Shantha Fernando

Shantha Fernando
  • Doctor of Philosophy
  • Senior Lecturer (Grade I) at University of Moratuwa

About

63
Publications
44,862
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
696
Citations
Introduction
e-Learning and learning management systems, adaptive course development and learning objects, information systems development philosophies and life-cycles, blended university education, m-learning, socio-technical aspects of information systems, information systems security, ICT infrastructure security, digital forensics
Current institution
University of Moratuwa
Current position
  • Senior Lecturer (Grade I)
Additional affiliations
August 2000 - June 2017
University of Moratuwa
Position
  • Professor (Associate)

Publications

Publications (63)
Article
Full-text available
Phishing, a well-known cyberattack that cannot be completely eradicated from the Internet, has increased dramatically since the COVID-19 pandemic. Despite previous efforts to reduce this prevalent Internet threat, constantly changing attacks make phishing detection a difficult task. The lack of continuous learning support provided by existing solut...
Conference Paper
Full-text available
Lightweight security mechanisms to mitigate active attacks Abstract Node mobility, infrastructure-less network, open network boundary, and limited resources are general characteristic features of a Mobile Ad-hoc Network (MANET). These characters open MANETs to many security attacks. Network layer-based active attacks such as blackhole and grayhole...
Article
Full-text available
Mobile Ad hoc Network (MANET) is a type of Ad hoc network. General properties of MANET open the network to various security threats. Network layer-based Active attacks are widespread and destructive. Available security solutions contain complex calculations. Therefore, the objective of this research is to propose a lightweight security mechanism to...
Article
Full-text available
Machine learning-based anti-phishing solutions face various challenges in collecting diverse multi-modal phishing data. As a result, most previous works have trained with little or no multi-modal data, which opens several drawbacks. Therefore, this study aims to develop a phishing data repository to meet the diverse data needs of the anti-phishing...
Article
Full-text available
Phishing, a well-known cyber-attack practice has gained significant research attention in the cyber-security domain for the last two decades due to its dynamic attacking strategies. Although different solutions have been exercised against phishing, phishing attacks have dramatically increased in the past few years. Recent studies have shown that ma...
Article
Full-text available
Learning the syntax and understanding the basic concepts have been identified as the most difficult aspects in the learning of computer programming. The Digital Game Based Learning approach has gained successful outcomes at several studies related to programming and other subjects. Yet, with the examination minded competitive classrooms, lack of co...
Article
Full-text available
The opportunistic nature of the Mobile Ad-hoc Network (MANET) helps to deploy instantly where it is needed. MANET is the best solution as a network where infrastructure networks are unavailable. The fundamental characters of these networks are the reason for the vast variety of security attacks on them. Simulators provide a better platform to condu...
Chapter
Full-text available
Ad hoc On-demand Distance Vector Routing (AODV) is a routing protocol that is used in Mobile Ad hoc Network (MANET). Pure AODV protocol is failed to handle the security. In this research, we try to find the answers for the following research questions to upgrade AODV protocol in security concern. I). Does node mobility in a MANET impact the behavio...
Article
Full-text available
In this research, we attempted to investigate about the features and behaviors of network layer based active and passive attacks in Ad-hoc On-Demand Vector (AODV) routing protocol in Mobile Ad-hoc Networks (MANET). Through the literature survey, we try to understand the features of each attacks and examine the behaviors of these attacks through sim...
Article
Full-text available
Phishing, a social engineering crime that has existed for more than two decades, has gained significant research attention to find better solutions to face against the very dynamic strategies of phishing. The financial sector is the primary target of phishing, and there are many different approaches to combat phishing attacks. Software-based detect...
Article
Full-text available
MOOC user behavior is generally studied using the data collected within platform interactions in the learning system or via outside social media platforms. It is important to understand the root causes of anomalies in MOOCs, such as the 80% attrition, less interactions within platforms and what causing the reflected behaviors beyond platforms. We s...
Article
Full-text available
Massive open online courses (MOOCs) have considered to be a potential to disseminate engineering education at scale. However, the pedagogical requirement demanded engineering student to equip with specific skillsets such as communication, interactivity and collaboration. Yet, MOOCs are skeptical of facilitating those skills. Generally, MOOCs evalua...
Conference Paper
Full-text available
