Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Hazinah Kutty Mammi is active.

Publication


Featured researches published by Hazinah Kutty Mammi.


asia international conference on modelling and simulation | 2008

Towards Identifying Usability and Security Features of Graphical Password in Knowledge Based Authentication Technique

Muhamad Daniel Hafiz; Abdul Hanan Abdullah; Noor Azrina Ithnin; Hazinah Kutty Mammi

Text-based passwords are ubiquitous authentication system. This traditional authentication system is well- known for its flaws in the aspects of usability and security issues that bring problems to users. Hence, there is a need for alternative mechanism to overcome these problems. Graphical passwords, which consist of clicking or dragging activities on the pictures rather than typing textual characters, might be the option to overcome the problems that arise from the text-based passwords system. In this paper, a comprehensive study of the existing graphical password schemes is performed. We compared and categorized these schemes into two groups; recognition-based scheme and recall-based scheme. We also list out several usability and security features for research continuity in this area.


international symposium on information technology | 2008

Graphical password: User’s affinity of choice — an analysis of picture attributes selection

Muhammad Daniel Hafiz B. Abdullah; Abdul Hanan Abdullah; Norafida Ithnin; Hazinah Kutty Mammi

This paper will provide an analysis of a survey on picture attributes based on userpsilas affinity of choice. There are four picture attributes evaluated, which are picture size, picture presentation, picture colour and picture category. The objective of this survey is to collect and analyze the affinity of choice as selected by the users. There are 63 respondents involved in this survey. The respondents are from the Faculty of Computer Science and Information Systems (FSKSM) of University of Technology Malaysia, including staff members, undergraduate and postgraduate students. The sample involved 27 males and 36 females, with ages ranging from 18 to 30 years. All the respondents are frequent users of personal computers (PCs). The picture attributes information will be analyzed and selected information will be embedded into our graphical password scheme.


ieee international conference on teaching assessment and learning for engineering | 2012

Competency-based education (CBE) for IT security: towards bridging the gap

Hazinah Kutty Mammi; Norafida Ithnin

Skills gap is a common problem between university products and industry needs. This is apparent in many, if not all of the areas. The gap plays a role in the productivity or development of a given industry, as well as the unemployed rates. In a competitive world, employers are always looking for the best candidates for employment, with the best being defined as being competent both technically and professionally. We contend that competency-based curriculum can provide a means to narrow and even close the skills gap. In this paper, we present a Competency-Based Curriculum Model that can be used as a guide to develop a competency-based curriculum. This model will be employed to develop a competency-based curriculum for IT Security Engineers.


2017 6th ICT International Student Project Conference (ICT-ISPC) | 2017

Malaysia EBC: Malaysia e-book club

Nurul'Atifah Binti Mohamad Jais; Hazinah Kutty Mammi

The purpose of this project is to develop a system that can help book lovers to interact online, sharing their passion and book information with other readers who have the same interest with them. The traditional book club these days is not an appropriate avenue anymore due to time and travel distance as some of the member of book club might be busy and far to meet together in one time. Some of the existing systems also have weakness in the perspective of the content which is the sorting sometimes look complicated. The contents of some books listed and some words used in the discussion room in the existing system also not suitable for some ages. Therefore, to make the readers easy to communicate with other readers and experience the book club feel with a proper manner, an online e-book club named as Malaysia e-Book Club is needed. For the scope of this system, it only covers for books with genre of fiction, non-fiction and academic reference. Finally, the most important part is this project will improve the communication and knowledge sharing between readers online and also with authors.


2017 6th ICT International Student Project Conference (ICT-ISPC) | 2017

Explicit words filtering mechanism on web browser for kids

Nurul Athirah Binti Suliman; Hazinah Kutty Mammi

Kids are introduced to and participated on internet usage from a very young age. Unfortunately, while they can build their skills to use technology quite speedily, this is not the case for their language prowess. There are double meaning words with one of its meaning being indecent or of an adult nature. As most kids cannot distinguish this, there are times when their innocent search leads them to unsuitable sites for their age. Furthermore, as most word filters are not equipped to efficiently filter these words, this problem is compounded. We propose a browser extension that can effectively and accurately filter profanity, bad words and words with double meaning. This solution can better provide a safer environment for kids to traverse through the Internet.


International journal of security and its applications | 2012

An Anti-Shoulder Surfing Mechanism and its Memorability Test

Lim Kah Seng; Norafida Ithnin; Hazinah Kutty Mammi


Archive | 2011

User's Affinity of Choice: Features of Mobile Device Graphical Password Scheme's Anti-Shoulder Surfing Mechanism

Lim Kah Seng; Norafida Ithnin; Hazinah Kutty Mammi


Archive | 2014

Study on the Effectiveness of Securing Instant Messaging Using One Time Pad

Anthony Arifin; Hazinah Kutty Mammi


International Journal of Engineering Pedagogy (iJEP) | 2012

Competency based Education (CBE) for IT Security: Towards Bridging the Gap

Hazinah Kutty Mammi; Norafida Ithnin


Archive | 2011

Identifying the Reusability of the Triangle and Intersection Schemes on Mobile Devices

Lim Kah Seng; Norafida Ithnin; Hazinah Kutty Mammi

Collaboration


Dive into the Hazinah Kutty Mammi's collaboration.

Top Co-Authors

Avatar

Norafida Ithnin

Universiti Teknologi Malaysia

View shared research outputs
Top Co-Authors

Avatar

Lim Kah Seng

Universiti Teknologi Malaysia

View shared research outputs
Top Co-Authors

Avatar

Abdul Hanan Abdullah

Universiti Teknologi Malaysia

View shared research outputs
Top Co-Authors

Avatar

Anazida Zainal

Universiti Teknologi Malaysia

View shared research outputs
Top Co-Authors

Avatar

Ismail Fauzi Isnin

Universiti Teknologi Malaysia

View shared research outputs
Top Co-Authors

Avatar

Majid Bakhtiari

Universiti Teknologi Malaysia

View shared research outputs
Top Co-Authors

Avatar

Masitah Ghazali

Universiti Teknologi Malaysia

View shared research outputs
Top Co-Authors

Avatar

Mazleena Salleh

Universiti Teknologi Malaysia

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge