Affan Yasin

ORCID: 0000-0002-0166-2239
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Software Engineering Techniques and Practices
  • Software Engineering Research
  • Spam and Phishing Detection
  • Advanced Malware Detection Techniques
  • Information and Cyber Security
  • Open Source Software Innovations
  • User Authentication and Security Systems
  • Educational Games and Gamification
  • Blockchain Technology Applications and Security
  • Digital Games and Media
  • Data Quality and Management
  • Cybercrime and Law Enforcement Studies
  • Technology Adoption and User Behaviour
  • Mobile Crowdsensing and Crowdsourcing
  • Privacy, Security, and Data Protection
  • Innovative Teaching and Learning Methods
  • Software Reliability and Analysis Research
  • IoT and Edge/Fog Computing
  • Misinformation and Its Impacts
  • Network Security and Intrusion Detection
  • Sentiment Analysis and Opinion Mining
  • Digital Marketing and Social Media
  • Digital Innovation in Industries
  • Innovative Human-Technology Interaction
  • Mobile and Web Applications

Xi’an Jiaotong-Liverpool University
2024-2025

Airlangga University
2025

Northwestern Polytechnical University
2023-2024

Tsinghua University
2016-2023

Blekinge Institute of Technology
2012-2020

In today's online environment, people attend various kinds of activities, exhibit different digital presence, build personal reputations, issuing and receiving feedbacks from communities being involved with. These diverse information sources once aggregated can provide a valuablefuture reference for identity credits check. The primary objective this paper is to propose systematic framework aggregating reputation information, holistic approach behavioral ratings. Major contributions include:...

10.1109/compsac.2016.2 article EN 2016-06-01

Protecting people from cyber threats imposes great challenges, not only technically, but also socially. To achieve the intended level of awareness, software security principles need to be shown with concrete examples during education. This study aims design a serious game integrating knowledge and concepts into processes make it more engaging learn while playing. In this paper, we have: (i) designed compensate deficiencies in literature; (ii) performed empirical evaluations including survey,...

10.1049/iet-sen.2018.5095 article EN IET Software 2018-08-01

Context: The inclusion of grey literature (GL) is important to remove publication bias while gathering available evidence regarding a certain topic. number systematic reviews (SLRs) in Software Engineering (SE) increasing but we do not know about the extent GL usage these SLRs. Moreover, Google Scholar rapidly becoming search engine choice for many researchers which it can find primary studies known. Objective: This tertiary study an attempt i) measure SLRs SE. Furthermore this proposes...

10.1109/access.2020.2971712 article EN cc-by IEEE Access 2020-01-01

In the digital age, there is a notable increase in fraudulent activities perpetrated by social engineers who exploit individuals' limited knowledge of devices. These actors strategically manipulate human psychology, targeting IT devices to gain unauthorized access sensitive data. Our study centered around two distinct objectives be accomplished through utilization serious game: (i) The primary objective entails delivering training and educational content participants with focus on phishing...

10.1016/j.infsof.2024.107426 article EN cc-by Information and Software Technology 2024-02-23

Context:In the current era of digital technology, social engineers are using various tactics to undermine human weaknesses. Social Engineers target psychology achieve their target(s) which in form data, account details, or IT devices etc. According our research, one fi rst methods used victims is Phishing/Spear Phishing. Objective:The objective this study utilize serious game to: i) educate players regarding phishing and spear-phishing attacks; ii) make aware dangers associated with...

10.3233/jcs-181253 article EN Journal of Computer Security 2019-10-05

Abstract User forums enable a large population of crowd‐users to publicly share their experience, useful thoughts, and concerns about the software applications in form user reviews. Recent research studies have revealed that end‐user reviews contain rich pivotal sources information for vendors developers can help undertake evolution maintenance tasks. However, such user‐generated is often fragmented, with multiple viewpoints from various stakeholders involved ongoing discussions Reddit...

10.1002/spe.3137 article EN Software Practice and Experience 2022-08-14

ABSTRACT Assessing the quality and credibility of research is crucial across disciplines. However, training early career scholars in systematic appraisal poses challenges. The rise online grey literature increases need for nuanced evaluation capabilities. This study aims to impart basic assessment knowledge software engineering researchers using an interactive card‐based learning activity. PRISMA abstract checklist was adapted into a physical card deck. Sixteen novice participated session...

10.1002/smr.2753 article EN Journal of Software Evolution and Process 2025-01-01

Context and Background: Since December 2019, the coronavirus (COVID-19) epidemic has sparked considerable alarm among general community significantly affected societal attitudes perceptions. Apart from disease itself, many people suffer anxiety depression due to present threat of an outbreak. Due fast propagation virus misleading/fake information, issues public discourse alter, resulting in significant confusion certain places. Rumours are unproven facts or stories that propagate promote...