Massive Open Online Courses (MOOCs) often use peer grading which enables the use of open ended questions in assignments at scale. Open ended questions enhance students' creativity and improve cognition. However, this peer grading includes drawback such as missing or low quality feedback, and inconsistency between peer graders. In design studios and...
Preprint
Full-text available
Personal identity documents play a major role in every citizen's life and the authorities responsible for validating them typically require human intervention to manually cross-check multiple documents belonging to an individual. The world is rapidly replacing physical documents with digital documents where every piece of data is stored digitally i...
Preprint
Full-text available
The use of physical documents is inconvenient and inefficient in today's world, which motivates us to move towards the use of digital documents. Digital documents can solve many problems of inefficiency of data management but proving their authenticity and verifying them is still a problem. This paper presents a solution for this problem using text...
Conference Paper
Massive Open Online Courses (MOOCs) often use peer grading which enables the use of open ended questions in assignments at scale. Open ended questions enhance students’ creativity and improve cognition. However, this peer grading includes drawback such as missing or low quality feedback, and inconsistency between peer graders. In design studios and...
Conference Paper
Full-text available
Personal identity documents play a major role in every citizen's life and the authorities responsible for validating them typically require human intervention to manually cross-check multiple documents belonging to an individual. The world is rapidly replacing physical documents with digital documents where every piece of data is stored digitally i...
Conference Paper
All over the world, the shift in approaches to learning is towards collaborative learning methods by considering facts such as how students are learning and the best method for students to gain knowledge for their long-term existence. Currently Collaborative e-Learning (CeL) is widely practiced in developed Western countries and in Asian countries...
Conference Paper
Full-text available
Massive Open Online Courses (MOOCs) are education technologies which capable of teaching thousands of students synchronously. The pedagogy in MOOCs are focus on decentralized learners where students watch videos, take quizzes, submit assignments and discuss using forums. This pedagogy is focusing on the didactic method of teaching. However, the stu...
Conference Paper
Full-text available
Integrating Information Communication Technology (ICT) with Agriculture is identified as one of the most important tasks in order to achieve sustainable development in the agriculture sector in Sri Lanka. Main objective of this research is to suggest more suitable and proper approach to empower the Sri Lankan farmers through ICT. As entry criteria...
Conference Paper
Full-text available
The use of physical documents is inconvenient and inefficient in today's world, which motivates us to move towards the use of digital documents. Digital documents can solve many problems of inefficiency of data management but proving their authenticity and verifying them is still a problem. This paper presents a solution for this problem using text...
Conference Paper
Full-text available
Massive Open Online Courses (MOOCs) use peer assessment to grade open ended questions at scale, allowing students to provide feedback. Relative to teacher based grading, peer assessment on MOOCs traditionally delivers lower quality feedback and fewer learner interactions. We present the identified peer review (IPR) framework, which provides non-bli...
Preprint
Massive Open Online Courses (MOOCs) use peer assessment to grade open ended questions at scale, allowing students to provide feedback. Relative to teacher based grading, peer assessment on MOOCs traditionally delivers lower quality feedback and fewer learner interactions. We present the identified peer review (IPR) framework, which provides non-bli...
Conference Paper
Full-text available
Massive open Online Courses (MOOCs) are trending in online learning. Number of MOOCs and participants for MOOCs are increasing every day. With the increase number students taking MOOCs, they experience varied effectiveness in courses. We analyzed the students' feedback reviews from an external review portal which has facility to rate courses. We ex...
Article
Massive open Online Courses (MOOCs) are trending in online learning. Number of MOOCs and participants for MOOCs are increasing every day. With the increase number students taking MOOCs, they experience varied effectiveness in courses. We analyzed the students’ feedback reviews from an external review portal which has facility to rate courses. We ex...
Chapter
Full-text available
MOOCs are found to be next disruption for online education. It provides many avenues to students to who could not be access to world class education. xMOOCs have been experiencing by students since 2012 and courses keep adding every day in many MOOC platforms. However, it was found that not all the courses in MOOC platforms provide student satisfac...
Conference Paper
Full-text available
