance and the impact of the human element on it.… ▽ More

    Submitted 15 January, 2016; originally announced January 2016.

    Comments: 22 pages, 5 Figures

  32. arXiv:1506.05017  [pdf, other

    cs.CR

    A Robust Eco-Routing Protocol Against Malicious Data in Vehicular Networks

    Authors: Pavlos Basaras, Leandros Maglaras, Dimitrios Katsaros, Helge Janicke

    Abstract: Vehicular networks have a diverse range of applications that vary from safety, to traffic management and comfort. Vehicular communications (VC) can assist in the ecorouting of vehicles in order to reduce the overall mileage and CO2 emissions by the exchange of data among vehicle-entities. However, the trustworthiness of these data is crucial as false information can heavily affect the performance… ▽ More

    Submitted 25 June, 2015; v1 submitted 16 June, 2015; originally announced June 2015.

    Comments: 8 pages, 8 figures

    MSC Class: 68U20 ACM Class: C.2.1

  33. An Extended Stable Marriage Problem Algorithm for Clone Detection

    Authors: Hosam AlHakami, Feng Chen, Helge Janicke

    Abstract: Code cloning negatively affects industrial software and threatens intellectual property. This paper presents a novel approach to detecting cloned software by using a bijective matching technique. The proposed approach focuses on increasing the range of similarity measures and thus enhancing the precision of the detection. This is achieved by extending a well-known stable-marriage problem (SMP) and… ▽ More

    Submitted 13 August, 2014; originally announced August 2014.

    Comments: 20 pages, 10 figures, 6 tables

    Journal ref: Al Hakami,H, Chen, F & Janicke, H (2014) An Extended Stable Marriage Problem Algorithm for Clone Detection, International Journal of Software Engineering & Applications (IJSEA), Vol.5, No.4, pp 103-122

  34. Data Confidentiality in Mobile Ad hoc Networks

    Authors: Hamza Aldabbas, Tariq Alwada'n, Helge Janicke, Ali Al-Bayatti

    Abstract: Mobile ad hoc networks (MANETs) are self-configuring infrastructure-less networks comprised of mobile nodes that communicate over wireless links without any central control on a peer-to-peer basis. These individual nodes act as routers to forward both their own data and also their neighbours' data by sending and receiving packets to and from other nodes in the network. The relatively easy configur… ▽ More

    Submitted 8 March, 2012; originally announced March 2012.

    Comments: 12 pages

    Journal ref: International Journal of Wireless & Mobile Networks (IJWMN) Vol. 4, No. 1, February 2012