10.1155/2022/6561622 article EN cc-by Computational Intelligence and Neuroscience 2022-09-14

Human physical activity recognition from inertial sensors is shown to be a successful approach for monitoring elderly individuals and children in indoor outdoor environments. As result, researchers have significant interest developing state-of-the-art machine learning methods capable of utilizing sensor data providing key decision support different scenarios. This paper analyzes data-driven techniques recognizing human daily living activities. Therefore, improve the classification activities...

10.3390/s22176632 article EN cc-by Sensors 2022-09-02

Abstract In modern times, internationally organized teams face a number of coordination problems owing to their different physical operating locations. These challenges usually come in temporal, cultural, and linguistic forms. To resolve some these issues, we need more coordination, teamwork, shared understanding the requirements engineering phase. Many approaches have been introduced overcome associated with global software (GSE). The objective this research study is introduce amateurs GSE...

10.1002/smr.2587 article EN Journal of Software Evolution and Process 2023-06-25

Summary End‐user feedback in social media platforms, particularly the app stores, is increasing exponentially with each passing day. Software researchers and vendors started to mine end‐user by proposing text analytics methods tools extract useful information for software evolution maintenance. In addition, research shows that positive high‐star ratings attract more users increase downloads. However, it emerged fake review market, where incorporating reviews against their corresponding...

10.1002/cpe.7990 article EN Concurrency and Computation Practice and Experience 2023-12-20

This study focuses on adoption of simulation system in rapidly changing technology and information flow. Given the prevalent popularity system, it is important to understand adopt develop future educational plans. paper addresses how enhances student collaborative learning learner performance using Technology Acceptance Model. Results were analyzed Structure Equation Modeling technique; this established that perceived usefulness, ease use, enjoyment all have a significant positive...

10.1080/2331186x.2018.1424678 article EN cc-by Cogent Education 2018-01-01

Abstract Over the past few years, application and usage of Machine Learning (ML) techniques have increased exponentially due to continuously increasing size data computing capacity. Despite popularity ML techniques, only a research studies focused on especially supervised learning in Requirement Engineering (RE) activities solve problems that occur RE activities. The authors focus systematic mapping work investigate those between period 2002–2023. aim trends, main activities, algorithms,...

10.1049/cit2.12348 article EN cc-by-nc-nd CAAI Transactions on Intelligence Technology 2024-06-10

App stores allow users to search, download, and purchase software applications accomplish daily tasks. Also, they enable crowd-users submit textual feedback or star ratings the downloaded apps based on their satisfaction. Recently, crowd-user contains critical information for developers, including new features, issues, non-functional requirements, etc. Previously, identifying bugs in low-star was ignored literature. For this purpose, we proposed a natural language processing-based (NLP)...

10.1109/access.2024.3425830 article EN cc-by-nc-nd IEEE Access 2024-01-01

Abstract Malicious scammers and social engineers are causing great harms to modern society, as they have led the loss of data, information, money, many more for individuals companies. Knowledge about engineering (SE) is wide‐spread it exits in non‐academic papers communication channels. mostly based on expert opinion experience reports. Such knowledge, if articulated, can provide a valid source knowledge information. We performed analysis such sources, guided by academic principles around...

10.1002/spy2.161 article EN Security and Privacy 2021-05-02

Abstract Quality of research and knowledge sources can be a critical factor to judge the quality citing them. The prevailing online dissemination via blogs, websites, experience reports, white papers helpful as it minimizes potential publication biases. In this paper, we have (i) identified body software engineering (SE) literature that is non‐indexed by Web‐of‐Science but has been used in published SE systematic review (SLR) studies (as primary studies); (ii) proposed checklist‐based method...

10.1002/smr.2464 article EN Journal of Software Evolution and Process 2022-05-24

The prioritization of bug reports based on severity is a crucial aspect triaging, enabling focus more critical issues. Traditional methods for assessing range from manual inspection to the application machine and deep learning techniques. However, evaluation tends be resource-intensive inefficient, while conventional models often lack contextual understanding. This study explores effectiveness large language (LLMs) in predicting report severity. We propose novel approach called SevPredict...

10.3390/ai5040132 article EN cc-by AI 2024-12-05

Abstract Requirements elicitation is a process that involves gathering requirements for given project. Several studies have been published suggesting strategies to improve the process. Using game‐based and crowd‐based approaches, researchers are extracting useful product development today. This study follows same line of research. research aims understanding by novices or students through different activities: (I) knowledge method (II) techniques activities viable software (education)....

10.1002/smr.2617 article EN Journal of Software Evolution and Process 2023-09-24

The Google Play Store is widely recognized as one of the largest platforms for downloading applications, both free and paid. On a daily basis, millions users avail themselves this marketplace, sharing their thoughts through various means such star ratings, user comments, suggestions, feedback. These insights, in form comments feedback, constitute valuable resource organizations, competitors, emerging companies seeking to expand market presence. provide insights into app deficiencies,...

10.1016/j.dib.2024.110499 article EN cc-by Data in Brief 2024-05-04
Coming Soon ...