Massive Open Online Courses (MOOCs) are found to be the latest disruption in online education. Since 2012 up to day, there are many MOOCs introduced in many platforms. Some of the platforms are namely Coursera, edX, NovoEd, FutureLearn, Open2Study. For an instance Coursera has more than 700 courses in their platform. Although there is increase dema...
Conference Paper
Full-text available
Massive Open Online Courses (MOOCs) are trending and became the " buzz word " in online learning since 2012. Although cMOOC (Connectivist MOOC) was existed since 2008, xMOOC becoming more popular while attracting many online students. xMOOCs in particular has common pedagogical features such as small chucked videos, quizzes, peer and self-assessmen...
Conference Paper
Full-text available
Massive Open Online Courses (MOOCs) are dominating the eLearning field due to its sound pedagogical features and being open to any interest participant. Due to popularity and the demand, number of MOOCs increases at a higher rate. However, not all the MOOCs meet the goals of user. In other terms, not all the MOOCs are effective. It is vital to iden...
Conference Paper
Full-text available
Effectiveness in eLearning is identified as meeting the users' learning goals. It has been the subject of many researches which have led to a variety of dimensions and factors affecting it. However with the latest disruption of educational technology, MOOC has changed the perceptions of eLearning by taking eLearning to a new direction. Hence effect...
Conference Paper
Full-text available
Massive Open Online Courses (MOOC) is a trending phenomenon in online education. Number of participants in a MOOC and the number of MOOCs by platforms and courses are appearing to be increasing at a tremendous level. Although MOOC found to be the " buzz " word, latest reports claim that the hype of the MOOC is fading. One reason to this is because...
Conference Paper
Full-text available
Massive Open Online Courses (MOOC) is a trending phenomenon in online education. Number of participants in a MOOC and the number of MOOCs by platforms and courses are appearing to be increasing at a tremendous level. Although MOOC found to be the “buzz” word, latest reports claim that the hype of the MOOC is fading. One reason to this is because ma...
Conference Paper
Generation of home plans based on several attributes like constraints and preferences is an interesting research area. Most related research works on floor plan generation do not always adhere to the necessary constraints such as reachability, connectivity and different shaping. This paper presents a novel and flexible technique for generating floo...
Conference Paper
This study explores the life style factors of Bottom of Pyramid (BOP) People in the North Central Province of Sri Lanka in order to uplift their livelihood and to empower their vocations using a Ubiquitous Learning Framework (ULF). A cross sectional study was carried out in Yaya 02 village in Mihintale divisional secretariat's area of Anuradhapura...
Article
Full-text available
Effectiveness of eLearning has been identified as an important aspect. It determines whether the stakeholders achieve the goals of eLearning. Unlike earlier, eLearning rapidly changes with the introduction of Massive Open Online Courses (MOOC). Since many students got access to experience eLearning via MOOC, perceptions of the factors leading to an...
Article
Full-text available
eLearning is a method of delivering education via electronic means. Timely it is online learning as education or learning happens via world wide web. Effectiveness in eLearning with reference to the learner is whether he/she could meet the learning goals while learning online. In this research it has tried to identify the meaning of learning effect...
Conference Paper
Full-text available
At present most of the organizational Information systems are formed using several heterogeneous distributed systems. Relevant information might be maintained in several distributed systems. “Openness” is the basic and the most important property of a distributed system for intercommunication. It describes how systems can be extended to be inter-op...
Conference Paper
Full-text available
At present most of the organizational Information systems are formed using several heterogeneous distributed systems. Relevant information might be maintained in several distributed systems. "Openness" is the basic and the most important property of a distributed system for intercommunication. It describes how systems can be extended to be inter-op...
Article
Full-text available
Perspectives of eLearning is changing with the introduction of Massive Open Online Courses (MOOC). The pedagogy introduced by MOOC has identified as more effective than typical eLearning courses. However MOOCs are facing challenges due to the lower course completion rates. There have been many MOOCs introduced to the community within last two years...
Conference Paper
Cloud computing is becoming increasingly popular in the business world due to the advantages that it offers by eliminating the need to have infrastructure within business premises and dedicated staff to maintain infrastructure. Apart from the advantages the cloud offers, it can also bring in some potential security threats to the organization by no...
Conference Paper
