Journal of Information Technology and Computing https://sabapub.com/index.php/jitc <p>Journal of Information Technology and Computing (JITC) is an international peer-reviewed journal published by Saba Publishing and covering the area of information technology and computing, i.e. computer science, computer engineering, software engineering, information systems, and information technology. JITC endeavors to publish stimulating accounts of original scientific work, primarily including research papers on both theoretical and practical issues, as well as case studies describing the application and critical evaluation of theory. Articles are published in English.</p> <p><strong>Editor in Chief:</strong> <strong><a href="https://www.scopus.com/authid/detail.uri?authorId=55430817100" target="_blank" rel="noopener">Dr. Hitham Seddiq Alhassan</a></strong><br /><strong>ISSN (online)</strong>: <a href="https://portal.issn.org/resource/ISSN/2709-5916" target="_blank" rel="noopener">2709-5916</a><br /><strong>Frequency:</strong> Quarterly</p> en-US <h3>Copyright and Licensing</h3> <p>For all articles published in SABA journals, copyright is retained by the authors. Articles are licensed under an open access Creative Commons CC BY 4.0 license, meaning that anyone may download and read the paper for free. In addition, the article may be reused and quoted provided that the original published version is cited. These conditions allow for maximum use and exposure of the work, while ensuring that the authors receive proper credit.</p> jitc@sabapub.com (JITC) support@sabapub.com (SABA Publishing) Wed, 30 Jun 2021 00:00:00 +0000 OJS 3.3.0.7 http://blogs.law.harvard.edu/tech/rss 60 Evaluating the role of scrum methodology for risk management in information technology enterprises https://sabapub.com/index.php/jitc/article/view/159 <p>This study aims to investigate the relationship between Scrum framework and risk management processes in Malaysia. Companies discuss the management based on a concerned business scale and the influence risk management in Malaysia Information technology projects success. This research is targeting Information technology firms and technology projects. Were researched through guarantee inside and out comprehension of the postulation foundation. In the outcome segment, the author influences a few proposals for the case to small-scale organizations to actualize ventures and to develop risk management successfully. The phases of risk management, in particular the step of risk detection, have a detrimental impact on project performance. Furthermore, risk control has its own risks as a mechanism. This makes it impossible to know if risk management is an appropriate approach in the IT production process for managing and minimizing risks. The study shows the effect of risk management in IT businesses is utilized in the Scrum</p> Ahmed muayad younus Alzahawi, Mohanad Abumandil Copyright (c) 2021 Journal of Information Technology and Computing https://creativecommons.org/licenses/by/4.0 https://sabapub.com/index.php/jitc/article/view/159 Wed, 30 Jun 2021 00:00:00 +0000 Enhanced Security Framework for Internet Banking Services https://sabapub.com/index.php/jitc/article/view/162 <p><em>This research, Enhanced Security Framework for Internet Banking Services is aimed at developing a suitable framework, a system based on consolidating two algorithms, improved RSA with LSB steganography capable of providing secure transmission of customer Internet banking credentials as this is imperative since the online transactions are carried out using public networks that are vulnerable to varying forms of cyber threats and attacks on data confidentiality, integrity and authenticity. In conducting this research, a thorough analysis of the existing banking system used by most banks such as First bank, Stanbic IBTC and UBA, the FINACLE 10.8 and intellect(TM) PRIVACY security system used by POLARIS bank was carried out in order to ascertain the existing security features while at the same time, reviewing the existing, current Internet banking security models in a bid to concretely establish the gaps filled by this research. The data gathered for this research were collected using the key informant interview method (KIIM), visiting banks IT unit and observation of operational procedures and other technicalities as regards Internet security. Lecture notes, newsletters and journal articles relating to Internet banking security were thoroughly reviewed. &nbsp;It was however found that the existing applications were unable to stop offline credential stealing attacks, were also vulnerable to malicious attacks when credentials are stored on customer PCs. Hence, the use of steganography in this research to consolidate cryptographic algorithms (beginning from the use of PKI-cards on card readers). In building the system, the OOAD approach was used with tools such as Class Diagram, Sequence Diagram, DFDs, and UML use cases to capture the system functionalities in a bid to come up with a successful design. MATLAB R2015a was used to process images imported from JAVA platform and analysis carried out on five (5) standard gray USC-SIPI images of size 512 × 512tiff formats as data sets selected to conceal customer data after encryption by the RSA technique yielding very high PSNR and very low MSE values as required for a secure credential transmission.</em></p> Sarjiyus, O, B.Y Baha, E. J. Garba Copyright (c) 2021 Journal of Information Technology and Computing https://creativecommons.org/licenses/by/4.0 https://sabapub.com/index.php/jitc/article/view/162 Wed, 30 Jun 2021 00:00:00 +0000