E-learning introduced new ways of learning using computer and internet, and is rapidly evolving with the development of technology. Learners can actively participate and collaborate in a learning process using either synchronous or asynchronous e-learning. Collaborative e-Learning (CeL) is an effective way of learning which also improves the proces...
Conference Paper
This paper discusses the results of a tutor mentor development program that utilized a community building model to train online tutors and mentors in higher education institutions and professional organizations in Sri Lanka. Based on WisCom; an instructional design model for developing online wisdom communities, this tutor mentor development progra...
Article
A model is presented to evaluate the usefulness of learning objects for industry oriented learning environments that emphasise training university graduates for job opportunities in a competitive industry oriented economy. Knowledge workers of the industry seek continuous professional development to keep their skills and knowledge up to date. Many...
Conference Paper
Full-text available
Management Information Systems (MISs) are used to manage the processes, people, resources, finance, technologies and services of an organisation. An MIS has been developed continuously since 2007 at the University of Moratuwa based on its Learning Management System implemented in 2003. Currently Examination, Human Resource (HR), Welfare and Finance...
Conference Paper
Full-text available
Management Information Systems (MISs) are used to manage the processes, people, resources, finance, technologies and services of an organisation. An MIS has been continuously developing since 2007 at the University of Moratuwa based on its Learning Management System implemented in 2003. Currently Examination, Human Resource (HR), Welfare and Financ...
Conference Paper
Full-text available
Management Information Systems (MISs) are used to manage the processes, people, resources, finance, technologies and services of an organisation. An MIS has been developed continuously since 2007 at the University of Moratuwa based on its Learning Management System implemented in 2003. Currently Examination, Human Resource (HR), Welfare and Finance...
Article
In today’s business environment it is difficult to obtain senior management approval for the expenditure of valuable resources to “guarantee” that a potentially disastrous event will not occur that could affect the ultimate survivability of the organization. The total information network flexibility achieved depends to a great extent on how network...
Conference Paper
Full-text available
The electronic identity (eID) is being positioned to be a basic tool for identification, authentication and authorization in application domains ranging from eCommerce in private sector to eGovernance in public sector. A practical and flexible eID should be usable in both a network-connected online setting as well as in conventional offline situati...
Chapter
In today’s business environment it is difficult to obtain senior management approval for the expenditure of valuable resources to “guarantee” that a potentially disastrous event will not occur that could affect the ultimate survivability of the organization. The total information network flexibility achieved depends to a great extent on how network...
Conference Paper
Full-text available
e-Learning is becoming a prominent way of sharing knowledge in education. In this sharing, the knowledge is exchanged in the form of e-Learning content. These learning contents should be self explanatory and should guide learners in appropriate way as teachers do in real environment. However, learning content development is not a straight forward a...
Article
In today's business environment it is difficult to obtain senior management approval for the expenditure of valuable resources to "guarantee" that a potentially disastrous event will not occur that could affect the ultimate survivability of the organization. The total information network flexibility achieved depends to a great extent on how network...
Chapter
Information Technology (IT) education, when adaptive to the market demand, can contribute towards the development of IT in a country. The contribution of IT education to the economic growth and sustainable development of a country is seen in the quality and spread of IT industries. It has been observed that there is a gap between the IT knowledge p...
Chapter
The contribution of Information Technology (IT) to the economic growth and sustainable development of a country is indicated by the quality and spread of IT industries and IT education in universities. The gap between the knowledge provided by the university and the knowledge required by the IT industry is a concern. As a solution, Adaptive Course...
Article
Use of Information Technology is vital for many sectors today. However the same has necessitated t he need of computer and information security. No IT security system is perfect. Level and extent of computer crimes are rising. Computer crimes may be in the form of attacking someone elses c omputer, or using computers for illegal tasks. Ideal soluti...
Article
IntroductIon Around the world, e-learning is becoming popular, especially among higher education institutes (universities). Many highly ranked universities have either already deployed an e-learning system and are fully operational, or they are in a process of deployment where e-learning-based and non e-learning-based educational environments co-ex...

Network

Cited By